-
1581
Some Aspects of Modern Distance Learning Technologies in the Field of Fire Safety
Published 2022-11-01“…The constant development of computer technologies leads to the improvement of the distance learning format, the search for new methodological solutions.Materials and methods. …”
Get full text
Article -
1582
Satellite-Derived Bathymetry Combined With Sentinel-2 and ICESat-2 Datasets Using Deep Learning
Published 2025-01-01“…Bathymetric inversion experiments were conducted using fused ICESat-2 and Sentinel-2 data, focusing on Coral Island and Dong Island in the South China Sea, as well as Midway Island and Oahu Island in the Pacific Ocean. Comparative experiments demonstrated that BOA significantly outperforms conventional random search by achieving near-optimal hyperparameter configurations with fewer evaluations, accelerating convergence and reducing computational costs. …”
Get full text
Article -
1583
Energy management system for PV-based distributed generators in AC microgrids using an adapted JAYA optimizer to minimize operational costs, energy losses, and CO2 emissions
Published 2025-03-01“…To solve the model, an adapted version of the JAYA optimization algorithm was implemented, and its performance was compared against four established methodologies: the Chu & Beasley Genetic Algorithm (CBGA), Particle Swarm Optimization (PSO), the Vortex Search Algorithm (VSA), and Ant Lion Optimization (ALO). …”
Get full text
Article -
1584
Multi-strategy hybrid adaptive dung beetle optimization for UAV photogrammetric 3D path planning under complex constraints
Published 2025-04-01“…To address premature convergence and enhance local search efficiency in comparison to traditional DBO methods, this study proposes MSDBO, a multi-strategy fusion algorithm. …”
Get full text
Article -
1585
Efficiency Simultaneous key Exchange-Cryptography Extraction from Public key in Fog-Cloud Federation-Based Secure Offloading for Automatic Weather Stations Observing Systems
Published 2023-03-01“…The simulation results of the proposed method against pervasive search attack show that the proposed method in the first scenario is 0.030141 seconds in the normal way and 1.241097 seconds in the parallel mode, and in the second scenario is, 5.112216 seconds in the normal manner and 6.724856 seconds in the parallel process compared to the ElGamal process against the attack. …”
Get full text
Article -
1586
Global miniaturization of broadband antennas by prescreening and machine learning
Published 2024-11-01“…Identifying truly minimum-size designs requires a global search approach, as the popular nature-inspired algorithms face challenges related to computational efficiency and the need for reliable full-wave electromagnetic (EM) simulation to evaluate device’s characteristics. …”
Get full text
Article -
1587
Use ATCCfinder to identify commercially available American Type Culture Collection strains based on sequence queries
Published 2025-08-01“…While NCBI-BLAST could be used to search for queries against GenBank, with results filtered for “ATCC” tags, search result quality varies and requires time-consuming sorting. …”
Get full text
Article -
1588
Methods for the Construction and Editing of an Efficient Control Network for the Photogrammetric Processing of Massive Planetary Remote Sensing Images
Published 2024-12-01“…To address these issues, we first proposed an efficient control network construction framework based on approximate orthoimage matching and hash quick search. Next, to effectively reduce the redundant control points in the control network and decrease the computation time required for bundle adjustment, we then proposed a control network-thinning algorithm based on a K-D tree fast search. …”
Get full text
Article -
1589
Study on multi-parameter optimization of seismic isolation bearings for continuous girder bridges considering interactions among key parameters
Published 2025-05-01“…On this basis, an adaptive particle swarm optimization (APSO) algorithm with dynamic inertia weights and learning factors is introduced to broaden the search space, expedite convergence, and reduce the likelihood of becoming trapped in local optima. …”
Get full text
Article -
1590
Fuzzy Computation Tree Temporal Logic with Quality Constraints and Its Model Checking
Published 2024-11-01“…Through the bounded-depth search of GPKS, a model-checking algorithm of QFCTL* on GPKS is presented. …”
Get full text
Article -
1591
Process parameter optimization for minimizing overcut in abrasive waterjet deep hole drilling of SS 316L
Published 2025-04-01“…Additionally, to mitigate the impact of overcut and improve the drilling quality necessary for diverse sectors such as automotive, biomedical, and oil and gas, a metaheuristic optimization method, specifically the Grasshopper Optimization Algorithm (GHO), has been utilized. Thereafter, the effectiveness of the suggested algorithm has been validated using quality measures, namely hyper-volume and spacing by comparing it to the approaches of whale optimization, harmony search, and multiverse optimization algorithms. …”
Get full text
Article -
1592
Automatic stitching method for spherical panoramic video
Published 2019-04-01“…Comparative tests were taken. Our research proves that our automatic stitching algorithm for a panoramic video performs better than the alternatives in terms of accuracy and time consumption.…”
Get full text
Article -
1593
Minimization of Resource Consumption with URLLC Constraints for Relay-Assisted IIoT
Published 2025-08-01“…At peak rates, the hop with superior channel conditions requires fewer resources. Compared with three baseline algorithms, the proposed algorithm achieves average resource savings of 21.40%, 14.03%, and 17.18%, respectively.…”
Get full text
Article -
1594
Optimizing Energy Consumption and Latency in IoT Through Edge Computing in Air–Ground Integrated Network With Deep Reinforcement Learning
Published 2025-01-01“…The performance of the proposed algorithm is compared to traditional algorithms, including the Whale Optimization Algorithm (WOA), Gradient Search with Barrier, and Bayesian Optimization (BO). …”
Get full text
Article -
1595
Online Meta-Recommendation of CUSUM Hyperparameters for Enhanced Drift Detection
Published 2025-04-01“…The results indicate that this framework preserves high accuracy while significantly reducing time requirements compared to Grid Search and Genetic Algorithm optimization.…”
Get full text
Article -
1596
Optimal Charging Current Protocol with Multi-Stage Constant Current Using Dandelion Optimizer for Time-Domain Modeled Lithium-Ion Batteries
Published 2024-12-01“…To verify the performance of the proposed method, various algorithms, including the constant current-constant voltage (CC-CV) technique, formula method (FM), particle swarm optimization (PSO), war strategy optimization (WSO), jellyfish search algorithm (JSA), grey wolf optimization (GWO), beluga whale optimization (BWO), levy flight distribution algorithm (LFDA), and African gorilla troops optimizer (AGTO), were introduced. …”
Get full text
Article -
1597
Research on a Visually Assisted Efficient Blind-Guiding System and an Autonomous Shopping Guidance Robot Arm Adapted to the Complex Environment of Farmers’ Markets
Published 2025-06-01“…This paper proposes the Radio-Frequency–Visual Tag Positioning and Automatic Detection (RFTPAD) algorithm to quickly build a high-precision navigation map. …”
Get full text
Article -
1598
Improved sequence-based localization applied in coal mine
Published 2016-11-01“…The results prove that the improved sequence-based localization algorithm provides comparable accuracy than sequence-based localization.…”
Get full text
Article -
1599
Communication between nodes in backscatter-assisted wireless powered communication network
Published 2021-06-01“…At present, there is almost no design on information transmission between the nodes in wireless powered communication network.The high-throughput information transmission between the nodes in backscatter assisted wireless powered communication network was studied.A scheme was proposed which consisted of backscattering/energy transmission phase and active communication phase.The maximum throughput was modeled as a convex optimization problem.Then, based on the relationship between the total backscatter communication duration and the threshold of node energy capture duration, the problem was decomposed into several sub problems that only need to optimize two backscatter durations.An efficient two-level golden section search algorithm was designed to solve the sub problems, and the optimal solution of the original problem was obtained from the optimal solutions of the sub problems.Simulation results show that, compared with pure active communication scheme and pure backscatter communication scheme, the proposed scheme can effectively improve the throughput.…”
Get full text
Article -
1600
Dung beetle optimizer based on mean fitness distance balance and multi-strategy fusion for solving practical engineering problems
Published 2025-07-01“…To comprehensively evaluate the optimizer performance of MMDBO, experiments were conducted on the IEEE CEC2017 and CEC2022 benchmark sets, comparing it with 13 other population-based optimizer algorithms. …”
Get full text
Article