Search alternatives:
search » research (Expand Search)
Showing 1,161 - 1,180 results of 2,054 for search 'comparative search algorithm', query time: 0.14s Refine Results
  1. 1161

    A Chaotic Decomposition-Based Approach for Enhanced Multi-Objective Optimization by Javad Alikhani Koupaei, Mohammad Javad Ebadi

    Published 2025-02-01
    “…The results establish the proposed algorithm as a promising alternative for solving multi-objective optimization problems.…”
    Get full text
    Article
  2. 1162

    An Instantaneous Minimum Input Energy Control Strategy for Isolation Systems With Co-Varying Stiffness and Damping by Leilei Xia, Dehong Wu, Lu Chen, Jingjing Li

    Published 2025-01-01
    “…A bridge isolation system with MRE isolation bearings is controlled by proposed IMIE algorithm. The control effects under different seismic excitation are compared with passive control, Linear Quadratic Regulation (LQR) control and fuzzy control method. …”
    Get full text
    Article
  3. 1163

    Power Dispatch Stability Technology Based on Multi-Energy Complementary Alliances by Yiming Zhao, Chengjun Zhang, Changsheng Wan, Dong Du, Jing Huang, Weite Li

    Published 2025-06-01
    “…It aims to enhance dispatch stability and energy utilization through an innovative Distributed Overlapping Coalition Formation (DOCF) model. A distributed algorithm utilizing tabu search is proposed to solve the complex optimization problem in power resource allocation. …”
    Get full text
    Article
  4. 1164

    UAV Path Planners in Complex Environments: A Multi-Dimensional Perturbation Based on Artificial Bee Colony by Xuzhao Chai, Guanhao Zhou, Haoyu Wang, Ping Liu, Zhongyun Liu, Chao Li, Li Yan

    Published 2025-01-01
    “…Furthermore, path costs are independently modeled in the horizontal and vertical directions. The MDP-ABC algorithm has been validated in three scenarios with different complexity, and compared with other ten algorithms. …”
    Get full text
    Article
  5. 1165

    An improved lightweight tiny-person detection network based on YOLOv8: IYFVMNet by Fan Yang, Lihu Pan, Hongyan Cui, Linliang Zhang

    Published 2025-04-01
    “…This operation also reduces the computational cost by decreasing the amount of required feature map channels, while maintaining the effectiveness of the feature representation. (3) he Minimum Point Distance Intersection over Union loss function is employed to optimize bounding box detection during model training. (4) to construct the overall network structure, the Layer-wise Adaptive Momentum Pruning algorithm is used for thinning.ResultsExperiments on the TinyPerson dataset demonstrate that IYFVMNet achieves a 46.3% precision, 30% recall, 29.3% mAP50, and 11.8% mAP50-95.DiscussionThe model exhibits higher performance in terms of accuracy and efficiency when compared to other benchmark models, which demonstrates the effectiveness of the improved algorithm (e.g., YOLO-SGF, Guo-Net, TRC-YOLO) in small-object detection and provides a reference for future research.…”
    Get full text
    Article
  6. 1166

    A Q-Learning Crested Porcupine Optimizer for Adaptive UAV Path Planning by Jiandong Liu, Yuejun He, Bing Shen, Jing Wang, Penggang Wang, Guoqing Zhang, Xiang Zhuang, Ran Chen, Wei Luo

    Published 2025-06-01
    “…A refined position update mechanism is designed to prevent excessive step sizes and boundary violations, enhancing the algorithm’s global search capability. A B-spline-based trajectory smoothing method is also incorporated to improve the feasibility and smoothness of the planned paths. …”
    Get full text
    Article
  7. 1167

    Optimizing Multi-Echelon Delivery Routes for Perishable Goods with Time Constraints by Manqiong Sun, Yang Xu, Feng Xiao, Hao Ji, Bing Su, Fei Bu

    Published 2024-12-01
    “…The results demonstrate that the initial solutions obtained through the k-medoids clustering algorithm based on spatio-temporal distance improved the overall cost optimization by 1.85% and 4.74% compared to the other two algorithms. …”
    Get full text
    Article
  8. 1168

    Enhancing Arabic handwritten word recognition: a CNN-BiLSTM-CTC architecture with attention mechanism and adaptive augmentation by Bounour Imane, Ammour Alae, Khaissidi Ghizlane, Mostafa Mrabti

    Published 2025-05-01
    “…This work introduces an enhanced Arabic handwritten word recognition architecture that integrates the attention mechanism (AM) into an end-to-end framework combining convolutional neural networks (CNN), Bidirectional long short-term memory (BiLSTM), and connectionist temporal classification (CTC), while utilizing word beam search (WBS) for decoding. To address the issue of imbalanced data in the IFN/ENIT dataset, an adaptive data augmentation algorithm is proposed, focusing on underrepresented characters and words. …”
    Get full text
    Article
  9. 1169

    Evaluation of the Geomorphon Approach for Extracting Troughs in Polygonal Patterned Ground Across Different Permafrost Environments by Amin Wen, Tonghua Wu, Xiaofan Zhu, Jie Chen, Jianzong Shi, Peiqing Lou, Dong Wang, Xin Ma, Xiaodong Wu

    Published 2025-03-01
    “…We used the optimized DEM resolution, flatness threshold (<i>t</i>), and search radius (<i>L</i>) as input parameters for Geomorphon. …”
    Get full text
    Article
  10. 1170

    Artificial Intelligence overview for optimizing production scheduling in a picture framing company by Krupnik-Worek Jadwiga, Skoczypiec Sebastian, Habel Jacek

    Published 2025-01-01
    “…Scheduling quality was measured by minimizing makespan and comparing computational efficiency. The genetic algorithm outperformed complete search, scheduling 70 orders on 10 machines in just over 500 ms, significantly reducing computational time. …”
    Get full text
    Article
  11. 1171

    Hybrid blowfish cryptography with elliptic curve Diffie-Hellman key exchange protocol for enhancing data security and performance by K. Vignesh Saravanan, G. Sakthi Priya

    Published 2025-05-01
    “…The data remains secure and accessible even in the event of a server failure. The hybrid algorithm searches for the keywords in the encrypted dataset using an algorithm that combines the strengths of both Blowfish and AES encryption techniques. …”
    Get full text
    Article
  12. 1172

    Integrated optimization model for production and equipment dispatching in underground mines by LI Guo-qing, HOU Jie, HU Nai-lian

    Published 2018-09-01
    “…The best result of mining sequence and equipment dispatching was obtained by an improved genetic algorithm which searches the feasible solutions through primary-secondary two-step searching method. …”
    Get full text
    Article
  13. 1173
  14. 1174

    Comparative reinfection rate of one-stage versus two-stage revision in the management of periprosthetic joint infection following total hip arthroplasty: a meta-analysis by Yueying Qin, Zeshou Liu, Liwen Li, Yuxing Yang, Xiaomeng Huang, Weiming Liang, Longbao Lin

    Published 2024-12-01
    “…Methods A comprehensive search was performed in four databases (PubMed, Embase, Web of Science, and Cochrane Library) to locate articles that assessed the reinfection rate of one-stage revision compared to two-stage revision. …”
    Get full text
    Article
  15. 1175

    Energy-Efficient Coverage Path Planning for a Reconfigurable Robot by W. K. R. Sachinthana, I. D. Wijegunawardana, S. M. Bhagya P. Samarakoon, M. A. Viraj J. Muthugala, Mohan Rajesh Elara

    Published 2025-01-01
    “…The A* path planner, modified with new parameters to facilitate search and consider reconfiguration requirements, is proposed for inter-cluster movements. …”
    Get full text
    Article
  16. 1176

    Mixed Multi-Strategy Improved Aquila Optimizer and Its Application in Path Planning by Tianyue Bao, Jiaxin Zhao, Yanchang Liu, Xusheng Guo, Tianshuo Chen

    Published 2024-12-01
    “…Key enhancements include the integration of Bernoulli chaotic mapping to improve initial population diversity, a spiral stepping strategy to boost search precision and diversity, and a “stealing” mechanism from the Dung Beetle Optimization algorithm to enhance global search capabilities and convergence. …”
    Get full text
    Article
  17. 1177

    IWOA-LSTM based intrinsic structural identification of steel fiber concrete by Ping Li, Jie Feng, Shiwei Duan

    Published 2025-07-01
    “…The supremacy of the IWOA has been demonstrated by comparing IWOA with WOA, Crown Porcupine Optimisation Algorithm (CPO), Butterfly Optimisation Algorithm (BOA) and Grey Wolf Optimisation Algorithm (GWO) in terms of optimisation search. …”
    Get full text
    Article
  18. 1178

    Capacity and Coverage Dimensioning for 5G Standalone Mixed-Cell Architecture: An Impact of Using Existing 4G Infrastructure by Naba Raj Khatiwoda, Babu Ram Dawadi, Sashidhar Ram Joshi

    Published 2024-11-01
    “…We used metaheuristic approaches such as Grey Wolf Optimization (GWO), Sparrow Search Algorithm (SSA), Whale Optimization Algorithm (WOA), Marine Predator Algorithm (MPA), Particle Swarm Optimization (PSO), and Ant Lion Optimization (ALO) for optimizing the locations of remote radio units. …”
    Get full text
    Article
  19. 1179
  20. 1180

    Optimization of Unmanned Excavator Operation Trajectory Based on Improved Particle Swarm Optimization by Tingting Wang, Xiaohui He, Yunkang Zhou, Faming Shao

    Published 2025-05-01
    “…To verify the effectiveness of the improved PSO–SA algorithm, this study compares it with the standard PSO algorithm, the standard PSO–SA algorithm, and the MPSO algorithm. …”
    Get full text
    Article