-
201
PERFORMANCE PREDICTION OF ROADHEADERS USING SUPPORT VECTOR MACHINE (SVM), FIREFLY ALGORITHM (FA) AND BAT ALGORITHM (BA)
Published 2025-01-01“…Additionally, this study employed Firefly Algorithm (FA), Bat Algorithm (BA) and Support Vector Machine (SVM), which were assessed using coefficient of determination (R²), root mean square error (RMSE), mean squared error (MSE) and mean absolute error (MAE).The obtained results for Firefly Algorithm (FA) are found to be as R2 = 0.9104, RMSE = 0.0658, MSE= 0.0043 and MAE= 0.0039, for Bat Algorithm (BA) are found to be as R2 = 0.9421, RMSE = 0.0528, MSE= 0.0027 and MAE= 0.0024, and for Support Vector Machine (SVM) are found to be as R2 = 0.8795, RMSE = 0.0762, MSE= 0.0058 and MAE= 0.0052, respectively. …”
Get full text
Article -
202
Integrating Multilayer Perceptron and Support Vector Regression for Enhanced State of Health Estimation in Lithium-Ion Batteries
Published 2025-01-01“…We utilized Support Vector Regression (SVR) and Multilayer Perceptron (MLP) models, which were fine-tuned using hyperparameter optimization. The models were assessed using evaluation metrics such as Root Mean Squared Error (RMSE), Mean Squared Error (MSE), and R-squared <inline-formula> <tex-math notation="LaTeX">$R^{2}$ </tex-math></inline-formula>. …”
Get full text
Article -
203
Reinforcing long lead time drought forecasting with a novel hybrid deep learning model: a case study in Iran
Published 2025-02-01“…Key parameters of the DFFNN, including the number of neurons and layers, learning rate, training function, and weight initialization, were optimized using the WSO algorithm. The model’s performance was validated against two established optimizers: Particle Swarm Optimization (PSO) and Genetic Algorithm (GA). …”
Get full text
Article -
204
Study on Tourism Development Using CRITIC Method for Tourist Satisfaction
Published 2025-01-01“…These weights informed the MLP model, which accurately predicted tourist satisfaction with a mean absolute error (MAE) of 0.12 and a root mean square error (RMSE) of 0.18. Using the GA, the study identified optimal strategy combinations that improved satisfaction scores by up to 15% compared to baseline strategies. …”
Get full text
Article -
205
Robust Photovoltaic Power Forecasting Model Under Complex Meteorological Conditions
Published 2025-05-01“…Additionally, the Whale Optimization Algorithm is adopted to efficiently optimize the hyperparameters of iTransformer for the framework, improving parameter adaptability and convergence efficiency. …”
Get full text
Article -
206
Method on intrusion detection for industrial internet based on light gradient boosting machine
Published 2023-04-01Get full text
Article -
207
-
208
Chiller power consumption forecasting for commercial building based on hybrid convolution neural networks-long short-term memory model with barnacles mating optimizer
Published 2025-07-01“…Results demonstrate that the CNN-LSTM-BMO achieves superior performance with the lowest Root Mean Square Error (RMSE) of 0.5523 and highest R² value of 0.9435, showing statistically significant improvements over other optimization methods as confirmed by paired t-tests (P < 0.05). …”
Get full text
Article -
209
Application of HHO-CNN-LSTM-based CMAQ correction model in air quality forecasting in Shanghai
Published 2023-12-01“…Accordingly, a correction model, which combines convolutional neural network (CNN) and long-short term memory neural network (LSTM) and optimized by harris hawks optimization algorithm (HHO) was established to enhance the accuracy of CMAQ model's prediction results for six air pollutants (SO_2, NO_2, PM_10, PM_2.5, O_3 and CO). …”
Get full text
Article -
210
-
211
Delphi consensus statement for the management of delayed post-polypectomy bleeding
Published 2025-04-01“…These recommendations aim to improve patient outcomes and optimize healthcare resources while fostering a standardized approach to this common adverse event.…”
Get full text
Article -
212
Dynamic Sharding and Monte Carlo for Post-Quantum Blockchain Resilience
Published 2025-04-01“…Previous research also found that post-quantum blockchains, despite their improved cryptographic algorithms, are still vulnerable to DDoS attacks, emphasizing the need for more resilient architectural solutions. …”
Get full text
Article -
213
Hardware implementation of RSA encryption algorithm based on pipeline
Published 2024-01-01“…To address the high cost of implementing long-bits RSA encryption algorithms in hardware, improvements have been made to the traditional radix-4 Montgomery algorithm. …”
Get full text
Article -
214
-
215
THE ALGORITHM FOR THE TREATMENT OF PATIENTS WITH TREATMENT-RESISTANT HYPERTENSION AT THE OUTPATIENT STAGE
Published 2023-03-01Get full text
Article -
216
Multi-objective optimization of HESS control for optimal frequency regulation in a power system with RE penetration
Published 2024-12-01“…The findings indicate that the Independently Optimized Virtual Synchronous Generator HESS (IO VSG-HESS) achieves the best settling time post-contingency but offers the least improvement in frequency nadir with an average of 0.31 %. …”
Get full text
Article -
217
Timing synchronization algorithm based on clock skew estimation for WSN
Published 2015-09-01“…In order to solve the problem of poor synchronization stability on classical synchronization algorithm,high overhead on joint clock offset and skew correction synchronization algorithm in wireless sensor network,a timing syn-chronization algorithm based on clock skew estimation for WSN (CSMS) was proposed.The algorithm adopted low-overhead clock offset and skew estimation method to improve the synchronization precision and stability of paired node.At the same time of guaranteeing the stability and accuracy,it realized synchronization with the root node and the neighbors,and optimized synchronization overhead by using the combination of hierarchical network structure and radio listening.The experimental results show that the CSMS algorithm balances energy consumption,accuracy and stability of synchronization.…”
Get full text
Article -
218
Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution
Published 2025-05-01“…Context The study proposes and evaluates a novel cybersecurity architecture for telehealth, resilient against future quantum computing cyber threats. By integrating Post-Quantum Cryptography (PQC) with Quantum Key Distribution (QKD) and privacy-preserving mechanisms, data confidentiality and immutability for patient records in a post-quantum era are ensured. …”
Get full text
Article -
219
Neurodynamic robust adaptive UWB localization algorithm with NLOS mitigation
Published 2025-04-01Get full text
Article -
220
Advances in Digital Signature Algorithms: Performance, Security and Future Prospects
Published 2025-01-01“…The results show that while optimizations improve computational efficiency, challenges persist, especially with potential quantum threats that could undermine these algorithms' security. …”
Get full text
Article