Showing 5,641 - 5,660 results of 25,328 for search 'research algorithm', query time: 0.20s Refine Results
  1. 5641
  2. 5642
  3. 5643

    A Review of Research on Path Planning of Unmanned Surface Vessel Swarm: Deep Reinforcement Learning by Yuli HOU, Ning WANG, Chidong QIU, Yongpeng WENG

    Published 2025-04-01
    “…Traditional path planning algorithms are difficult to meet increasingly complex needs due to weak coordination mechanisms and insufficient adaptability, while the development of deep reinforcement learning(DRL) technology provides a new research direction for the path planning of USV swarms. …”
    Get full text
    Article
  4. 5644

    Multi-Parameter Optimization Using Metaheuristic Algorithms to Improve Uncrewed Aerial Vehicles’ Wireless Communications: A Performance Analysis by Lalan J. Mishra, Naima Kaabouch

    Published 2025-01-01
    “…Uncrewed aerial vehicles (UAVs) require robust communication for operational reliability. Recent research has explored artificial intelligence techniques, particularly metaheuristic algorithms, to address this challenge. …”
    Get full text
    Article
  5. 5645
  6. 5646

    Mapping the distribution of pine wilt disease based on selected machine learning algorithms and high-resolution Gaofen-2/7 remote sensing by Yifan Wang, Xiaocheng Zhou, Chongcheng Chen, Xiaoqin Wang, Hao Wu, Fanglin Tan, Ruijiao Wu

    Published 2025-08-01
    “…Under the influence of human activities and climate change, pine wilt disease (PWD) has caused significant damage to Masson’s pine (Pinus massoniana Lamb.) forests in subtropical China. Existing research has struggled to accurately capture the large-scale spatial distribution of the PWD, particularly for precise extraction at provincial level. …”
    Get full text
    Article
  7. 5647
  8. 5648
  9. 5649

    Nelder-Mead algorithm optimization and Galerkin’s method thermal performance analysis of circular porous fins with various profiles in fully wet conditions by M. r. Talaghat, F. Shafiei

    Published 2019-09-01
    “…The results showed that the efficiency, effectiveness, and heat transfer rate to the base for the rectangular profile is higher than other profiles. In this research, the Nelder-Mead algorithm is used for optimization. …”
    Get full text
    Article
  10. 5650
  11. 5651
  12. 5652
  13. 5653

    The Comparison Combination of Naïve Bayes Classification Algorithm with Fuzzy C-Means and K-Means for Determining Beef Cattle Quality in Semarang Regency by Feroza Rosalina Devi, Endang Sugiharti, Riza Arifudin

    Published 2018-11-01
    “…The data have 3 variables for determining the quality of beef cattle in Semarang regency namely age (month), Weight (Kg), and Body Condition Score (BCS) . In this research, used the combination of Naïve Bayes Classification and Fuzzy C-Means algorithm also Naïve Bayes Classification and K-Means. …”
    Get full text
    Article
  14. 5654
  15. 5655

    Research on new energy power plant network traffic anomaly detection method based on EMD by Danni Liu, Shengda Wang, YutongLi, Ji Du, Jia Li

    Published 2025-01-01
    “…Methodology This research propose Network Quality Assessment (NQA) traffic management algorithms to prevent illegal access and data breaches, this involves strong security measures such as encryption, firewalls, and encrypted communication methods. …”
    Get full text
    Article
  16. 5656

    Research on implementation of interventions in tuberculosis control in low- and middle-income countries: a systematic review. by Frank Cobelens, Sanne van Kampen, Eleanor Ochodo, Rifat Atun, Christian Lienhardt

    Published 2012-01-01
    “…Evaluations of diagnostic and screening algorithms were more frequent (n = 19) but geographically clustered and mainly of non-comparative design. …”
    Get full text
    Article
  17. 5657

    Optimizing Customer Data Security in Water Meter Data Management Based on RESTful API and Data Encryption Using AES-256 Algorithm by Syahrul Adrianto, Bambang Agus Herlambang, Ramadhan Renaldy

    Published 2025-06-01
    “…To increase the security of customer data, a cryptographic algorithm is used, namely the Advanced Encryption Standard (AES) algorithm with a 256-bit key length to secure data that is considered sensitive and contains high privacy. …”
    Get full text
    Article
  18. 5658
  19. 5659

    NVH Analysis and Optimization of Light Truck Electric Drive Axles Based on Romax by Hao Yingbo, Liu Lidong

    Published 2024-10-01
    “…A light truck 3.5 t parallel shaft electric drive axle was taken as the research object, and the NVH test was carried out to it. …”
    Get full text
    Article
  20. 5660