Search alternatives:
post » most (Expand Search)
Showing 201 - 220 results of 768 for search 'improve (root OR post) optimization algorithm', query time: 0.20s Refine Results
  1. 201
  2. 202
  3. 203

    Chiller power consumption forecasting for commercial building based on hybrid convolution neural networks-long short-term memory model with barnacles mating optimizer by Mohd Herwan Sulaiman, Zuriani Mustaffa

    Published 2025-07-01
    “…Results demonstrate that the CNN-LSTM-BMO achieves superior performance with the lowest Root Mean Square Error (RMSE) of 0.5523 and highest R² value of 0.9435, showing statistically significant improvements over other optimization methods as confirmed by paired t-tests (P < 0.05). …”
    Get full text
    Article
  4. 204

    Application of HHO-CNN-LSTM-based CMAQ correction model in air quality forecasting in Shanghai by ZHENG Xinnan, LIN Kaiyan, WANG Zijing, SONG Yuanbo, SHI Yang, LU Hanyue, ZHANG Yalei, SHEN Zheng*

    Published 2023-12-01
    “…Accordingly, a correction model, which combines convolutional neural network (CNN) and long-short term memory neural network (LSTM) and optimized by harris hawks optimization algorithm (HHO) was established to enhance the accuracy of CMAQ model's prediction results for six air pollutants (SO_2, NO_2, PM_10, PM_2.5, O_3 and CO). …”
    Get full text
    Article
  5. 205
  6. 206
  7. 207

    Dynamic Sharding and Monte Carlo for Post-Quantum Blockchain Resilience by Dahhak Hajar, Nadia Afifi, Imane Hilal

    Published 2025-04-01
    “…Previous research also found that post-quantum blockchains, despite their improved cryptographic algorithms, are still vulnerable to DDoS attacks, emphasizing the need for more resilient architectural solutions. …”
    Get full text
    Article
  8. 208

    Hardware implementation of RSA encryption algorithm based on pipeline by Yang Longfei, Lu Shi, Peng Kuang

    Published 2024-01-01
    “…To address the high cost of implementing long-bits RSA encryption algorithms in hardware, improvements have been made to the traditional radix-4 Montgomery algorithm. …”
    Get full text
    Article
  9. 209
  10. 210
  11. 211

    Multi-objective optimization of HESS control for optimal frequency regulation in a power system with RE penetration by Ousama M.T. Ajami, Rodney H.G. Tan, Mithulan Nadarajah, Farah Adilah Jamaludin, Adlan Bagus Pradana

    Published 2024-12-01
    “…The findings indicate that the Independently Optimized Virtual Synchronous Generator HESS (IO VSG-HESS) achieves the best settling time post-contingency but offers the least improvement in frequency nadir with an average of 0.31 %. …”
    Get full text
    Article
  12. 212

    Timing synchronization algorithm based on clock skew estimation for WSN by Yi SUN, Lu-kun ZENG, Xin WU, Jun LU, Yue SUN

    Published 2015-09-01
    “…In order to solve the problem of poor synchronization stability on classical synchronization algorithm,high overhead on joint clock offset and skew correction synchronization algorithm in wireless sensor network,a timing syn-chronization algorithm based on clock skew estimation for WSN (CSMS) was proposed.The algorithm adopted low-overhead clock offset and skew estimation method to improve the synchronization precision and stability of paired node.At the same time of guaranteeing the stability and accuracy,it realized synchronization with the root node and the neighbors,and optimized synchronization overhead by using the combination of hierarchical network structure and radio listening.The experimental results show that the CSMS algorithm balances energy consumption,accuracy and stability of synchronization.…”
    Get full text
    Article
  13. 213

    Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution by Don Roosan, Rubayat Khan, Saif Nirzhor, Fahmida Hai

    Published 2025-05-01
    “…Context The study proposes and evaluates a novel cybersecurity architecture for telehealth, resilient against future quantum computing cyber threats. By integrating Post-Quantum Cryptography (PQC) with Quantum Key Distribution (QKD) and privacy-preserving mechanisms, data confidentiality and immutability for patient records in a post-quantum era are ensured. …”
    Get full text
    Article
  14. 214
  15. 215

    Advances in Digital Signature Algorithms: Performance, Security and Future Prospects by Lyu Shuhan

    Published 2025-01-01
    “…The results show that while optimizations improve computational efficiency, challenges persist, especially with potential quantum threats that could undermine these algorithms' security. …”
    Get full text
    Article
  16. 216
  17. 217
  18. 218

    Research on Control Method of Electron Accelerator Based on Simulink Simulation by YUE Hongwei1, LI Zhongping2, 3, ZHOU Youwei2, CAO Shuchun2, 3, REN Jieru1, ZHANG Zimin2, 3, , ZHAO Yongtao1

    Published 2025-01-01
    “…The fuzzy neural network PID algorithm improves these indicators more significantly, the stabilization time is reduced by 77.9%, the overshoot is reduced by 79.6%, and the post-disturbance recovery time is reduced by 87.1%. …”
    Article
  19. 219

    Anomaly Detection and Root Cause Analysis for Energy Consumption of Medium and Heavy Plate: A Novel Method Based on Bayesian Neural Network with Adam Variational Inference by Qiang Guo, Fenghe Li, Hengwen Liu, Jin Guo

    Published 2025-01-01
    “…Anomaly detection and root cause analysis of energy consumption not only optimize energy use and improve equipment reliability but also contribute to green and low-carbon development. …”
    Get full text
    Article
  20. 220

    The performance evaluation of chaotic maps in estimating the shape parameters of radial basis functions to solve partial differential equations by Javad Alikhani Koupaei, Mohammad Javad Ebadi, Majid Iran Pour

    Published 2024-06-01
    “…Purpose: This study aims to investigate the potential of chaotic optimization algorithms in improving performance compared to other optimization methods, focusing on determining the appropriate shape parameter of radial basis functions for solving partial differential equations.Methodology: In this research, a two-stage process is employed where the Kansa method, based on meshless local techniques, is combined with the FCW method. …”
    Get full text
    Article