Search alternatives:
improved » improve (Expand Search)
cost » most (Expand Search), post (Expand Search)
improved » improve (Expand Search)
cost » most (Expand Search), post (Expand Search)
-
3521
Multi-objective optimization of HESS control for optimal frequency regulation in a power system with RE penetration
Published 2024-12-01“…To optimize the control parameters with the best objectives, all possible sets of objectives with four different optimization algorithms are studied. …”
Get full text
Article -
3522
Classification of Real-World Objects Using Supervised ML-Assisted Polarimetry: Cost/Benefit Analysis
Published 2024-11-01Get full text
Article -
3523
Cost-effectiveness analysis of best management practices for non-point source pollution in watersheds: A review
Published 2017-03-01“…Application of cost-effectiveness analysis method included three categories, coupling NPS model with empirical calculation methods, coupling NPS model with economic model and cost-effectiveness analysis based on optimization algorithm. …”
Get full text
Article -
3524
Differential analysis of lightweight cipher algorithm ACE based on MILP
Published 2023-01-01“…The differential property of the lightweight cipher algorithm ACE was researched.n-dimension ring AND-gate combination was defined and its differential property was described accurately by only O(n) expressions with the MILP method by analyzing the relationship among AND gates.The nonlinear operation of ACE was transformed to the 32-dimension ring AND-gate combination and the MILP differential model of ACE was proposed.According to the characteristics of Gurobi solver, a model for fast solving the MILP differential model of ACE was given.For ACE permutation with 3 to 6 steps, the optimal differential characteristic was obtained and its probability was improved by multi-difference technique.The differential forge attack on authenticated encryption algorithm ACE-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">A</mi><mi mathvariant="script">E</mi></math></inline-formula>-128 and the differential collision attack on hash algorithm ACE-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">H</mi></math></inline-formula>-256 was given with 3-step ACE permutation, and the success probability was 2<sup>-90.52</sup>.And it was proved that the 4-steps ACE permutation arrived the differential security bound of 128 bit.Actually, the MILP differential description of ring AND-gate combination can be applied on more cipher algorithms, such as SIMON, Simeck.…”
Get full text
Article -
3525
Radio Mean Labeling Algorithm, Its Complexity and Existence Results
Published 2025-06-01“…The existing ILP model does not guarantee that the vertex labels are distinct, positive and satisfy the radio mean condition, prompting the need for an improved approach. …”
Get full text
Article -
3526
Research on short-term traffic flow prediction based on the PCC-IGA-LSTM model
Published 2025-04-01“…To effectively address the spatial–temporal feature mining problem in short-term traffic flow prediction for complex road networks, a new method that combined the Pearson correlation coefficient (PCC) and improved genetic algorithm to optimize the long short-term memory model (IGA-LSTM) was constructed. …”
Get full text
Article -
3527
A Flexible Interconnected Distribution Network Power Supply Restoration Method Based on E-SOP
Published 2025-02-01“…To solve this complex optimization model, an innovative hybrid approach combining the Improved Whale Optimization Algorithm (IWOA) with second-order cone programming is developed. …”
Get full text
Article -
3528
Artificial Intelligence Meets Bioequivalence: Using Generative Adversarial Networks for Smarter, Smaller Trials
Published 2025-05-01“…This approach proved effective across various scenarios, enhancing BE study sample sizes, reducing costs, and accelerating trial durations. This study highlights the potential of WGANs to improve data augmentation and optimize subject recruitment in BE studies.…”
Get full text
Article -
3529
MTAD: A Multitarget Heuristic Algorithm for Virtual Machine Placement
Published 2015-10-01“…In order to solve the virtual machine placement problems in large scale, three algorithms are proposed. Firstly, we propose a physical machine (PM) classification algorithm by analyzing pseudotime complexity and find out an important factor (the number of physical hosts) that affects the efficiency, which improves running efficiency through reduction number of physical hosts; secondly, we present a VM placement optimization model using multitarget heuristic algorithm and figure out the positive and negative vectors of three goals using matrix transformation so as to provide the mapping of VMs to hosts by comparing distance with positive and negative vectors such that the energy consumption is saved, resources wastage of occupied PM is lowered, multidimension resource utilization is optimized, and the running time is shortened. …”
Get full text
Article -
3530
Siting and Sizing Method of GFM Converters Based on Genetic Algorithm
Published 2025-02-01“…Additionally, a strategic approach to optimal location selection and sizing of these substations aimed at enhancing the SCR within new energy grids is proposed, with the model being solved through genetic algorithms. …”
Get full text
Article -
3531
NCREASING ECONOMIC PERFORMANCES USING OPTIMIZATION
Published 2021-01-01“…The optimization process was accomplished by using a mathematical model of linear programming consisting of variables, constants, constraints and objective function. …”
Get full text
Article -
3532
Forecasting the potential of global marine shipping carbon emission under artificial intelligence based on a novel multivariate discrete grey model
Published 2024-07-01“…Furthermore, the optimal nonlinear parameters are determined by Grey Wolf optimization algorithm to improve the prediction performance, enhancing the model’s predictive performance. …”
Get full text
Article -
3533
-
3534
Metaheuristic Algorithms to Determine PID Controller Parameters for Mobile Robots
Published 2025-05-01“…MATLAB simulation results indicate that metaheuristic algorithms significantly reduce errors and improve stability compared to other methods. …”
Get full text
Article -
3535
A Ship’s Maritime Critical Target Identification Method Based on Lightweight and Triple Attention Mechanisms
Published 2024-10-01“…To verify the effectiveness of these algorithmic improvements, the DTI-YOLO algorithm was tested on a self-made dataset of 2300 ship navigation images. …”
Get full text
Article -
3536
An algorithm for heterogeneous wireless network connections for user preferences and services
Published 2025-05-01“…Abstract Heterogeneous wireless networks (HWNs) present a challenge in selecting the optimal network for user devices due to the overlapping availability of multiple networks. …”
Get full text
Article -
3537
Opposition-based chaotic evolution for optimization
Published 2025-07-01“…Abstract Evolutionary computation algorithms are widely used for solving complex optimization problems, but their practical performance is often hindered by high computational costs and premature convergence. …”
Get full text
Article -
3538
Transactive energy management for efficient scheduling and storage utilization in a grid-connected renewable energy-based microgrid
Published 2025-03-01“…This study presents an advanced Transactive Energy Management (TEM) approach employing the Slime Mould Algorithm (SMA) to optimize scheduling and storage utilization in grid-connected renewable energy microgrids. …”
Get full text
Article -
3539
Detection of Welding Defects Using the YOLOv8-ELA Algorithm
Published 2025-05-01“…The model integrates a novel HS-FPN feature fusion module, which optimizes the parameter efficiency and enhances the detection performance. …”
Get full text
Article -
3540
User preference information recommendation based on DCGNN and GNNPK algorithms
Published 2025-12-01“…Especially when dealing with challenges such as user dynamic preferences, data noise, and cold start, the limitations of these systems become increasingly obvious, and more advanced algorithms are urgently needed to improve the personalization and accuracy of recommendations. …”
Get full text
Article