-
4101
A PSO weighted ensemble framework with SMOTE balancing for student dropout prediction in smart education systems
Published 2025-05-01“…Furthermore, PSO offers computational efficiency advantages over Firefly and Ant Colony Optimization, reducing hyperparameter tuning time while improving ensemble performance. …”
Get full text
Article -
4102
A longan-picking sequence planning method for UAV system based on multi-target tracking
Published 2025-12-01“…A comparative analysis shows that the proposed method achieves an average improvement of 71. 7% in silhouette coefficient, a 67% reduction in the average distance within the cluster and a 30. 1% increase in the average distance between groups, allowing effective subdivision of subareas of picking. A LonTsp planning algorithm is used for path planning, optimizing picking paths to reduce total picking time by 19.1% and lowering UAV energy consumption and time costs. …”
Get full text
Article -
4103
A Novel Transformer-Based Approach for Reliability Evaluation of Composite Systems With Renewables and Plug-in Hybrid Electric Vehicles
Published 2025-01-01“…To address these issues, this research presents an advanced mixed-integer linear programming (MILP)-based algorithm for optimizing EV charging. The algorithm prioritizes clean energy utilization through intelligent power allocation strategies while considering cost-revenue trade-offs. …”
Get full text
Article -
4104
Energy-efficient power control for two-tier femtocell networks with block-fading channels
Published 2017-05-01“…A distributed iterative algorithm is proposed to obtain the optimal power solution. …”
Get full text
Article -
4105
Application of the Mean-shift Segmentation Parameters Estimator (MSPE) to VHSR satellite images: Tetuan-Morocco
Published 2015-06-01“…<p>Image segmentation is considered as crucial step dealing with Object-Based Image Analysis (OBIA) and different segmentation results could be achieved by combining possible parameters values. Optimal parameters selection is usually carried out on the basis of visual interpretation; therefore, defining optimal combinations is a challenging task. …”
Get full text
Article -
4106
A distributed energy-efficient opportunistic routing accompanied by timeslot allocation in wireless sensor networks
Published 2022-05-01“…In our new algorithm, clustering and routing tree construction is performed while introducing the optimal relay transmission distance achieved by using opportunistic routing principle, and at the same time, interference-free wake up time is scheduled, which may optimize energy consumption and decrease the number of various control messages as possible to prolong the network lifetime. …”
Get full text
Article -
4107
Implementation of VR application in cultural and tourism integration under the background of smart city and IoT
Published 2025-12-01“…In terms of system performance, the optimized virtual roaming system maintained stable memory and CPU usage while reducing GPU load by over 20 % and increasing the FPS from 30 fps to 44.6 fps. …”
Get full text
Article -
4108
UAV Robust Strategy Control Based on MAS
Published 2014-01-01“…After simulation, the MAS has been proved to be able to promote the success ratio and raise the robustness, while realizing feasibility of coordinated flight and optimality of cooperative mission.…”
Get full text
Article -
4109
Stroke Risk Classification Using the Ensemble Learning Method of XGBoost and Random Forest
Published 2025-06-01“…The dataset was split into 80% training and 20% testing data (hold-out test) to ensure objective evaluation. Hyperparameter optimization was performed using Bayesian optimization, while model evaluation employed stratified K-fold cross-validation to prevent overfitting. …”
Get full text
Article -
4110
Research on the Stability of Express Delivery Supply Chain Based on Risk Propagation Model ------ Case Studies of SF Express and JD Logistics
Published 2025-01-01“…Based on the research results, optimization strategies such as dynamic path optimization algorithms and blockchain-based information isolation mechanisms are proposed, providing theoretical tools and practical references for risk prevention and control in the express delivery industry.…”
Get full text
Article -
4111
Advances in Numerical Modeling for Heat Transfer and Thermal Management: A Review of Computational Approaches and Environmental Impacts
Published 2025-03-01“…Sustainable computing practices, including energy-efficient algorithms and renewable-powered data centers, offer potential solutions. …”
Get full text
Article -
4112
Interval-Aware Scheduling of Surveillance Drones: Exact and Heuristic Approaches
Published 2025-01-01“…In comparison to the Greedy method, the Multi-stage method achieved an average improvement of 37.8% in total flight time, while its algorithm runtime deteriorated by a maximum of 1.26 seconds. …”
Get full text
Article -
4113
A Deep Learning Method for Photovoltaic Power Generation Forecasting Based on a Time-Series Dense Encoder
Published 2025-05-01“…Deep learning has become a widely used approach in photovoltaic (PV) power generation forecasting due to its strong self-learning and parameter optimization capabilities. In this study, we apply a deep learning algorithm, known as the time-series dense encoder (TiDE), which is an MLP-based encoder–decoder model, to forecast PV power generation. …”
Get full text
Article -
4114
Building a composition-microstructure-performance model for C–V–Cr–Mo wear-resistant steel via the thermodynamic calculations and machine learning synergy
Published 2025-05-01“…Furthermore, feature importance analysis, conducted using the Random Forest algorithm, revealed significant differences in the factors affecting sliding friction and abrasive wear. …”
Get full text
Article -
4115
The Long-Term Surface Deformation Monitoring and Prediction of Hutubi Gas Storage Reservoir in Xinjiang Based on InSAR and the GWO-VMD-GRU Model
Published 2025-07-01“…The data is processed through wavelet transformation for denoising, followed by the application of a Gray Wolf Optimization (GWO) algorithm combined with Variational Mode Decomposition (VMD) to decompose both surface deformation and gas pressure data. …”
Get full text
Article -
4116
Development and Validation of a Discrete Element Simulation Model for Pressing Holes in Sowing Substrates
Published 2025-04-01“…A neural network model for predicting the angle of repose was constructed, and a genetic algorithm was applied to optimize the significant contact mechanical parameters. …”
Get full text
Article -
4117
An Evolutionary Deep Reinforcement Learning-Based Framework for Efficient Anomaly Detection in Smart Power Distribution Grids
Published 2025-05-01“…Statistical <i>t</i>-tests confirm the superiority of DRL-NSABC over other algorithms, while achieving a variance of 0.00014. Moreover, DRL-NSABC demonstrates the fastest convergence, reaching near-optimal accuracy within the first 100 epochs. …”
Get full text
Article -
4118
Full-chain comprehensive assessment and multi-scenario simulation of geological disaster vulnerability based on the VSD framework: a case study of Yunnan province in China
Published 2025-06-01“…Furthermore, the Ordered Weighted Averaging (OWA) algorithm and the Partical Swarm Optimization-Support Vector Machine (PSO-SVM) model were combined to simulate future GDV scenarios for 2030–2050 under three development preferences: environment oriented, status quo, and economically oriented. …”
Get full text
Article -
4119
Causal Unit Selection using Tractable Arithmetic Circuits
Published 2024-05-01“…While early studies focused mainly on bounding a specific class of counterfactual objective functions using data, more recent work allows one to find optimal units exactly by reducing the causal objective to a classical objective on a meta-model, and then applying a variant of the classical Variable Elimination (VE) algorithm to the meta-model---assuming a fully specified causal model is available. …”
Get full text
Article -
4120
Adaptive Security Solutions for NOMA Networks: The Role of DDPG and RIS-Equipped UAVs
Published 2024-11-01“…Our main objective is to prevent eavesdroppers from accessing the network while preserving seamless communication for authorized users. …”
Get full text
Article