-
1541
Research on prediction algorithm of effluent quality and development of integrated control system for waste-water treatment
Published 2025-06-01“…The ICS is superior to standard WWTCS by a vital error boundary, minimizing energy consumption by 17% and boosting chemical-based consumption optimization by 24%. With an average removal rate of 94.23% for Chemical Oxygen Demand (COD) compared to 88.76% for standard systems, the findings from experiments exhibited significant performance improvements.…”
Get full text
Article -
1542
Investigating the performance of random oversampling and genetic algorithm integration in meteorological drought forecasting with machine learning
Published 2025-05-01“…Therefore, this study aims to evaluate the effectiveness of machine learning methods for meteorological drought estimation and to integrate Random Oversampling (ROS) and Genetic Algorithm (GA) methods to improve estimation accuracy. …”
Get full text
Article -
1543
A Two-Stage Bin Packing Algorithm for Minimizing Machines and Operators in Cyclic Production Systems
Published 2025-06-01“…The results of our algorithm led to significant cost savings and improved scheduling performance. …”
Get full text
Article -
1544
Performance Evaluation of Hybrid Bio-Inspired and Deep Learning Algorithms in Gene Selection and Cancer Classification
Published 2025-01-01“…This study explores the performance of hybrid bio-inspired algorithms and deep learning techniques for gene selection and cancer classification. …”
Get full text
Article -
1545
Numerical Recognition Algorithm for Power Equipment Monitoring Based on Light-Resnet Convolutional Neural Network
Published 2024-08-01“…When combined with edge computing collaboration mechanisms, it resulted in a 20.73% reduction in power consumption on the terminal side. The proposed algorithm not only proves its adaptability and efficiency in resource-constrained environments but also significantly improves the network's accuracy with design of the D-Add loss function.…”
Get full text
Article -
1546
Impact of surrogate model accuracy on performance and model management strategy in surrogate-assisted evolutionary algorithms
Published 2025-09-01“…Surrogate-assisted evolutionary algorithms (SAEAs) are widely used to solve expensive optimization problems where evaluating candidate solutions is computationally intensive. …”
Get full text
Article -
1547
Non-Vertical Well Trajectory Design Based on Multi-Objective Optimization
Published 2025-07-01“…The optimization and control of the wellbore trajectory is one of the important technologies to improve drilling efficiency, reduce drilling cost, and ensure drilling safety in the process of modern oil and gas exploration and development. …”
Get full text
Article -
1548
Grey Wolf Optimization- and Particle Swarm Optimization-Based PD/I Controllers and DC/DC Buck Converters Designed for PEM Fuel Cell-Powered Quadrotor
Published 2025-04-01“…Simulation results demonstrate the effectiveness of the PSO- and GWO-based design of the controllers and converters in enhancing energy efficiency and improving the quadrotor’s flight stability. For step inputs, the GWO-based optimized system shows better performance according to power consumption and the time domain criteria such as rise time and settling time. …”
Get full text
Article -
1549
Multi-Objective Optimization for Green BTS Site Selection in Telecommunication Networks Using NSGA-II and MOPSO
Published 2025-01-01“…These algorithms were chosen due to their proven efficiency in handling NP-hard optimization problems and their ability to balance exploration and exploitation in search spaces.…”
Get full text
Article -
1550
Stability Analysis and Construction Parameter Optimization of Tunnels in the Fractured Zone of Faults
Published 2022-01-01“…In order to improve the construction method of highway tunnel fault, improve the excavation level, improve the construction efficiency, reduce the project cost, and shorten the construction period, so as to find a specific road, this paper puts forward the research method of tunnel stability analysis and construction parameter optimization in the fault fracture zone. …”
Get full text
Article -
1551
Comprehensive Comparison and Validation of Forest Disturbance Monitoring Algorithms Based on Landsat Time Series in China
Published 2025-02-01“…When considering different forest disturbance types, COLD achieved the highest accuracies for Fire, Harvest, and Other disturbances, while CCDC was most accurate for Forestation. These findings highlight the necessity of region-specific calibration and parameter optimization tailored to specific disturbance types to improve forest disturbance monitoring accuracy, and also provide a solid foundation for future studies on algorithm modifications and ensembles.…”
Get full text
Article -
1552
Flex-route demand response transit scheduling based on station optimization
Published 2022-03-01Get full text
Article -
1553
Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm
Published 2023-06-01“…The use of location-based service brings convenience to people’s daily lives, but it also raises concerns about users’ location privacy.In the k-nearest neighbor query problem, constructing K-anonymizing spatial regions is a method used to protects users’ location privacy, but it results in a large waste of communication overhead.The SpaceTwist scheme is an alternative method that uses an anchor point instead of the real location to complete the k-nearest neighbor query,which is simple to implement and has less waste of communication overhead.However,it cannot guarantee K-anonymous security, and the specific selection method of the anchor point is not provided.To address these shortcomings in SpaceTwist, some schemes calculate the user’s K-anonymity group by introducing a trusted anonymous server or using the way of user collaboration, and then enhance the end condition of the query algorithm to achieve K-anonymity security.Other schemes propose the anchor point optimization method based on the approximate distribution of interest points, which can further reduce the average communication overhead.A lightweight K-anonymity incremental nearest neighbor (LKINN) location privacy protection algorithm was proposed to improve SpaceTwist.LKINN used convex hull mathematical tool to calculate the key points of K-anonymity group, and proposed an anchor selection method based on it, achieving K-anonymity security with low computational and communication costs.LKINN was based on a hybrid location privacy protection architecture, making only semi-trusted security assumptions for all members of the system, which had lax security assumptions compared to some existing research schemes.Simulation results show that LKINN can prevent semi-trusted users from stealing the location privacy of normal users and has smaller query response time and communication overhead compare to some existing schemes.…”
Get full text
Article -
1554
A combined model of shoot phosphorus uptake based on sparse data and active learning algorithm
Published 2025-01-01Get full text
Article -
1555
An investigation on energy-saving scheduling algorithm of wireless monitoring sensors in oil and gas pipeline networks
Published 2024-10-01“…In this context, Wireless Sensor Networks (WSNs) are widely used for monitoring oil and gas pipelines due to their flexible deployment and cost-effectiveness. However, since sensor nodes typically rely on limited battery power, extending the network’s lifecycle and improving energy utilization efficiency have become focal points of research. …”
Get full text
Article -
1556
Marine Voyage Optimization and Weather Routing with Deep Reinforcement Learning
Published 2025-04-01“…These algorithms are computationally costly, so we split optimization into an offline phase (costly pre-training for a route) and an online phase where the algorithms are fine-tuned as updated weather data become available. …”
Get full text
Article -
1557
Creation of a Custom 3D Algorithm for Proper Alignment of Straight Nails in Tibiotalocalcaneal Arthrodesis
Published 2024-12-01“…Conclusion: A straight nail passing through the sustentaculum tali places surrounding neurovascular structures at risk and can also compromise the biomechanical stability of the implant. Our novel 3D algorithm shows that intraoperative adjustment of the starting point lateral to the central tibial axis is required to obtain optimal alignment of the hindfoot nail. …”
Get full text
Article -
1558
Medical Image Hybrid Watermark Algorithm Based on Frequency Domain Processing and Inception v3
Published 2025-06-01“…Existing research has mostly focused on optimizing individual techniques, lacking comprehensive solutions that integrate the strengths of different methods. …”
Get full text
Article -
1559
Significance of Machine Learning-Driven Algorithms for Effective Discrimination of DDoS Traffic Within IoT Systems
Published 2025-06-01“…Findings revealed that the RF model outperformed other models by delivering optimal detection speed and remarkable performance across all evaluation metrics, while KNN (K = 7) emerged as the most efficient model in terms of training time.…”
Get full text
Article -
1560
Adaptive Q-Learning Grey Wolf Optimizer for UAV Path Planning
Published 2025-03-01“…Grey Wolf Optimization (GWO) is one of the most popular algorithms for solving such problems. …”
Get full text
Article