-
861
Mathematical model of on-demand route formation for public transport based on individual passenger requests in low-density population area
Published 2025-01-01“…A mathematical model was developed that accounts for the specifics of populated areas with low population density, including uneven distribution of demand, large distances between populated areas, and limited financial resources. Various route optimization algorithms were investigated, and the most suitable method was selected for solving the stated problem. …”
Get full text
Article -
862
Enhanced NDVI prediction accuracy in complex geographic regions by integrating machine learning and climate data—a case study of Southwest basin
Published 2025-05-01“…The LSKRX model demonstrated significant improvements in prediction accuracy compared to single-model approaches, with the most notable enhancement in BIAS. …”
Get full text
Article -
863
A systematic review of deep learning applications in database query execution
Published 2024-12-01“…We categorize these approaches into three groups based on how such models are applied: improving performance of index structures and consequently data manipulation algorithms, query optimization tasks, and externally controlling query optimizers through parameter tuning. …”
Get full text
Article -
864
A Metaheuristic Framework for Cost-Effective Renewable Energy Planning: Integrating Green Bonds and Fiscal Incentives
Published 2025-05-01“…To do this, we use three optimization techniques to identify solutions that lower electricity generation costs: Teaching Learning, Harmony Search, and the Shuffled Frog Leaping Algorithm. …”
Get full text
Article -
865
Multi-strategy fusion binary SHO guided by Pearson correlation coefficient for feature selection with cancer gene expression data
Published 2025-03-01“…Firstly, the CEC-2022 test functions were used to test the performance of the multi-strategy fusion SHO, from which the best variant TanASSHO was selected, and then compared with other nine swarm intelligent optimization algorithms. Performance tests of various algorithm variants on 18 UCI datasets show that V1PTASSHO is the most effective binary version. …”
Get full text
Article -
866
Сontrol of Intelligent Transport System in Minsk
Published 2018-10-01“…The paper considers algorithms for searching a maximum traffic volume of road vehicles in a traffic light cycle with a distributed intensity pulse and optimization of shifts under coordinated traffic flow control. …”
Get full text
Article -
867
New method for landslide susceptibility evaluation in alpine valley regions that considers the suitability of InSAR monitoring and introduces deformation rate grading
Published 2025-03-01“…The landslide susceptibility model is developed utilizing the Particle Swarm Optimization-Back Propagation (PSO-BP) algorithm. It includes evaluation techniques for regions without deformation rates. …”
Get full text
Article -
868
Advanced Machine Learning Methodology for Earthquake Magnitude Forecasting Using Comprehensive Seismic Data
Published 2026-01-01“…Feature selection was performed using Genetic Algorithm, Particle Swarm Optimization, and Simulated Annealing, while ten machine learning models were implemented — ranging from Linear Regression and Decision Trees to Gradient Boosting, XGBoost, LightGBM, and Long Short-Term Memory (LSTM) networks. …”
Get full text
Article -
869
Fractional-Order Swarming Intelligence Heuristics for Nonlinear Sliding-Mode Control System Design in Fuel Cell Hybrid Electric Vehicles
Published 2025-06-01“…This framework integrates moth flame optimization (MFO) with the gravitational search algorithm (GSA) and Fractal Heritage Evolution, implemented through three spiral-based variants: MFOGSAPSO-A (Archimedean), MFOGSAPSO-H (Hyperbolic), and MFOGSAPSO-L (Logarithmic). …”
Get full text
Article -
870
SABO-ELM model for remaining life prediction of lithium-ion batteries under multiple health factors
Published 2025-06-01“…The SABO algorithm optimizes the weights and bias thresholds of the ELM model, which effectively reduces the risk of local optima and improves its predictive performance and stability. …”
Get full text
Article -
871
Enhancing fever of unknown origin diagnosis: machine learning approaches to predict metagenomic next-generation sequencing positivity
Published 2025-04-01“…Using the SHAP method, the five most important factors for predicting mNGS-positive results were albumin, procalcitonin, blood culture, disease type, and sample type.ConclusionThe validated LightGBM-based predictive model could have practical clinical value in enhancing the application of mNGS in the etiological diagnosis of FUO, representing a powerful tool to optimize the timing of mNGS.…”
Get full text
Article -
872
NLP for computational insights into nutritional impacts on colorectal cancer care
Published 2025-06-01“…Colorectal cancer (CRC) is one of the most prominent cancers globally, with its incidence rising among younger adults due to improved screening practices. …”
Get full text
Article -
873
Q8S: Emulation of Heterogeneous Kubernetes Clusters Using QEMU
Published 2025-05-01“…However, as the majority of Kubernetes clusters operate on homogeneous hardware, most scheduling algorithms are also only developed for homogeneous systems. …”
Get full text
Article -
874
-
875
Encoding-Based Machine Learning Approach for Health Status Classification and Remote Monitoring of Cardiac Patients
Published 2025-02-01“…In short, this study aims to explore how ML algorithms can enhance diagnostic accuracy, improve real-time monitoring, and optimize treatment outcomes. …”
Get full text
Article -
876
Corrosion rate prediction for long-distance submarine pipelines based on MWIWOA-SVM
Published 2025-05-01“…MethodsTo address these issues, Multi-Way Improved Whale Optimization Algorithm (MWIWOA) was proposed to optimize the SVM-based prediction model for the internal corrosion rate of long-distance submarine pipelines. …”
Get full text
Article -
877
Maximum Power Exploitation of Photovoltaic System under Fast-Varying Solar Irradiation and Local Shading
Published 2022-01-01“…In addition, under fast-varying solar irradiation and local shading, the speed, ability, and stability of the improved MPPT system with the PF-MPPT algorithm when tracking the maximum power were 9.52, 1.32, and 1.84 times of the MPPT system with the P&O algorithm and 2.18, 1.41, and 2.00 times of the MPPT system with the particle swarm optimization algorithm, respectively.…”
Get full text
Article -
878
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
879
Multidisciplinary Collaborative Reliability Analysis of the Gear Reducer based on Inverse Reliability Strategy
Published 2015-01-01“…The IRS- GA- CO,which not only lifted the coupling between all disciplines to improve the search most probable point,the burden of system- level optimizer also can be significantly reduced. …”
Get full text
Article -
880
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article