-
3821
Frequency Response Function-Based Finite Element Model Updating Using Extreme Learning Machine Model
Published 2020-01-01“…To further improve the generalization ability, the input weights and biases of ELM are optimized by Lévy flight trajectory-based whale optimization algorithm (LWOA). …”
Get full text
Article -
3822
Faster quantum subroutine for matrix chain multiplication via Chebyshev approximation
Published 2025-08-01“…The algorithm can be applied to any complex matrix. Furthermore, we discuss integrating our QMM algorithm as a subroutine in other matrix operations and propose strategies to optimize QMM for matrices with large condition numbers with numerical simulation.…”
Get full text
Article -
3823
A Developed Mathematical Model for Designing a Multilevel Sustainable Supply Chain Network Taking into Account Environmental Decisions
Published 2022-01-01“…In addition, the proposed model was optimized by the whale optimization algorithm (WOA) to find the best solution in large-scale instances in a short and reasonable time. …”
Get full text
Article -
3824
Weak Connection Regulation Technology for Source-Storage-Load Collaborative Microgrids Based on Direct Power Control
Published 2025-05-01“…The paper also studied the regional DC power supply and flexible regulation technology, analyzed the flexible characteristics of air conditioners, energy storage, photovoltaic, etc., and verified the power direct-control flexible regulation algorithm and evaluation indexes. From the effect of testing and verification, the whole system enables real-time response and rapid adjustment, thus improving the energy utilization efficiency, reducing the grid-side quota and realizing the local consumption of PV.…”
Get full text
Article -
3825
Tennis Timing Assessment by a Machine Learning-Based Acoustic Detection System: A Pilot Study
Published 2025-01-01“…<b>Results:</b> The ML algorithm showed a detection accuracy higher than 95%, while the average accuracy of the whole system that was applied on-court was 85%. …”
Get full text
Article -
3826
Precision Dosing in Presence of Multiobjective Therapies by Integrating Reinforcement Learning and PK‐PD Models: Application to Givinostat Treatment of Polycythemia Vera
Published 2025-06-01“…The therapeutic goal is to simultaneously normalize the levels of these efficacy/safety biomarkers, thus inducing a complete hematological response (CHR). An RL algorithm, Q‐Learning (QL), was integrated with a PK‐PD model describing the givinostat effect on PLT, WBC, and HCT to derive both an adaptive dosing protocol (QLpop‐agent) for the whole population and personalized dosing strategies by coupling a specific QL‐agent to each patient (QLind‐agents). …”
Get full text
Article -
3827
Discussing the Construction of a Budget Management System Combining Multimedia Technology and Financial Risk Management
Published 2022-01-01“…From the whole process of data mining, a data mining system is designed, which is “data preprocessing standardization + genetic algorithm feature selection + training set pruning + support vector machine classifier discrimination optimization.” …”
Get full text
Article -
3828
Research on Designing an Industrial Product-Service System with Uncertain Customer Demands
Published 2021-01-01“…This paper presents a design model that integrates an improved affinity propagation (AP) clustering algorithm, quality function development (QFD), and axiomatic design (AD). …”
Get full text
Article -
3829
Performance analysis of secrecy rate for SWIPT in massive antenna
Published 2017-09-01“…In the multi-drop broadcast system,the existing research is to optimize the single-user security rate in the complete channel state information.In fact,it’s impossible that there exists only one user in the system.The base station often receives incomplete channel state information.Aiming at this problem,a robust beamforming scheme was proposed.In the multi-user case,considering the influence of channel estimation error on the system security rate,the particle swarm optimization algorithm was used to optimize the emission beamforming vector,artificial noise covariance and power split ratio to ensure that the user collects a certain energy while maximizing the safe transmission rate.The simulation results show that the proposed scheme is slightly lower than the security rate in the ideal case,but it is meaningful to the actual system,taking into account the existence of eavesdropping users and the estimation error.…”
Get full text
Article -
3830
UAV-Enabled Inspection System With No-Fly Zones: DRL-Based Joint Mobile Nest Scheduling and UAV Trajectory Design
Published 2025-01-01“…This paper investigates a UAV-enabled inspection system in an urban environment with no-fly zones (NFZs), where the UAV flies to inspection points to capture images while constrained by limited onboard energy. The aim of this paper is to minimize the whole inspection time via joint optimization of the mobile nest’s scheduling and UAV trajectory while satisfying constraints related to energy maximization and avoiding NFZs. …”
Get full text
Article -
3831
An Interpretable Data-Driven Dynamic Operating Envelope Calculation Method Based on an Improved Deep Learning Model
Published 2025-05-01“…We train a CNN-LSTM-Attention neural network for voltage estimation, where we employ the whale optimization algorithm (WOA) to adjust hyperparameters automatically. …”
Get full text
Article -
3832
BS-SCRM: a novel approach to secure wireless sensor networks via blockchain and swarm intelligence techniques
Published 2024-04-01“…The proposed BS-SCRM method is structured in two phases: (1) an enhanced cluster head (CH) election utilizing an elite strategy-enhanced Whale Optimization Algorithm (WOA) that considers node energy and proximity to the base station, and (2) a secure data on-chain phase where blockchain comes into play, encrypting and validating cluster data to safeguard integrity and prevent tampering. …”
Get full text
Article -
3833
Adaptive Multi-Robot Exploration for Unknown Environments Using Edge-Weighted Path Planning
Published 2025-01-01“…Experimental results demonstrate that the algorithm achieves improved exploration efficiency and adaptability compared to a real-time scheduling method while maintaining computational feasibility. …”
Get full text
Article -
3834
Design of precoding matrices in MIMO full duplex two-way security communication system
Published 2020-10-01“…The design of precoding matrices was studied in the multiple input multiple output (MIMO) full-duplex two-way security communication system where legitimate nodes transmit the confidential information accompanied by the artificial noise while receiving information.For the scenario where the perfect channel state information (CSI) of legitimate channels and eavesdropping channels was available,the difference of concave/convex (DC) programming was used to optimize the precoding matrices of the information signal and the artificial noise for the maximization of the secrecy sum rate.For the scenario where the CSI was imperfect,the channels were modeled by using worst-case criterion and the weighted minimum mean square error algorithm was used to get the robust precoding matrices of the information signal and the artificial noise.The simulation results prove that the proposed algorithm can effectively promote the secrecy sum rate of the system.…”
Get full text
Article -
3835
Auxiliary Stopping Area Layout Method for High-Speed Maglev considering Multiple Speed Profiles and Bidirectional Operation
Published 2021-01-01“…Aiming at the layout of the ASA along the track, this article constructs an optimized model of ASA layout and proposes a solving algorithm based on the single target genetic algorithm by analyzing the influence factors of ASA layout. …”
Get full text
Article -
3836
Mapping Landslide Sensitivity Based on Machine Learning: A Case Study in Ankang City, Shaanxi Province, China
Published 2022-01-01“…The main purpose of this research is to apply the logistic regression (LR) model, the support vector machine (SVM) model based on radial basis function, the random forest (RF) model, and the coupled model of the whale optimization algorithm (WOA) and genetic algorithm (GA) with RF, to make landslide susceptibility mapping for the Ankang City of Shaanxi Province, China. …”
Get full text
Article -
3837
Research on quality and safety risk identification of import and export toys based on the WOA-BP model
Published 2025-08-01“…LDA then clusters these words into structured risk factors (types, materials, defects) and five risk event categories, providing model inputs. The WOA-BP model, optimizing BP with the Whale Optimization Algorithm, achieves 95.71% accuracy—5.71% points higher than unoptimized BP and outperforming PSO-BP and GA-BP. …”
Get full text
Article -
3838
Mixed Balanced Truncation for Reducing the Complexity of Large-Scale Electrical and Electronic System Simulations
Published 2025-01-01“…This paper proposes the Mixed Balanced Truncation (MBT) algorithm, which combines the strengths of Balanced Truncation (BT) and Positive-Real Balanced Truncation (PRBT) while addressing their respective limitations. …”
Get full text
Article -
3839
Gaussian Process Regression with Soft Equality Constraints
Published 2025-01-01“…Additionally, we introduce an adaptive learning algorithm to optimize the selection of constraint locations to further enhance the flexibility of the method. …”
Get full text
Article -
3840
Multi-Armed Bandit Approaches for Location Planning with Dynamic Relief Supplies Allocation Under Disaster Uncertainty
Published 2024-12-01“…We introduce a multi-armed bandit algorithm, named the Geometric Greedy algorithm, to optimize transfer station planning while accounting for subsequent dynamic relief supply distribution and allocation in a stochastic environment. …”
Get full text
Article