Search alternatives:
improved » improve (Expand Search)
Showing 1,141 - 1,160 results of 1,750 for search 'improved (most OR root) optimization algorithm', query time: 0.25s Refine Results
  1. 1141

    Prediction of COD Degradation in Fenton Oxidation Treatment of Kitchen Anaerobic Wastewater Based on IPSO-BP Neural Network by Tianpeng Zhang, Pengfei Ji, Dayong Tian, Rui Xu

    Published 2025-01-01
    “…The Fenton oxidation process is used to treat kitchen anaerobic wastewater, and the effects of H2O2 dosage, Fe2+ dosage, reaction time and pH value on chemical oxygen demand (COD) degradation efficiency are explored. The improved particle swarm optimization (IPSO) algorithm is used to optimize the back propagation (BP) neural network, and a prediction model of COD degradation is established based on IPSO-BP neural network. …”
    Get full text
    Article
  2. 1142

    Research on subway settlement prediction based on the WTD-PSR combination and GSM-SVR model by Miren Rong, Chao Feng, Yinping Pang, Hailong Wang, Ying Yuan, Wensong Zhang, Lanxin Luo

    Published 2025-05-01
    “…Furthermore, Particle Swarm Optimization (PSO), Gray Wolf Optimization (GWO), Marine Predators Algorithm (MPA), and Whale Optimization Algorithm (WOA) are introduced to optimize the SVR model, and the prediction performance is compared with that of the Long Short-Term Memory (LSTM) model. …”
    Get full text
    Article
  3. 1143

    Machine learning analysis of pharmaceutical cocrystals solubility parameters in enhancing the drug properties for advanced pharmaceutical manufacturing by Tareq Nafea Alharby, Bader Huwaimel

    Published 2025-08-01
    “…Each model’s performance was assessed via measuring Root Mean Square Error (RMSE), R2, Mean Absolute Error (MAE), and Monte Carlo Cross-Validation (CV) scores using a Tabu Search method for optimization. …”
    Get full text
    Article
  4. 1144

    Maximum Power Exploitation of Photovoltaic System under Fast-Varying Solar Irradiation and Local Shading by Yi-Jui Chiu, Bi Li, Chin-Ling Chen, Shui-Yang Lien, Ding Chen, Ji-Ming Yi, Yung-Hui Shih

    Published 2022-01-01
    “…In addition, under fast-varying solar irradiation and local shading, the speed, ability, and stability of the improved MPPT system with the PF-MPPT algorithm when tracking the maximum power were 9.52, 1.32, and 1.84 times of the MPPT system with the P&O algorithm and 2.18, 1.41, and 2.00 times of the MPPT system with the particle swarm optimization algorithm, respectively.…”
    Get full text
    Article
  5. 1145

    2HR-Net VSLAM: Robust visual SLAM based on dual high-reliability feature matching in dynamic environments. by Wang Yang, Huang Chao, Zhang Yi, Tan Shuyi

    Published 2025-01-01
    “…Finally, the shared matching Siamese network with a unique dual-branch feature fusion strategy and similarity optimization algorithm is proposed to enhance the accuracy of feature matching. …”
    Get full text
    Article
  6. 1146

    A multi-dimensional data-driven ship roll prediction model based on VMD-PCA and IDBO-TCN-BiGRU-Attention by Huifeng Wang, Jianchuan Yin, Jianchuan Yin, Nini Wang, Lijun Wang, Lijun Wang

    Published 2025-06-01
    “…Finally,the improved dung beetle optimization (IDBO) algorithm is used to optimize the hyper-parameters of the model. …”
    Get full text
    Article
  7. 1147

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  8. 1148

    Optimising the Selection of Input Variables to Increase the Predicting Accuracy of Shear Strength for Deep Beams by Mohammed Majeed Hameed, Faidhalrahman Khaleel, Mohamed Khalid AlOmar, Siti Fatin Mohd Razali, Mohammed Abdulhakim AlSaadi

    Published 2022-01-01
    “…The feature-section algorithm based on the combination of genetic algorithm and information theory (GAITH) was used to select the most important input combinations and introduce them into the prediction models. …”
    Get full text
    Article
  9. 1149

    Multidisciplinary Collaborative Reliability Analysis of the Gear Reducer based on Inverse Reliability Strategy by Wang Liangliang, Peng Jinshuan, Shao Yiming

    Published 2015-01-01
    “…The IRS- GA- CO,which not only lifted the coupling between all disciplines to improve the search most probable point,the burden of system- level optimizer also can be significantly reduced. …”
    Get full text
    Article
  10. 1150

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  11. 1151

    基于改进Kriging模型的主动学习可靠性分析方法 by 陈哲, 杨旭锋, 程鑫

    Published 2021-01-01
    “…,the differential evolution algorithm is introduced to explore the optimal parameter of Kriging model and improve the accuracy of Kriging prediction information.As a result,the training point in each iteration is guaranteed to be the global optimal one and the efficiency of ALK model is largely improved.…”
    Get full text
    Article
  12. 1152

    Adaptive Variational Modal Decomposition–Dual Attention Mechanism Parallel Residual Network: A Tool Lifetime Prediction Method Based on Adaptive Noise Reduction by Jing Kang, Taiyong Wang, Yi Li, Ye Wei, Yaomin Zhang, Ying Tian

    Published 2024-12-01
    “…The method first adapts the parameters of the variational modal noise reduction algorithm using an improved sparrow optimization algorithm, and then reconstructs the original vibration signal with noise reduction. …”
    Get full text
    Article
  13. 1153

    Classification-based point cloud denoising and 3D reconstruction of roadways by Denghong CHEN, Ning PANG, Wen NIE, Juqiang FENG, Jiliang KAN, Jinjing ZHANG

    Published 2025-05-01
    “…By integrating a mean value method, an improved density-based spatial clustering of applications with noise (DBSCAN) algorithm, and an improved bilateral filtering algorithm, this study constructed a technical framework for classification processing. …”
    Get full text
    Article
  14. 1154

    Research on Short-Term Load Forecasting of LSTM Regional Power Grid Based on Multi-Source Parameter Coupling by Bo Li, Yaohua Liao, Siyang Liu, Chao Liu, Zhensheng Wu

    Published 2025-01-01
    “…In order to further optimize the performance of the LSTM model, the IPSO algorithm, and linear difference decreasing inertia weight are introduced to improve the global optimization ability and convergence speed of the PSO algorithm and reduce the risk of local optimal solutions. …”
    Get full text
    Article
  15. 1155

    Green Energy Strategic Management for Service of Quality Composition in the Internet of Things Environment by Jianhao Gao

    Published 2020-01-01
    “…The simulation results reveal that MFO has good optimization effect in the abovementioned models, and the optimization effect of MFO is improved by 8% and 6% compared with the genetic algorithm and particle swarm optimization, so as to realize the green energy strategic management of QoS composition in the environment of IoT.…”
    Get full text
    Article
  16. 1156

    Intelligent Cyber-Attack Detection in IoT Networks Using IDAOA-Based Wrapper Feature Selection by Mohammed Abdullah, Ryna Svyd

    Published 2025-06-01
    “…This study presents an innovative framework that integrates the Improved Dynamic Arithmetic Optimization Algorithm (IDAOA) with a Bagging technique to enhance the performance of intelligent cyber intrusion detection systems. …”
    Get full text
    Article
  17. 1157

    SIC-Free Based Indoor Two-User NOMA-VLCP System by Jianli Jin, Qianlong Shang, Jianping Wang, Huimin Lu, Danyang Chen, Dongmei Yang

    Published 2024-11-01
    “…The particle swarm optimization (PSO) algorithm is employed to construct a joint optimization function that optimizes the power allocation factor of the two users and the roll-off coefficient of the square-root-raised-cosine(SRRC) filter. …”
    Get full text
    Article
  18. 1158

    An integrated IKOA-CNN-BiGRU-Attention framework with SHAP explainability for high-precision debris flow hazard prediction in the Nujiang river basin, China. by Hao Yang, Tianlong Wang, Nikita Igorevich Fomin, Shuoting Xiao, Liang Liu

    Published 2025-01-01
    “…This study proposes an explainable deep learning framework, the Improved Kepler Optimization Algorithm-Convolutional Neural Network-Bidirectional Gated Recurrent Unit-Attention (IKOA-CNN-BiGRU-Attention) model, for precise debris flow hazard prediction in the Yunnan section of the Nujiang River Basin, China. …”
    Get full text
    Article
  19. 1159

    Intelligent library shelf management system for open-access environments: A CNN-based approach with enhanced image recognition and disorder detection by Xueqi Zhang

    Published 2025-12-01
    “…The new system adopts an optimized convolutional kernel design to improve the accuracy of feature extraction. …”
    Get full text
    Article
  20. 1160