Search alternatives:
search » research (Expand Search)
Showing 341 - 360 results of 2,054 for search 'comparative search algorithm', query time: 0.16s Refine Results
  1. 341

    Heuristics Algorithms for a Heterogeneous Fleets VRP with Excessive Demand for the Vehicle at the Pickup Points, and the Longest Traveling Time Constraint: A Case Study in Prasitsu... by Sasitorn Kaewman, Raknoi Akararungruangkul

    Published 2018-08-01
    “…We developed two metaheuristics—a differential evolution (DE) algorithm and an adaptive large neighborhood search (ALNS)—to solve the problem. …”
    Get full text
    Article
  2. 342

    An efficient gravitational search decision forest approach for fingerprint recognition by Mahesh Kumar, Devender Kumar

    Published 2023-03-01
    “…The current work proposes an efficient Gravitational Search Decision Forest (GSDF) method, which is a combination of the gravitational search algorithm (GSA) and the random forest (RF) method. …”
    Get full text
    Article
  3. 343

    Research on selective trust-path search and aggregation in distributed environment by Yan-lin QIN, Xiao-ping WU, Jian-xin GAO

    Published 2012-09-01
    “…Current trust models based on reputation had some disadvantages in characterizing recommendation credibility and dealing with Trust-Path Search and aggregation.To solve these problems,an updating algorithm for recommendation credibility was proposed considering factors of time decay,recommendation inosculation and success transaction rate.Furthermore,a selective search-algorithm for trust-path in distributed environment was presented.The algorithm uses recommendation credibility,evaluation similarity and trust-path length as its control parameters and can evade malicious nodes directly in the process of searching.It can also stop the search for unnecessary trust-paths and execute the search for paths containing valuable recommendation.Lastly,trust aggregation method was given by using an advanced combining algorithm in D-S theory of evidence.Simulation results show that compared with existing trust models,the proposed model is more robust on defending attacks of various malicious nodes.…”
    Get full text
    Article
  4. 344

    Research on selective trust-path search and aggregation in distributed environment by Yan-lin QIN, Xiao-ping WU, Jian-xin GAO

    Published 2012-09-01
    “…Current trust models based on reputation had some disadvantages in characterizing recommendation credibility and dealing with Trust-Path Search and aggregation.To solve these problems,an updating algorithm for recommendation credibility was proposed considering factors of time decay,recommendation inosculation and success transaction rate.Furthermore,a selective search-algorithm for trust-path in distributed environment was presented.The algorithm uses recommendation credibility,evaluation similarity and trust-path length as its control parameters and can evade malicious nodes directly in the process of searching.It can also stop the search for unnecessary trust-paths and execute the search for paths containing valuable recommendation.Lastly,trust aggregation method was given by using an advanced combining algorithm in D-S theory of evidence.Simulation results show that compared with existing trust models,the proposed model is more robust on defending attacks of various malicious nodes.…”
    Get full text
    Article
  5. 345

    Harmony Search Based Parameter Ensemble Adaptation for Differential Evolution by Rammohan Mallipeddi

    Published 2013-01-01
    “…In this paper, we propose a new parameter adaptation technique for DE based on ensemble approach and harmony search algorithm (HS). In the proposed method, an ensemble of parameters is randomly sampled which form the initial harmony memory. …”
    Get full text
    Article
  6. 346

    Passive Radar Source Localization Based on Cuckoo Search NVTDOA by Gang Niu, Jie Gao, Tai-hang Du

    Published 2020-01-01
    “…Secondly, the convergence solution of the NVTDOA localization equation is obtained by Cuckoo search algorithm; thus, passive radar source localization is realized. …”
    Get full text
    Article
  7. 347

    Using Anomaly Detection to Search for Technosignatures in Breakthrough Listen Observations by Snir Pardo, Dovi Poznanski, Steve Croft, Andrew P. V. Siemion, Matthew Lebofsky

    Published 2025-01-01
    “…We implement a machine learning algorithm to search for extraterrestrial technosignatures in radio observations of several hundred nearby stars, obtained with the Parkes and Green Bank Telescopes by the Breakthrough Listen collaboration. …”
    Get full text
    Article
  8. 348

    Research on optimal selection of runoff prediction models based on coupled machine learning methods by Xing Wei, Mengen Chen, Yulin Zhou, Jianhua Zou, Libo Ran, Ruibo Shi

    Published 2024-12-01
    “…Subsequently, these decomposition methods are coupled with optimization algorithms, including Whale Optimization Algorithm (WOA), Grasshopper Optimization Algorithm (GOA), and Sparrow Search Algorithm (SSA), to construct various hybrid prediction models. …”
    Get full text
    Article
  9. 349

    The Optimal Cost Design of Reinforced Concrete Beams Using an Artificial Neural Network—The Effectiveness of Cost-Optimized Training Data by Jaemin So, Seungjae Lee, Jonghyeok Seong, Donwoo Lee

    Published 2025-05-01
    “…This study presents a method for the automated design of reinforced concrete (RC) beam cross-sections using an artificial neural network (ANN) trained with cost-optimized data generated by the crow search algorithm (CSA). To effectively employ the CSA, recognized for its benefits in addressing engineering problems among metaheuristic algorithms, the design variables of the RC beam cross-section were mediated. …”
    Get full text
    Article
  10. 350

    Dual Feature-Based Intrusion Detection System for IoT Network Security by A. Biju, S. Wilfred Franklin

    Published 2025-03-01
    “…The proposed method utilizes the bald eagle search (BES) algorithm and butterfly optimization algorithm (BOA) to capture both flow and packet level features to enhance the accuracy of the intrusion detection process. …”
    Get full text
    Article
  11. 351

    A Hybrid Whale Optimization Approach for Fast-Convergence Global Optimization by Athanasios Koulianos, Antonios Litke, Nikolaos K. Papadakis

    Published 2025-06-01
    “…In this paper, we introduce the Levy Flight-enhanced Whale Optimization Algorithm with Tabu Search elements (LWOATS), an innovative hybrid optimization approach that enhances the standard Whale Optimization Algorithm (WOA) with advanced local search techniques and elite solution management to improve performance on global optimization problems. …”
    Get full text
    Article
  12. 352
  13. 353

    Prediction of Breakdown Voltage of Long Air Gaps Under Switching Impulse Voltage Based on the ISSA-XGBoost Model by Zisheng Zeng, Bin Song, Shaocheng Wu, Yongwen Li, Deyu Nie, Linong Wang

    Published 2025-04-01
    “…To address this issue, this paper proposes a novel prediction model based on the Improved Sparrow Search Algorithm-optimized XGBoost (ISSA-XGBoost). …”
    Get full text
    Article
  14. 354

    A structural health monitoring data reconstruction method based on VMD and SSA-optimized GRU model by Xiaoliang Jia, Guoyan Zhang, Zhiqiang Wang, Huacong Li, Jing Hu, Songlin Zhu, Caiwei Liu

    Published 2025-01-01
    “…To address this challenge, this study develops a method combining Variational Mode Decomposition (VMD) and Sparrow Search Algorithm (SSA)-optimized Gate Recurrent Unit (GRU) for recovering structural response data. …”
    Get full text
    Article
  15. 355

    Automated Search-Based Robustness Testing for Autonomous Vehicle Software by Kevin M. Betts, Mikel D. Petty

    Published 2016-01-01
    “…Two different search-based testing methods, genetic algorithms and surrogate-based optimization, were used to generate test cases for a simulated unmanned aerial vehicle attempting to fly through an entryway. …”
    Get full text
    Article
  16. 356

    A Local Dwarf Galaxy Search Using Machine Learning by Huanian Zhang, Guangping Ye, Rongyu Wu, Dennis Zaritsky

    Published 2025-01-01
    “…We introduce the spectrally confirmed training sample, discuss evaluation metrics, investigate features, compare different machine learning algorithms, and find that a seven-class neural network classification model is highly effective in separating the signal (local, low-mass galaxies) from various contaminants, reaching a precision of 95% and a recall of 76%. …”
    Get full text
    Article
  17. 357

    Integrating multiple slack bus operations and metaheuristic techniques for power flow optimization by Swaechchha Dahal, Gunne John Hegglid, Jonas Kristiansen, Bhupendra Bimal Chhetri, Sambeet Mishra, Thomas Øyvang

    Published 2025-05-01
    “…This paper introduces a comparative evaluation of three metaheuristic algorithms: particle swarm optimization (PSO), cuckoo search algorithm (CSA), and grey wolf optimization (GWO) within the MSO framework. …”
    Get full text
    Article
  18. 358

    Average Corrosion Rate Prediction Model for Buried Oil and Gas Pipelines Based on SSA-LightGBM by Weigang Fu, Haitao Wang, Kuankuan Zhang, Xia Wang, Kunlun Chen, Chunmei Sun, Zhengwei Wang, Liuyang Song, Niannian Wang

    Published 2025-01-01
    “…This study establishes an average corrosion rate prediction model using the Sparrow Search Algorithm-optimized Light Gradient Boosting Machine (SSA-LightGBM). …”
    Get full text
    Article
  19. 359

    Selecting Optimal Feature Set in High-Dimensional Data by Swarm Search by Simon Fong, Yan Zhuang, Rui Tang, Xin-She Yang, Suash Deb

    Published 2013-01-01
    “…The advantage of Swarm Search is its flexibility in integrating any classifier into its fitness function and plugging in any metaheuristic algorithm to facilitate heuristic search. …”
    Get full text
    Article
  20. 360

    Optimal Routing Between Clusters Based on Circular Search Method in WSN by Xiang Yu, Lei Liu, Kun Wu

    Published 2015-02-01
    “…The experimental results show that the performance of the multi-hops routing algorithm from the cluster head to the base station compared with LEACH protocol is higher in the balance of nodes' energy consumption and prolong the network lifetime.…”
    Get full text
    Article