-
2661
Optimization of the heat recovery performance of enhanced geothermal system based on PSO-GA-BP neural networks and analytic hierarchy process
Published 2025-07-01“…In this study, an innovative combination of numerical simulation, PSO-GA-BPNN model, and Analytic Hierarchy Process was proposed to establish an EGS comprehensive optimization method, effectively improving the accuracy and computational efficiency of scheme optimization. …”
Get full text
Article -
2662
Analysis of Brand Visual Design Based on Collaborative Filtering Algorithm
Published 2022-01-01“…Finally, the collaborative filtering algorithm is optimized to improve the consumer similarity based on the original algorithm. …”
Get full text
Article -
2663
Application of the Random Forest Algorithm for Accurate Bipolar Disorder Classification
Published 2025-03-01“…Its ability to reduce diagnostic delays, improve classification accuracy, and optimize resource allocation make it a promising tool for integrating artificial intelligence into psychiatric care. …”
Get full text
Article -
2664
Differential analysis of lightweight cipher algorithm ACE based on MILP
Published 2023-01-01“…The differential property of the lightweight cipher algorithm ACE was researched.n-dimension ring AND-gate combination was defined and its differential property was described accurately by only O(n) expressions with the MILP method by analyzing the relationship among AND gates.The nonlinear operation of ACE was transformed to the 32-dimension ring AND-gate combination and the MILP differential model of ACE was proposed.According to the characteristics of Gurobi solver, a model for fast solving the MILP differential model of ACE was given.For ACE permutation with 3 to 6 steps, the optimal differential characteristic was obtained and its probability was improved by multi-difference technique.The differential forge attack on authenticated encryption algorithm ACE-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">A</mi><mi mathvariant="script">E</mi></math></inline-formula>-128 and the differential collision attack on hash algorithm ACE-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">H</mi></math></inline-formula>-256 was given with 3-step ACE permutation, and the success probability was 2<sup>-90.52</sup>.And it was proved that the 4-steps ACE permutation arrived the differential security bound of 128 bit.Actually, the MILP differential description of ring AND-gate combination can be applied on more cipher algorithms, such as SIMON, Simeck.…”
Get full text
Article -
2665
Radio Mean Labeling Algorithm, Its Complexity and Existence Results
Published 2025-06-01“…The existing ILP model does not guarantee that the vertex labels are distinct, positive and satisfy the radio mean condition, prompting the need for an improved approach. …”
Get full text
Article -
2666
Robust UAV Target Tracking Algorithm Based on Saliency Detection
Published 2025-04-01“…In response to this problem, this paper proposes a robust UAV target tracking algorithm based on saliency detection (SDBCF). Using saliency detection methods, the DCF tracker is optimized in three aspects to enhance the robustness of the tracker in complex scenes: feature fusion, filter-model construct, and scale-estimation methods improve. …”
Get full text
Article -
2667
Multi-objective optimization of HESS control for optimal frequency regulation in a power system with RE penetration
Published 2024-12-01“…To optimize the control parameters with the best objectives, all possible sets of objectives with four different optimization algorithms are studied. …”
Get full text
Article -
2668
Firefly Algorithm based Feature Selection for Arabic Text Classification
Published 2020-03-01“…The results confirm the efficiency of the proposed feature selection method in improving Arabic Text Classification accuracy. Keywords: Arabic Natural Language Processing, Feature Selection, Firefly optimization method, Text Classification…”
Get full text
Article -
2669
Two-stage robust planning for wind power-photovoltaic-thermal power-pumped storage-battery hybrid system
Published 2025-05-01“…The improved IEEE30-node system is followed to analyze the economics of the planning scheme under different conservative degrees, and the validity of the proposed model is verified.…”
Get full text
Article -
2670
User preference information recommendation based on DCGNN and GNNPK algorithms
Published 2025-12-01“…Especially when dealing with challenges such as user dynamic preferences, data noise, and cold start, the limitations of these systems become increasingly obvious, and more advanced algorithms are urgently needed to improve the personalization and accuracy of recommendations. …”
Get full text
Article -
2671
MGL-YOLO: A Lightweight Barcode Target Detection Algorithm
Published 2024-11-01“…Finally, a Lightweight Shared Multi-Scale Detection Head (LSMD) is proposed, which improves the model’s detection accuracy and adaptability while reducing the model’s parameter size and computational complexity. …”
Get full text
Article -
2672
A Flexible Interconnected Distribution Network Power Supply Restoration Method Based on E-SOP
Published 2025-02-01“…To solve this complex optimization model, an innovative hybrid approach combining the Improved Whale Optimization Algorithm (IWOA) with second-order cone programming is developed. …”
Get full text
Article -
2673
MTAD: A Multitarget Heuristic Algorithm for Virtual Machine Placement
Published 2015-10-01“…In order to solve the virtual machine placement problems in large scale, three algorithms are proposed. Firstly, we propose a physical machine (PM) classification algorithm by analyzing pseudotime complexity and find out an important factor (the number of physical hosts) that affects the efficiency, which improves running efficiency through reduction number of physical hosts; secondly, we present a VM placement optimization model using multitarget heuristic algorithm and figure out the positive and negative vectors of three goals using matrix transformation so as to provide the mapping of VMs to hosts by comparing distance with positive and negative vectors such that the energy consumption is saved, resources wastage of occupied PM is lowered, multidimension resource utilization is optimized, and the running time is shortened. …”
Get full text
Article -
2674
Research on short-term traffic flow prediction based on the PCC-IGA-LSTM model
Published 2025-04-01“…To effectively address the spatial–temporal feature mining problem in short-term traffic flow prediction for complex road networks, a new method that combined the Pearson correlation coefficient (PCC) and improved genetic algorithm to optimize the long short-term memory model (IGA-LSTM) was constructed. …”
Get full text
Article -
2675
A modified instantaneous reactive power algorithm for shunt compensation
Published 2025-07-01“…This paper proposes a new approach of IRP p-q theory for reference current generation in Distribution Static Compensator (DSTATCOM) in 3-ph, 4-wire distribution system with unbalanced, distorted source and non-linear loads, both. Algorithm is developed based on fundamental concept of equal current criteria to handle magnitude unbalance, improved formulations using time synchronization of source phase-a voltage for compensating phase unbalance, and fundamental positive sequence extraction to eliminate distortion in the source currents. …”
Get full text
Article -
2676
An Efficient Resource Allocation Algorithm for Task Offloading in the Internet of Vehicles
Published 2025-04-01“…Simulation results demonstrate that the proposed algorithm reduces memory costs and penalties from rejected tasks, while improving overall system profit. …”
Get full text
Article -
2677
Research on Control Method of Electron Accelerator Based on Simulink Simulation
Published 2025-01-01“…The results show that compared with the PID algorithm, the performance of the fuzzy PID algorithm and the fuzzy neural network PID algorithm is significantly improved. …”
Article -
2678
Predictive Ecological Cooperative Control of Electric Vehicles Platoon on Hilly Roads
Published 2025-03-01“…Unlike most existing literature that focuses on suboptimal coordination under predefined leading vehicle trajectories, this strategy employs an approach based on the combination of a long short-term memory network (LSTM) and genetic algorithm (GA) optimization (GA-LSTM) to predict the future speed of the leading vehicle. …”
Get full text
Article -
2679
NCREASING ECONOMIC PERFORMANCES USING OPTIMIZATION
Published 2021-01-01“…The present paper aimed to evaluate an agricultural holding, based on technical and economic analyzes for the period 2015-2019, whose resources and activities related to the last year were optimized. The optimization led to the improvement of the overall economic performance by the rational allocation of resources and the establishment of the crop structure in order to obtain large yields. …”
Get full text
Article -
2680
Engineering Quantum Error Correction Codes Using Evolutionary Algorithms
Published 2025-01-01“…Finally, we show that the algorithm can be used to optimize stabilizer codes for biased error models, demonstrating a significant improvement in the undetectable error rate for <inline-formula><tex-math notation="LaTeX">$[[12,1]]_{2}$</tex-math></inline-formula> codes versus the best-known-distance code with the same parameters. …”
Get full text
Article