-
5361
Addressing the Return Visit Challenge in Autonomous Flying Ad Hoc Networks Linked to a Central Station
Published 2024-12-01“…This paper presents different approaches to efficiently directing UAVs and explains how heuristic algorithms can enhance our understanding and improve current methods for task assignments.…”
Get full text
Article -
5362
Distribution Network Fault Risk Assessment Method Considering Difference in Entropy Value of Rare Factors
Published 2024-12-01“…This method uses K-means clustering algorithm to classify failures based on their consequences and an improved association rule mining algorithm to analyze rare environmental factors and evaluate high-risk and low-probability factors, so as to realize the quantitative analysis of the association between rare factors and risk levels. …”
Get full text
Article -
5363
Analysis of Techno–Economic and Social Impacts of Electric Vehicle Charging Ecosystem in the Distribution Network Integrated with Solar DG and DSTATCOM
Published 2025-01-01“…In this work, a comprehensive planning framework for an electric vehicle charging ecosystem (EVCE) is developed, incorporating solar distributed generation (DG) and a distribution static compensator (DSTATCOM), to assess their long-term techno–economic and environmental impacts. The optimal locations and capacities of the EVCE, solar DG, and DSTATCOM are determined using an improved particle swarm optimization algorithm based on the success rate technique. …”
Get full text
Article -
5364
Response mitigations of adjacent structure with MPTMD under real and stochastic excitations
Published 2025-05-01“…The performance of the MPTMD system is optimized using the Particle Swarm Optimization (PSO) algorithm. …”
Get full text
Article -
5365
-
5366
Protection scheme of flexible MTDC transmission line based on ISSA-BiLSTM
Published 2025-04-01“…Aiming at the problems of poor ability to withstand transition resistance and low recognition accuracy of multi-terminal flexible DC transmission line protection, a diagnostic model combining an improved sparrow search algorithm (ISSA) and bidirectional long short-term memory network (BiLSTM) is proposed. …”
Get full text
Article -
5367
Route Generation and Built Environment Behavioral Mechanisms of Generation Z Tourists: A Case Study of Macau
Published 2025-06-01“…Building on this behavioral mechanism, an interest-based Ant Colony Optimization (ACO) algorithm is implemented by incorporating point-of-interest (POI) preferences and distance matrices to improve personalized route generation. …”
Get full text
Article -
5368
Multistation Wind Speed Forecasting Based on Dynamic Spatiotemporal Graph Convolutional Networks
Published 2025-01-01“…Finally, the particle swarm optimization algorithm is used for hyperparameter optimization to improve the prediction accuracy. …”
Get full text
Article -
5369
Transmission Line Anomaly Detection and Real-Time Monitoring System Combining Edge Computing and EfficientDet
Published 2025-01-01“…In the target recognition part, an improved EfficientDet algorithm is adopted as the main body, and the aspect ratio of anchor boxes in the algorithm is optimized using K-means clustering algorithm. …”
Get full text
Article -
5370
Predicting Earthquake Casualties and Emergency Supplies Needs Based on PCA-BO-SVM
Published 2025-01-01“…Subsequently, the optimal hyperparameters for the SVM model are obtained using the Bayesian Optimization algorithm. …”
Get full text
Article -
5371
Deep Reinforcement Learning Based Active Disturbance Rejection Control for ROV Position and Attitude Control
Published 2025-04-01“…The deep deterministic policy gradient (DDPG) algorithm was used to optimize the linear extended state observer (LESO). …”
Get full text
Article -
5372
Full-Waveform Inversion of Two-Parameter Ground-Penetrating Radar Based on Quadratic Wasserstein Distance
Published 2024-11-01“…In this study, the Wasserstein distance is computed by using entropy regularization and the Sinkhorn algorithm to reduce computational complexity and improve efficiency. …”
Get full text
Article -
5373
Dry-Type Air-Core Series Reactor Turn-to-Turn Short Circuit Fault Detection Method Based on Multi-Parameter Data Fusion
Published 2025-04-01“…Subsequently, the denoised features with high saturation are input into the k-nearest neighbors (KNN) algorithm to construct a fault identification and classification model. …”
Get full text
Article -
5374
CHPOA-DBN Transformer Fault Diagnosis Method Considering Sample Within-Class Imbalance
Published 2023-08-01“…Then, the Tent chaotic map embedded chaotic hybrid pelican optimization algorithm (CHPOA) is developed to optimize the number of hidden layer nodes and reverse fine-tuning learning rate of DBN, and the CHPOA-DBN transformer fault diagnosis model is constructed. …”
Get full text
Article -
5375
Application of Support Vector Machines in High Power Device Technology
Published 2018-01-01“…It presented a support vector machines regression model (SVR) with Gauss kernel function (RBF). The best prediction model was obtained by normalization and dimensionality reduction for data and cross-validation for parameter optimization. …”
Get full text
Article -
5376
Adaptive drive-based integration technique for predicting rheological and mechanical properties of fresh gangue backfill slurry
Published 2025-07-01“…Analysis demonstrates that the particle swarm optimal (PSO) algorithm based on adaptive adjustment strategy can effectively optimize the hyperparameters of support vector regression (SVR), and the MC-PSO-SVR model exhibits better predictive capability (R2> 0.88) and lower error coefficients (MAE, RSE, and RMSE values approaching 0) and narrower widths of 95 % confidence intervals for yield stress, plastic viscosity, fluidity, and UCS. …”
Get full text
Article -
5377
Advanced intrusion detection technique (AIDT) for secure communication among devices in internet of medical things (IoMT)
Published 2025-05-01“…By employing the integrated patient sensing and network traffic datasets, our research achieves a superior accuracy rate of 96.4% in network intrusion detection compared to the competing algorithms. Furthermore, we incorporated a comprehensive analysis of the implementation of different classification algorithms in IoMT network intrusion detection, further supporting the claim that the proposed framework performs marginally better than alternative models.…”
Get full text
Article -
5378
Enhanced water saturation estimation in hydrocarbon reservoirs using machine learning
Published 2025-08-01“…To improve model performance, a Gaussian outlier removal technique was applied to eliminate anomalous data points. …”
Get full text
Article -
5379
Machine Learning and Metaheuristics Approach for Individual Credit Risk Assessment: A Systematic Literature Review
Published 2025-05-01“…Although no unified experimental comparison was conducted due to heterogeneity in study protocols, this structured summary reveals consistent trends in algorithm effectiveness and evaluation practices. The review concludes with practical recommendations and outlines future research directions to improve fairness, scalability, and real-time application in credit risk modeling.…”
Get full text
Article -
5380
A Hybrid Approach of DenseNet121 with Attention and Bi-LSTM for Yoga Pose Estimation
Published 2025-01-01“…The system is designed to integrate advanced AI techniques, providing an innovative approach to pose recognition that leverages several sophisticated machine learning models and algorithms to enhance performance. The pre-processing stage involves applying a Wiener Filter (WF) for effective noise removal, ensuring that the data is clean and ready for analysis. …”
Get full text
Article