-
681
An improved bistable stochastic resonance method and its application in early bearing fault diagnosis
Published 2025-07-01“…Additionally, the cuckoo search (CS) algorithm is used to optimize the potential function parameters, enhancing fault diagnosis performance. …”
Get full text
Article -
682
Radial Basis Function Coupling with Metaheuristic Algorithms for Estimating the Compressive Strength and Slump of High-Performance Concrete
Published 2024-12-01“…The contribution in this paper proposes the following: the radial basis function (RBF) model will be enhanced by using two optimization algorithms, namely Horse Herd Optimization (HHO) and Wild Geese Algorithm (WGA). …”
Get full text
Article -
683
Acute severe ulcerative colitis: using JAK-STAT inhibitors for improved clinical outcomes
Published 2024-11-01“…Here we discuss methods to optimize the dosing of IFX to maximize its efficacy, while exploring recent work done on the safety and efficacy of JAK-STAT inhibitors as a salvage therapy, therefore suggesting a novel treatment algorithm to improve clinical outcomes in medically managed ASUC patients.…”
Get full text
Article -
684
A location-constrained crowdsensing task allocation method for improving user satisfaction
Published 2019-10-01Get full text
Article -
685
Enhancing LoRaWAN Performance Using Boosting Machine Learning Algorithms Under Environmental Variations
Published 2025-06-01“…Bayesian Optimization was applied to fine-tune hyperparameters to improve model accuracy. …”
Get full text
Article -
686
Binary program taint analysis optimization method based on function summary
Published 2023-04-01“…Taint analysis is a popular software analysis method, which has been widely used in the field of information security.Most of the existing binary program dynamic taint analysis frameworks use instruction-level instrumentation analysis methods, which usually generate huge performance overhead and reduce the program execution efficiency by several times or even dozens of times.This limits taint analysis technology’s wide usage in complex malicious samples and commercial software analysis.An optimization method of taint analysis based on function summary was proposed, to improve the efficiency of taint analysis, reduce the performance loss caused by instruction-level instrumentation analysis, and make taint analysis to be more widely used in software analysis.The taint analysis method based on function summary used function taint propagation rules instead of instruction taint propagation rules to reduce the number of data stream propagation analysis and effectively improve the efficiency of taint analysis.For function summary, the definition of function summary was proposed.And the summary generation algorithms of different function structures were studied.Inside the function, a path-sensitive analysis method was designed for acyclic structures.For cyclic structures, a finite iteration method was designed.Moreover, the two analysis methods were combined to solve the function summary generation of mixed structure functions.Based on this research, a general taint analysis framework called FSTaint was designed and implemented, consisting of a function summary generation module, a data flow recording module, and a taint analysis module.The efficiency of FSTaint was evaluated in the analysis of real APT malicious samples, where the taint analysis efficiency of FSTaint was found to be 7.75 times that of libdft, and the analysis efficiency was higher.In terms of accuracy, FSTaint has more accurate and complete propagation rules than libdft.…”
Get full text
Article -
687
Optimization of microwave components using machine learning and rapid sensitivity analysis
Published 2024-12-01“…On the other hand, the most widely used nature-inspired algorithms require large numbers of system simulations to yield a satisfactory design. …”
Get full text
Article -
688
Robust Adaptive Path Tracking Control Scheme for Safe Autonomous Driving via Predicted Interval Algorithm
Published 2022-01-01Get full text
Article -
689
Selective opposition based constrained barnacle mating optimization: Theory and applications
Published 2024-12-01“…In addition to increasing efficiency by cutting down on wasted time spent exploring, this also increases the likelihood of stumbling onto optimal solutions. After that, it is put through its paces in a real-world case study, where it proves to be superior to the most cutting-edge algorithms available.…”
Get full text
Article -
690
Courier Assignment and Routing Problem Algorithm in Online Food Delivery System with Multi-Customer Delivery Patterns
Published 2025-03-01“…After processing and analyzing the numerical data, the study identified the most effective scenario that led to improved delivery times and benefits for couriers, enabling them to manage more orders and achieve faster delivery compared to existing algorithms. …”
Get full text
Article -
691
Smallest-Small-World Cellular Harmony Search for Optimization of Unconstrained Benchmark Problems
Published 2013-01-01“…Harmony search has successfully been applied to a wide variety of practical optimization problems. Most of the previous researches have sought to improve the performance of the HS algorithm by changing the pitch adjusting rate and harmony memory considering rate. …”
Get full text
Article -
692
Machine Learning Innovations for Improving Mineral Recovery and Processing: A Comprehensive Review*
Published 2024-12-01Get full text
Article -
693
Predicting Irrigation Water Quality Indices Based on Data-Driven Algorithms: Case Study in Semiarid Environment
Published 2022-01-01“…As a result, machine learning algorithms can improve irrigation water quality characteristics, which is critical for farmers and crop management in various irrigation procedures. …”
Get full text
Article -
694
Application of Machine Learning for Bulbous Bow Optimization Design and Ship Resistance Prediction
Published 2025-03-01“…Then, a convergence factor is introduced to balance the global and local search abilities of the whale algorithm to improve the convergence speed. The sample space is then iteratively searched using the improved whale algorithm. …”
Get full text
Article -
695
Dynamically Dimensioned Search Grey Wolf Optimizer Based on Positional Interaction Information
Published 2019-01-01“…The comparison results for the 23 benchmark functions show that the proposed DGWO algorithm performs significantly better than the GWO and its improved variant for most benchmarks. …”
Get full text
Article -
696
Improved Asphalt Pavement Crack Detection Model Based on Shuffle Attention and Feature Fusion
Published 2025-01-01“…However, traditional methods for crack detection often suffer from low efficiency and limited accuracy, necessitating improvements in the accuracy of existing crack detection algorithms. …”
Get full text
Article -
697
A Wi-Fi RSS-RTT Indoor Positioning Model Based on Dynamic Model Switching Algorithm
Published 2024-01-01“…However, their performance varies significantly across different indoor environments, making it challenging to identify the most suitable system for all scenarios. To address this challenge, we propose an algorithm that dynamically selects the most optimal Wi-Fi positioning model for each location. …”
Get full text
Article -
698
Precision Measurement and Feature Selection in Medical Diagnostics using Hybrid Genetic Algorithm and Support Vector Machine
Published 2025-07-01“…BoM is then used to select the optimal classification model from a set of candidates, to further improve the accuracy of diagnosis. …”
Get full text
Article -
699
Research on Quality Anomaly Recognition Method Based on Optimized Probabilistic Neural Network
Published 2020-01-01“…In order to eliminate the defect of experience value, the key parameter of PNN was optimized by the improved (SGA) single-target optimization genetic algorithm, which made PNN achieve a higher rate of recognition accuracy than PNN optimized by standard genetic algorithm. …”
Get full text
Article -
700
Kinematic Constrained RRT Algorithm with Post Waypoint Shift for the Shortest Path Planning of Wheeled Mobile Robots
Published 2024-10-01“…Once the distance between the new node and the target is within a certain threshold, the tree growth stops and a target connection based on minimum turning radius arc is proposed to generate an initial complete random path. The most significant difference from traditional RRT-based methods is that the proposed method optimizes the path based on Dubins curves through a post waypoint shift after a random path is generated, rather than through parent node selection and rewiring during the exploring tree growth. …”
Get full text
Article