Showing 2,301 - 2,320 results of 13,618 for search 'also algorithm', query time: 0.16s Refine Results
  1. 2301

    Filling-well: An effective technique to handle incomplete well-log data for lithology classification using machine learning algorithms by Sherly Ardhya Garini, Ary Mazharuddin Shiddiqi, Widya Utama, Alif Nurdien Fitrah Insani

    Published 2025-06-01
    “…This study applied three algorithms, extreme gradient boosting (XGBoost), K-nearest neighbours (KNN), and the artificial neural network (ANN), to handle missing values in well-log datasets, particularly datasets with extreme missing data (30 %). …”
    Get full text
    Article
  2. 2302

    Inverse design of high-strength medium-Mn steel using a machine learning-aided genetic algorithm approach by Jin-Young Lee, Seung-Hyun Kim, Hyun-Bin Jeong, KeunWon Lee, KiSub Cho, Young-Kook Lee

    Published 2024-11-01
    “…To develop medium-Mn steels with an ultimate tensile strength (UTS) exceeding 2 GPa and excellent ductility, we created a highly accurate UTS prediction machine learning (ML) model using a boosted decision tree model and 1520 dataset of tensile properties of medium-Mn steels with micro-alloying elements. We also optimized the hyper-parameters of a genetic algorithm (GA) using the Shannon diversity index to enhance search efficiency while retaining diversity. …”
    Get full text
    Article
  3. 2303

    Reliability assessment of integrated energy systems during wildfire disasters: Application of an iterative algorithm with impact increment state enumeration by Baohong Li, Changle Liu, Yue Yin, Qin Jiang, Yingmin Zhang, Tianqi Liu

    Published 2025-06-01
    “…The increasing system scale has also led to challenges in the enumeration calculation of reliability assessment. …”
    Get full text
    Article
  4. 2304

    Network Security Situational Awareness Based on Improved Particle Swarm Algorithm and Bidirectional Long Short-Term Memory Modeling by Peng Zheng, Yun Cheng, Wei Zhu, Bo Liu, Shuhong Liu, Shijie Wang, Jinyin Bai

    Published 2025-02-01
    “…With the continuous development of information technology, network security risks are also rising, and the ability to quickly perceive network threats has become an important prerequisite and an important means to cope with network risks. …”
    Get full text
    Article
  5. 2305
  6. 2306

    Evaluating machine leaning algorithms for accuracy, stability, and among-predictors discriminability in modeling species-richness across ten datasets by Yong Cao, Tyler E. Schartel, David C. Houghton, Jared Ross, Dana M. Infante

    Published 2025-12-01
    “…Considering all criteria, CIF, XGB, and BRT ranked similarly high, followed by RF and Lasso. The top three models also showed similar predictor rankings, while RF and Lasso differed. …”
    Get full text
    Article
  7. 2307

    Public security patrol path planning recommendation method based on wolf-pack optimization algorithm using DAF and BRS by Dongxing Wang, Gaomin Zhang, Fangbo Wu, Zhiyang Huang, Yiping Chen

    Published 2025-06-01
    “…To address these shortcomings, this paper proposes a public security patrol path planning recommendation method based on an improved wolf-pack optimization algorithm (S3PRM-DAF-BRS-CWOA). Firstly, an optimization objective function regarding the public security patrol path planning (S3P-Function) was abstracted from the actual situation; Moreover, this paper proposed an improved wolf-pack optimization algorithm named DAF-BRS-CWOA using Dynamic-Adjustment-Factor(DAF) and Balanced-Raid-Strategy (BRS), and DAF devoted to adjust the overall wolf-pack running strategy by dynamically adjusting the number of airdropped wolves during the stage of Summon-Raid while BRS with symmetric property was to improve both the algorithm’s global exploration as well as the local development capabilities by increasing the number of checking locations, that means not only checking the reverse position of the current wolf, but also the positions generated according to certain rules between the reverse position of the current wolf and the current optimal wolf during the stage of Summon-Raid; Finally, DAF-BRS-CWOA was adopted to optimize S3P-Function, forming a public security patrol path planning recommendation method based on DAF-BRS-CWOA (S3PRM-DAF-BRS-CWOA). 30 independent numerical experiments were conducted on 20 public classical datasets by DAF-BRS-CWOA compared with GA, PSO, WDX-WPOA. …”
    Get full text
    Article
  8. 2308

    OptiSGD-DPWGAN: Integrating Metaheuristic Algorithms and Differential Privacy to Improve Privacy-Utility Trade-Off in Generative Models by Alshaymaa Ahmed Mohamed, Yasmine N. M. Saleh, Ayman A. Abdel-Hamid

    Published 2024-01-01
    “…In this paper, the OptiSGD-DPWGAN model is proposed, that incorporates metaheuristic algorithms and differential privacy into the Wasserstein Generative Adversarial Network (WGAN) architecture to protect sensitive data during the training process. …”
    Get full text
    Article
  9. 2309

    FDIA Detection in Power Grid Based on Opposition-Based Whale Optimization Algorithm and Multi-layer Extreme Learning Machine by Lei XI, Yixiao WANG, Miao HE, Chen CHENG, Xilong TIAN

    Published 2024-09-01
    “…The proposed method not only extends the extreme learning machine into a multi-layer neural network to solve the problem of its limited ability of feature expression, but also introduces the whale optimization algorithm to optimize the number of neurons of the multi-layer extreme learning machine, and uses the opposition-based learning strategy to improve its convergence speed and detection accuracy so as to prevent the influence of randomly determining the number of neurons in each hidden layer on the generalization performance and location detection results of the detection method. …”
    Get full text
    Article
  10. 2310

    Compression and Cryptography Algorithms for 3D Remote Sensing Point Cloud Data Based on 3D-TCICM and ECC by Pengfei Yan, Shixian Nan, Xiufang Feng, Yongfei Wu, Jie Yang, Hao Zhang

    Published 2023-01-01
    “…Its initial values are generated by point cloud data and ECC algorithm. The sender and receiver only hold the public key or private key respectively, which further improves the security of the algorithm. …”
    Get full text
    Article
  11. 2311
  12. 2312

    A Near-Real-Time Imaging Algorithm for Focusing Spaceborne SAR Data in Multiple Modes Based on an Embedded GPU by Yunju Zhang, Mingyang Shang, Yini Lv, Xiaolan Qiu

    Published 2025-04-01
    “…To increase the size of the data that AGX Orin can process, the batch processing method was proposed to reduce peak memory usage during imaging, so that the limited memory could be better utilized. Meanwhile, this algorithm was also compatible with strip mode and TOPSAR (Terrain Observation by Progressive scans SAR) mode imaging. …”
    Get full text
    Article
  13. 2313

    Rotation Correction Algorithm Based on Polar Harmonic Fourier Moments and Optimization of Color Image Security Quantization Watermarking Scheme by Yuli Yang, Meiru Jiang, Xiufang Feng, Chenchen Lu, Yongle Chen, Shuang Zhou, Hao Zhang

    Published 2024-01-01
    “…Furthermore, the modulated chaotic system heightens the security of the watermark algorithm, the key space up to 10<sup>15</sup>, while also improving the quality of extracted watermarks.…”
    Get full text
    Article
  14. 2314

    DT-YOLO: An Improved Object Detection Algorithm for Key Components of Aircraft and Staff in Airport Scenes Based on YOLOv5 by Zhige He, Yuanqing He, Yang Lv

    Published 2025-03-01
    “…Based on YOLOv5, we propose an improved object detection algorithm, called DT-YOLO, to address these issues. …”
    Get full text
    Article
  15. 2315

    An Actor–Critic-Based Hyper-Heuristic Autonomous Task Planning Algorithm for Supporting Spacecraft Adaptive Space Scientific Exploration by Junwei Zhang, Liangqing Lyu

    Published 2025-04-01
    “…This study also designs an example application of the algorithm to a space engineering mission based on a collaborative sky and earth control system to demonstrate the usability of the algorithm. …”
    Get full text
    Article
  16. 2316

    Intelligent adjustment and energy consumption optimization of the fresh air system in hospital buildings based on Fuzzy Logic and Genetic Algorithms by Jing Peng, Maorui He, Mengting Fan

    Published 2024-12-01
    “…Meanwhile, it introduces the Genetic Algorithm (GA) and Fuzzy Logic Algorithm (FLA) to optimize the BPNN, thus enhancing the model’s global search ability and robustness. …”
    Get full text
    Article
  17. 2317

    LLD-YOLO: A Low-Light Object Detection Algorithm Based on Dynamic Weighted Fusion of Shallow and Deep Features by Wenhao Cai, Yajun Chen, Xiaoyang Qiu, Meiqi Niu, Jianying Li

    Published 2025-01-01
    “…Object detection in low-light scenarios has a wide range of applications, but existing algorithms often struggle to preserve the scarce low-level features in dark environments and exhibit limitations in localization accuracy for blurred edges and occluded objects, leading to suboptimal performance. …”
    Get full text
    Article
  18. 2318
  19. 2319

    Efficient Small Object Detection You Only Look Once: A Small Object Detection Algorithm for Aerial Images by Jie Luo, Zhicheng Liu, Yibo Wang, Ao Tang, Huahong Zuo, Ping Han

    Published 2024-11-01
    “…Moreover, existing object detection algorithms have a large number of parameters, posing a challenge for deployment on drones with limited hardware resources. …”
    Get full text
    Article
  20. 2320

    Distribution Network Reconfiguration Using Selective Firefly Algorithm and a Load Flow Analysis Criterion for Reducing the Search Space by Cassio Gerez, Lindenberg I. Silva, Edmarcio A. Belati, Alfeu J. Sguarezi Filho, Eduardo C. M. Costa

    Published 2019-01-01
    “…The algorithm is applied to the DNR, and all its implementation and adequacy to the problem studied are presented. …”
    Get full text
    Article