Suggested Topics within your search.
Suggested Topics within your search.
-
1581
Optimization Design of the Two-Stage Reduction Micro-Drive Mechanism Based on Particle Swarm Algorithm
Published 2025-07-01“…Experimental methods were also employed to analyze its dynamic and kinematic properties. …”
Get full text
Article -
1582
Optimization of Relay Node Deployment in Wireless Sensor Communication Networks Based on IGA-RNDP Algorithm
Published 2025-01-01“…To achieve reasonable deployment of relay nodes, a relay node deployment algorithm on the basis of improved genetic algorithm is proposed. …”
Get full text
Article -
1583
Enterprise fission path optimization and dynamic capability construction based on the soft actor-critic algorithm
Published 2025-07-01“…Abstract This study aims to explore the enterprise fission path optimization strategy based on the Soft Actor-Critic (SAC) algorithm and analyze its impact on the parent company and the overall operational efficiency. …”
Get full text
Article -
1584
Classification of chest radiographs into healthy/pneumonia using Harris-Hawks Algorithm optimized deep-features
Published 2025-06-01“…Along with the traditional deep-features based classification using the SoftMax, this work also considered Harris-Hawks Algorithm (HHA) algorithm based features optimization and serial features integration to generate fused-features vector (FFV). …”
Get full text
Article -
1585
Research on the Construction of Crossborder e-Commerce Logistics Service System Based on Machine Learning Algorithms
Published 2022-01-01“…Based on machine learning algorithms, this paper designs a crossborder e-commerce logistics service system recommendation algorithm. …”
Get full text
Article -
1586
Implementation of Image Enhancement and Edge Detection Algorithm on Diabetic Retinopathy (DR) Image Using FPGA
Published 2023-01-01“…The process of detecting edges within DR images is also executed by Sobel edge detection algorithm. …”
Get full text
Article -
1587
A Review of UAV Path-Planning Algorithms and Obstacle Avoidance Methods for Remote Sensing Applications
Published 2024-10-01“…The paper classifies the algorithms into two main categories: (1) global and local path-planning approaches in single UAVs; and (2) multi-UAV path-planning methods. …”
Get full text
Article -
1588
A Review: The Application of Path Optimization Algorithms in Building Mechanical, Electrical, and Plumbing Pipe Design
Published 2025-06-01“…This review systematically integrates recent advancements in path optimization algorithms for the automated layout of mechanical, electrical, and plumbing (MEP) systems within complex building environments. …”
Get full text
Article -
1589
LSEWOA: An Enhanced Whale Optimization Algorithm with Multi-Strategy for Numerical and Engineering Design Optimization Problems
Published 2025-03-01“…The effectiveness of the proposed LSEWOA was evaluated using CEC2005, and the impact of each improvement strategy was analyzed. We also performed a quantitative analysis of LSEWOA and compare it with other state-of-the-art metaheuristic algorithms in 30/50/100 dimensions. …”
Get full text
Article -
1590
Heat transfer and simulated coronary circulation system optimization algorithms for real power loss reduction
Published 2021-06-01“…In this paper, the heat transfer optimization (HTO) algorithm and simulated coronary circulation system (SCCS) optimization algorithm has been designed for Real power loss reduction. …”
Get full text
Article -
1591
Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm
Published 2023-06-01“…The use of location-based service brings convenience to people’s daily lives, but it also raises concerns about users’ location privacy.In the k-nearest neighbor query problem, constructing K-anonymizing spatial regions is a method used to protects users’ location privacy, but it results in a large waste of communication overhead.The SpaceTwist scheme is an alternative method that uses an anchor point instead of the real location to complete the k-nearest neighbor query,which is simple to implement and has less waste of communication overhead.However,it cannot guarantee K-anonymous security, and the specific selection method of the anchor point is not provided.To address these shortcomings in SpaceTwist, some schemes calculate the user’s K-anonymity group by introducing a trusted anonymous server or using the way of user collaboration, and then enhance the end condition of the query algorithm to achieve K-anonymity security.Other schemes propose the anchor point optimization method based on the approximate distribution of interest points, which can further reduce the average communication overhead.A lightweight K-anonymity incremental nearest neighbor (LKINN) location privacy protection algorithm was proposed to improve SpaceTwist.LKINN used convex hull mathematical tool to calculate the key points of K-anonymity group, and proposed an anchor selection method based on it, achieving K-anonymity security with low computational and communication costs.LKINN was based on a hybrid location privacy protection architecture, making only semi-trusted security assumptions for all members of the system, which had lax security assumptions compared to some existing research schemes.Simulation results show that LKINN can prevent semi-trusted users from stealing the location privacy of normal users and has smaller query response time and communication overhead compare to some existing schemes.…”
Get full text
Article -
1592
A Comprehensive Review of AI Algorithms for Performance Prediction, Optimization, and Process Control in Desalination Systems
Published 2025-01-01“…In order to improve efficiency, AI algorithms are also used in desalination modelling to optimize system parameters and aid in process control. …”
Get full text
Article -
1593
IoT enabled health monitoring system using rider optimization algorithm and joint process estimation
Published 2025-07-01“…The proposed method also evaluated using PTB Diagnostic dataset signals. …”
Get full text
Article -
1594
Transformer Fault Diagnosis Based on Multi-Strategy Enhanced Dung Beetle Algorithm and Optimized SVM
Published 2024-12-01“…Second, improvements to the DBO algorithm are made by incorporating Chebyshev chaotic mapping, a golden sine strategy, and dynamic weight coefficients for position updates. …”
Get full text
Article -
1595
The Use of Machine Learning Algorithms for Water Quality Index Prediction in the Sai Gon River, Vietnam
Published 2025-05-01“…Generally, this study provides an analytical framework for simulating WQI based on parsimonious and accurate ML algorithms, which are conducive to water quality assessment and monitoring in developing nations. …”
Get full text
Article -
1596
Heuristic Algorithms for the Heterogeneous Vehicle Routing Problem With Time Windows, Customers Priority, Pickup and Delivery
Published 2025-01-01“…As for the second phase, both heuristics embrace a common Variable Neighborhood Search (VNS) algorithm that explores seven different neighborhoods to improve upon the initial solutions. …”
Get full text
Article -
1597
Algorithmic indexing in MEDLINE frequently overlooks important concepts and may compromise literature search results
Published 2025-01-01“…Indexing was performed by the Medical Text Indexer-Auto (MTIA) algorithm. The primary outcome measure is the number of records for which the MTIA algorithm assigned subject headings that represented the main concepts of the publication. …”
Get full text
Article -
1598
SVD-GoRank: Recommender System Algorithm Using SVD and Gower’s Ranking
Published 2025-01-01“…Apart from that, the SVD-GoRank algorithm can also have efficient running time.…”
Get full text
Article -
1599
Improved Algorithm for Vehicle Bottom Safety Detection Based on YOLOv8n: PSP-YOLO
Published 2024-12-01“…To address these issues and improve the real-time performance of under-vehicle safety inspection, the YOLOv8n object-detection algorithm was enhanced, resulting in the PSP-YOLO algorithm. …”
Get full text
Article -
1600
A Local Information Entropy-Based Point Cloud Simplification Algorithm for Hazardous Chemical Warehouses
Published 2024-12-01Get full text
Article