-
1141
Energy optimization of ant colony algorithm in wireless sensor network
Published 2017-04-01“…An energy consumption optimization algorithm based on ant colony algorithm is proposed for wireless sensor network. …”
Get full text
Article -
1142
Blunt trauma of the scrotum and testicle: algorithm of choice of treatment tactics
Published 2018-12-01“…The study is a comparison of the results of prospective (according to the algorithm) and retrospective fragments, including a total of 459 patients (414 retrospectively, 45 prospectively). …”
Get full text
Article -
1143
Quantitative estimating size of deep defects in multi-layered structures from eddy current NDT signals using improved ant colony algorithm
Published 2014-03-01Subjects: “…Ant colony algorithm…”
Get full text
Article -
1144
Solving of the Workspace Boundary of Planar Parallel Mechanism based Modified PSO Algorithm
Published 2019-12-01Subjects: “…Particle swarm algorithm…”
Get full text
Article -
1145
A Hybrid Maximum Power Point Tracking Approach for Photovoltaic Systems under Partial Shading Conditions Using a Modified Genetic Algorithm and the Firefly Algorithm
Published 2018-01-01“…The proposed algorithm integrates a genetic algorithm (GA) and the firefly algorithm (FA) and further improves its calculation process via a differential evolution (DE) algorithm. …”
Get full text
Article -
1146
Load Balancing Routing Algorithm Based on Genetic Optimization and Artificial Bee Colony in LEO Satellite Network
Published 2024-06-01Subjects: “…artificial bee colony algorithm…”
Get full text
Article -
1147
Design of a sustainable supply chain network of biomass renewable energy in the case of disruption
Published 2024-06-01Subjects: Get full text
Article -
1148
Research on autonomous navigation of mobile robots based on IA-DWA algorithm
Published 2025-01-01Subjects: Get full text
Article -
1149
Algorithm study of digital HPA predistortion using one novel memory type BP neural network
Published 2014-01-01Subjects: Get full text
Article -
1150
Improvement on moving object tracking method for network video surveillance
Published 2014-10-01Subjects: Get full text
Article -
1151
RESEARCH ON TECHNIQUES TO ENHANCE DDoS ATTACK PREVENTION USING CUMULATIVE SUM AND BACKPROPAGATION ALGORITHMS
Published 2024-12-01Subjects: Get full text
Article -
1152
Multi-constraints QoS routing optimization based on improved immune clonal shuffled frog leaping algorithm
Published 2020-05-01Subjects: “…shuffled frog leaping algorithm…”
Get full text
Article -
1153
Adaptive algorithm to compensate varying group<sub>d</sub>elay
Published 2006-01-01Subjects: Get full text
Article -
1154
OPTIMIZATION DESIGN OF TOWER DOOR STRUCTURE BASED ON ISIGHT
Published 2015-01-01Subjects: Get full text
Article -
1155
Exploration and comparison of the effectiveness of swarm intelligence algorithm in early identification of cardiovascular disease
Published 2025-02-01Subjects: Get full text
Article -
1156
Application of GA-ACO Optimized BP Neural Network in Fault Diagnosis of Planetary Gearbox
Published 2021-03-01Subjects: “…GA-ACO-BP algorithm…”
Get full text
Article -
1157
End-Milling of GFRP Composites with A Hybrid Method for Multi-Performance Optimization
Published 2025-01-01Subjects: Get full text
Article -
1158
Data recommendation algorithm of network security event based on knowledge graph
Published 2023-12-01“…To address the difficulty faced by network security operation and maintenance personnel in timely and accurate identification of required data during network security event analysis, a recommendation algorithm based on a knowledge graph for network security events was proposed.The algorithm utilized the network threat framework ATT&amp;CK to construct an ontology model and establish a network threat knowledge graph based on this model.It extracted relevant security data such as attack techniques, vulnerabilities, and defense measures into interconnected security knowledge within the knowledge graph.Entity data was extracted based on the knowledge graph, and entity vectors were obtained using the TransH algorithm.These entity vectors were then used to calculate data similarity between entities in network threat data.Disposal behaviors were extracted from literature on network security event handling and treated as network security data entities.A disposal behavior matrix was constructed, and the behavior matrix enabled the vector representation of network threat data.The similarity of network threat data entities was calculated based on disposal behaviors.Finally, the similarity between network threat data and threat data under network security event handling behavior was fused to generate a data recommendation list for network security events, which established correlations between network threat domains based on user behavior.Experimental results demonstrate that the algorithm performs optimally when the fusion weight α=7 and the recommended data volume K=5, achieving a recall rate of 62.37% and an accuracy rate of 68.23%.By incorporating disposition behavior similarity in addition to data similarity, the algorithm better represents factual disposition behavior.Compared to other algorithms, this algorithm exhibits significant advantages in recall rate and accuracy, particularly when the recommended data volume is less than 10.…”
Get full text
Article -
1159
A Mathematical Modeling and an Optimization Algorithm for Marine Ship Route Planning
Published 2023-01-01“…Based on the mathematical model, the ant colony algorithm is used to optimize the initial route of the ship. …”
Get full text
Article -
1160
Spectrum allocation algorithm of elastic optical networks in power distribution system
Published 2019-02-01“…In order to effectively improve the resource utilization of information transmission network in reality,the spectrum allocation problem in flexible optical network in smart grid environment was analyzed,and a spectrum allocation method was proposed.Combining the advantages of genetic algorithm and ant colony algorithm,the genetic algorithm was used to generate the initial solution.Finally,the optimal solution of the spectrum allocation problem was obtained by the characteristics of positive feedback of ant colony algorithm and efficient convergence.The performance of the optimization algorithm mentioned was verified by software simulation.The proposed algorithm can optimize the use of idle spectrum resources to meet the needs of mass data transmission in distribution network,and improve the reliability of distribution network communication system,which is of great significance to the safe and reliable operation of smart grid.…”
Get full text
Article