-
1201
Solving Integer Ambiguity Based on an Improved Ant Lion Algorithm
Published 2025-02-01“…First, the performance of the SAALO algorithm was evaluated by comparing its solving speed and success rate with those of the Ant Lion Optimization Algorithm (ALO), the LAMBDA algorithm and the MLAMBDA algorithm. …”
Get full text
Article -
1202
Finding Random Integer Ideal Flow Network Signature Algorithms
Published 2025-05-01“…We introduce two pseudocode algorithms that uphold flow conservation while maintaining network irreducibility, ensuring autonomy through strong connectivity. …”
Get full text
Article -
1203
Underwater Object Detection Algorithm Based on an Improved YOLOv8
Published 2024-11-01“…Next, the incorporation of a Partial Self-Attention (PSA) module at the end of the backbone network enhances model efficiency and optimizes the utilization of computational resources while maintaining high performance. …”
Get full text
Article -
1204
Weed detection on embedded systems using computer vision algorithms
Published 2025-02-01Get full text
Article -
1205
Concrete Dam Deformation Prediction Model Based on Attention Mechanism and Deep Learning
Published 2025-01-01“…To address the multi-factor coupling, temporal dependency, and nonlinear complexity characteristics of concrete dam deformation, this paper proposed a hybrid prediction model integrating attention mechanisms, bidirectional long short-term memory (BiLSTM) networks, and sparrow search algorithm (SSA). The model comprehensively matched the multiple requirements of information weighting, temporal dependency modeling, and model optimization in concrete dam deformation prediction, forming a synergistic enhancement effect among methods.The attention mechanism operates on both feature and temporal dimensions to comprehensively enhance the model's focus on critical information. …”
Get full text
Article -
1206
Opposition-Based White Shark Optimizer for Optimizing Modified EfficientNetV2 in Road Crack Classification
Published 2025-01-01“…Preprocessing techniques are first applied to eliminate noise and enhance image quality. The OWSO algorithm is then integrated to optimize the classification performance of MEfficientNetV2, while PCA accelerates the learning process by retaining critical features in the thresholds of the varying components. …”
Get full text
Article -
1207
Constrained Bayesian Optimization: A Review
Published 2025-01-01“…Though it has been widely used to solve various optimization tasks, most of the literature has focused on unconstrained settings, while many real-world problems are characterized by constraints. …”
Get full text
Article -
1208
GOAL ORIENTED SMART PORTFOLIO OPTIMIZATION
Published 2025-03-01“…Portfolio optimization is a critical aspect of investment strategy, which aims to maximize returns while minimizing risk. …”
Get full text
Article -
1209
A Robust Multi-Objective Evolutionary Framework for Artificial Island Construction Scheduling Under Dynamic Constraints
Published 2024-11-01“…To effectively address the complexities of this model, we develop and employ the Multi-Objective Adaptive Cooperative Evolutionary Marine Genetic Algorithm (MACEMGA). MACEMGA combines cooperative coevolution, adaptive dynamic weighting, dynamic penalty functions, and advanced genetic operators to navigate the solution space efficiently and identify Pareto optimal schedules. …”
Get full text
Article -
1210
A Comprehensive System to Support Decision Making in Highly Complex Project Portfolio Situations
Published 2025-01-01Get full text
Article -
1211
Short term traffic flow prediction and timing optimization at signalized intersections based on SG-LSTM and particle swarm optimization
Published 2024-12-01“…The optimized signal timing scheme is derived through the implementation of the particle swarm optimization algorithm in Matlab. …”
Get full text
Article -
1212
Optimizing ML models for cybercrime detection: balancing performance, energy consumption, and carbon footprint through multi-objective optimization
Published 2025-04-01“…Abstract This study aims to enhance computational performance while minimizing environmental impact in AI (Artificial Intelligence) and ML (Machine Learning) applications, especially in cybersecurity, by developing energy-efficient models using a multi-objective optimization approach. …”
Get full text
Article -
1213
Sensitivity Analysis Based on E-TOPSIS Combined with MORIME-Based Multi-Objective Optimization for Sprayer Frame Design Optimization
Published 2025-02-01“…Finally, the multi-objective lightweight design of the selected components was performed based on the MORIME algorithm. After optimization, the stress increased by 12.01% and 1.52% under two operating conditions, while deformation increased by 0.647 mm and 0.607 mm, and the frame mass was reduced by 22.754 kg, a decrease of 12.8%. …”
Get full text
Article -
1214
Evolutionary search algorithm for learning activation function of an artificial neural network
Published 2025-01-01“…The proposed method aims to enhance the efficiency of the search process for optimal activation functions. Our algorithm employs genetic programming to evolve the general form of activation functions, while gradient descent optimizes their parameters during network training. …”
Get full text
Article -
1215
Generation of Sparse Antennas and Scatterers Based on Optimal Current Grid Approximation
Published 2025-03-01“…To solve this task, we present a novel algorithm based on the optimal current grid approximation for generating sparse scattering structures and evaluating their effectiveness. …”
Get full text
Article -
1216
Use of schedule theory algorithms for task planning and time management tasks
Published 2024-10-01“…At the moment, there are many algorithms for solving such tasks, but the algorithms must be customized to specific conditions, while ensuring the quality of the task and performance. …”
Get full text
Article -
1217
Image forgery detection algorithm based on U-shaped detection network
Published 2019-04-01“…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
Get full text
Article -
1218
Image forgery detection algorithm based on U-shaped detection network
Published 2019-04-01“…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
Get full text
Article -
1219
DATA DRIVEN RULE-BASED PEAK SHAVING ALGORITHM FOR SCHEDULING REFRIGERATORS
Published 2024-12-01“…This approach aims to minimize energy consumption while maintaining thermal comfort. The algorithm’s performance was evaluated using real-world data from the Spanish Transmission Service Operators (TSO). …”
Get full text
Article -
1220
BeSnake: A Routing Algorithm for Scalable Spin-Qubit Architectures
Published 2024-01-01“…It also has the option to adjust the level of optimization and to dynamically tackle parallelized routing tasks, all the while maintaining noise awareness. …”
Get full text
Article