Showing 761 - 780 results of 7,873 for search 'comparative research algorithm', query time: 0.14s Refine Results
  1. 761
  2. 762
  3. 763
  4. 764

    Hybrid Swarm Intelligence and Human-Inspired Optimization for Urban Drone Path Planning by Yidao Ji, Qiqi Liu, Cheng Zhou, Zhiji Han, Wei Wu

    Published 2025-03-01
    “…To address the challenges of urban drone path planning, this paper proposes an innovative method that combines a path segmentation and prioritized update algorithm with a cubic B-spline curve algorithm. This method enhances both path optimality and smoothness, ensuring safe and efficient navigation in complex urban settings. …”
    Get full text
    Article
  5. 765

    A review: Multi-Objective Algorithm for Community Detection in Complex Social Networks by Mariwan Wahid Ahmed, Kamaran Faraj

    Published 2025-02-01
    “…Recently, research on multi-objective optimization algorithms for community detection in complex networks has grown considerably. …”
    Get full text
    Article
  6. 766

    Mechanical product design and manufacturing system based on CNN and server optimization algorithm by Tian Lei, Zhao Ance

    Published 2025-04-01
    “…The path and running time of the server optimization path algorithm have better performance. It can be seen that the research proposed methods have good performance and advantages in mechanical product design services and optimization, which can provide technical references and directions for the development of manufacturing service-oriented enterprises in cloud manufacturing mode.…”
    Get full text
    Article
  7. 767
  8. 768
  9. 769

    Review of Fault Detection and Diagnosis Methods in Power Plants: Algorithms, Architectures, and Trends by Camelia Adela Maican, Cristina Floriana Pană, Daniela Maria Pătrașcu-Pană, Virginia Maria Rădulescu

    Published 2025-06-01
    “…This review identifies critical research gaps—including the underuse of hybrid models, lack of benchmark datasets, and limited integration between detection and control layers—and offers concrete recommendations for future research. …”
    Get full text
    Article
  10. 770

    Data-driven network intrusion detection using optimized machine learning algorithms by Dauda Adeite Adenusi, Oladosu Oyebisi Oladimeji, Theopilus Adekunle Oyekola, Korede Solomon Olagunju

    Published 2025-09-01
    “…This study presents a comprehensive evaluation of machine learning approaches for network intrusion detection, comparing the performance of Decision Trees (DT), Random Forest (RF), K-Nearest Neighbors (K-NN), Gradient Boosting (GB), and Logistic Regression (LR) algorithms. …”
    Get full text
    Article
  11. 771

    Queueing modeling and optimization of hybrid electric vehicle infrastructures using evolutionary algorithms by Shreekant Varshney, Manthan Shah, Bhasuru Abhinaya Srinivas, Mayank Gupta, Kaibalya Prasad Panda

    Published 2025-03-01
    “…The novelty of the proposed research is to formulate the cost optimization problem and demonstrate optimal converging outcomes through an in-depth comparative investigation of multiple evolutionary algorithms, including the particle swarm optimization (PSO), cuckoo search (CS), grey wolf (GW), and honey badger (HB) optimizers. …”
    Get full text
    Article
  12. 772
  13. 773

    The sovereignty-internationalism paradox in AI governance: digital federalism and global algorithmic control by Artur Ishkhanyan

    Published 2025-06-01
    “…AI systems simultaneously reinforce national sovereignty while demanding global cooperation, posing a fundamental challenge to governance frameworks. Through a comparative analysis of the European Union’s AI Act and China’s Social Credit System, this research explores how AI governance can either enable state authority or necessitate transnational coordination. …”
    Get full text
    Article
  14. 774
  15. 775
  16. 776

    Evaluation of the Effectiveness of Lightweight Encryption Algorithms on Data Performance and Security on IoT Devices by Damar Indrajati, Wahid Miftahul Ashari

    Published 2025-06-01
    “…Based on these results, AES128 is suitable for high-capacity IoT platforms prioritizing strong encryption, while SIMON and SPECK are preferable for resource-constrained devices, with XTEA serving as a balanced alternative. This research contributes a comparative framework to guide the selection of encryption algorithms for IoT systems, ensuring an optimal trade-off between security and operational efficiency.…”
    Get full text
    Article
  17. 777

    Infrared spectrum target recognition and positioning technology based on image segmentation algorithm by Runming He, Yu Wang, Zhenzhong Yan, Xiaoli Lu

    Published 2025-07-01
    “…The existing image segmentation and recognition algorithms have low accuracy and large positioning errors when processing infrared images. …”
    Get full text
    Article
  18. 778
  19. 779
  20. 780

    A Comparative Study of Rhythmic Complexity Measures in Music Performance by Cihan Yaygın, Ozan Baysal, Yavuz Buruk, Barış Bozkurt

    Published 2024-12-01
    “…The research focuses on five rhythmic complexity measures: Lempel-Ziv, Keith, Tanguiane, Weighted Note-to-Beat Distance (WNBD), and Pressing. …”
    Get full text
    Article