-
3521
Self-Supervised Social Recommendation Algorithm Fusing Residual Networks
Published 2024-12-01“…Experimental results show that the algorithm has good recommendation performance compared with the benchmark model.…”
Get full text
Article -
3522
Implications of algorithmic bias in AI-driven emergency response systems
Published 2026-01-01“…Our numerical simulations further illustrate the economic viability and effectiveness of bias mitigation strategies, such as fairness-constrained optimization and improved data representativeness, in simultaneously enhancing equity and economic efficiency. …”
Get full text
Article -
3523
Multi-objective optimization of HESS control for optimal frequency regulation in a power system with RE penetration
Published 2024-12-01“…To optimize the control parameters with the best objectives, all possible sets of objectives with four different optimization algorithms are studied. …”
Get full text
Article -
3524
Differential analysis of lightweight cipher algorithm ACE based on MILP
Published 2023-01-01“…The differential property of the lightweight cipher algorithm ACE was researched.n-dimension ring AND-gate combination was defined and its differential property was described accurately by only O(n) expressions with the MILP method by analyzing the relationship among AND gates.The nonlinear operation of ACE was transformed to the 32-dimension ring AND-gate combination and the MILP differential model of ACE was proposed.According to the characteristics of Gurobi solver, a model for fast solving the MILP differential model of ACE was given.For ACE permutation with 3 to 6 steps, the optimal differential characteristic was obtained and its probability was improved by multi-difference technique.The differential forge attack on authenticated encryption algorithm ACE-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">A</mi><mi mathvariant="script">E</mi></math></inline-formula>-128 and the differential collision attack on hash algorithm ACE-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">H</mi></math></inline-formula>-256 was given with 3-step ACE permutation, and the success probability was 2<sup>-90.52</sup>.And it was proved that the 4-steps ACE permutation arrived the differential security bound of 128 bit.Actually, the MILP differential description of ring AND-gate combination can be applied on more cipher algorithms, such as SIMON, Simeck.…”
Get full text
Article -
3525
An algorithm for heterogeneous wireless network connections for user preferences and services
Published 2025-05-01“…Abstract Heterogeneous wireless networks (HWNs) present a challenge in selecting the optimal network for user devices due to the overlapping availability of multiple networks. …”
Get full text
Article -
3526
Radio Mean Labeling Algorithm, Its Complexity and Existence Results
Published 2025-06-01“…The existing ILP model does not guarantee that the vertex labels are distinct, positive and satisfy the radio mean condition, prompting the need for an improved approach. …”
Get full text
Article -
3527
Research on short-term traffic flow prediction based on the PCC-IGA-LSTM model
Published 2025-04-01“…To effectively address the spatial–temporal feature mining problem in short-term traffic flow prediction for complex road networks, a new method that combined the Pearson correlation coefficient (PCC) and improved genetic algorithm to optimize the long short-term memory model (IGA-LSTM) was constructed. …”
Get full text
Article -
3528
A Flexible Interconnected Distribution Network Power Supply Restoration Method Based on E-SOP
Published 2025-02-01“…To solve this complex optimization model, an innovative hybrid approach combining the Improved Whale Optimization Algorithm (IWOA) with second-order cone programming is developed. …”
Get full text
Article -
3529
MTAD: A Multitarget Heuristic Algorithm for Virtual Machine Placement
Published 2015-10-01“…In order to solve the virtual machine placement problems in large scale, three algorithms are proposed. Firstly, we propose a physical machine (PM) classification algorithm by analyzing pseudotime complexity and find out an important factor (the number of physical hosts) that affects the efficiency, which improves running efficiency through reduction number of physical hosts; secondly, we present a VM placement optimization model using multitarget heuristic algorithm and figure out the positive and negative vectors of three goals using matrix transformation so as to provide the mapping of VMs to hosts by comparing distance with positive and negative vectors such that the energy consumption is saved, resources wastage of occupied PM is lowered, multidimension resource utilization is optimized, and the running time is shortened. …”
Get full text
Article -
3530
Siting and Sizing Method of GFM Converters Based on Genetic Algorithm
Published 2025-02-01“…Additionally, a strategic approach to optimal location selection and sizing of these substations aimed at enhancing the SCR within new energy grids is proposed, with the model being solved through genetic algorithms. …”
Get full text
Article -
3531
NCREASING ECONOMIC PERFORMANCES USING OPTIMIZATION
Published 2021-01-01“…The optimization process was accomplished by using a mathematical model of linear programming consisting of variables, constants, constraints and objective function. …”
Get full text
Article -
3532
Classification of Real-World Objects Using Supervised ML-Assisted Polarimetry: Cost/Benefit Analysis
Published 2024-11-01Get full text
Article -
3533
Investigating of Machine Learning Based Algorithms for Liver Cirrhosis Prediction
Published 2024-03-01“…These findings not only underscore the superiority of the algorithm but also highlight its potential to revolutionize liver cirrhosis diagnosis and management practices, potentially leading to improved patient outcomes and reduced healthcare costs. …”
Get full text
Article -
3534
Forecasting the potential of global marine shipping carbon emission under artificial intelligence based on a novel multivariate discrete grey model
Published 2024-07-01“…Furthermore, the optimal nonlinear parameters are determined by Grey Wolf optimization algorithm to improve the prediction performance, enhancing the model’s predictive performance. …”
Get full text
Article -
3535
-
3536
Enhancing Wind Turbine Efficiency: An Experimental Investigation of a Sensorless Three-Vector Finite Set Predictive Torque Control Approach for PMSG-Based Systems
Published 2025-01-01“…This approach does not require an anemometer, mechanical parameters, or rotor position sensors, making the system simpler, more reliable, and cost-effective. The 3V FS-PTC algorithm enhances control performance by selecting the three most optimal voltage vectors, two active voltage vectors and one zero voltage vector. …”
Get full text
Article -
3537
Metaheuristic Algorithms to Determine PID Controller Parameters for Mobile Robots
Published 2025-05-01“…MATLAB simulation results indicate that metaheuristic algorithms significantly reduce errors and improve stability compared to other methods. …”
Get full text
Article -
3538
A Ship’s Maritime Critical Target Identification Method Based on Lightweight and Triple Attention Mechanisms
Published 2024-10-01“…To verify the effectiveness of these algorithmic improvements, the DTI-YOLO algorithm was tested on a self-made dataset of 2300 ship navigation images. …”
Get full text
Article -
3539
Transactive energy management for efficient scheduling and storage utilization in a grid-connected renewable energy-based microgrid
Published 2025-03-01“…This study presents an advanced Transactive Energy Management (TEM) approach employing the Slime Mould Algorithm (SMA) to optimize scheduling and storage utilization in grid-connected renewable energy microgrids. …”
Get full text
Article -
3540
Detection of Welding Defects Using the YOLOv8-ELA Algorithm
Published 2025-05-01“…The model integrates a novel HS-FPN feature fusion module, which optimizes the parameter efficiency and enhances the detection performance. …”
Get full text
Article