-
1601
Reliability-Based Geotechnical Design Method Using the Gaussian Process Regression–Based Differential Evolution Algorithm
Published 2024-01-01“…A fundamental challenge in reliability-based geotechnical design is optimizing cost-effectiveness while adhering to a predefined failure probability target. …”
Get full text
Article -
1602
Environmental and Economic Dispatching of Fire-Wind Combined System Based on Improved MOPSO
Published 2025-01-01“…Then, an improved multi-objective particle swarm optimization algorithm, LRMOPSO, is proposed by combining multi-objective particle swarm optimization algorithm, Levy flight jamming strategy and reverse learning strategy. …”
Get full text
Article -
1603
Bio inspired optimization techniques for disease detection in deep learning systems
Published 2025-05-01“…This work assists researchers in selecting the most effective bio-inspired algorithm for disease categorization, prediction, and the analysis of high-dimensional biomedical data.…”
Get full text
Article -
1604
Forecasting Wind Farm Production in the Short, Medium, and Long Terms Using Various Machine Learning Algorithms
Published 2025-02-01“…These findings provide practical insights for optimizing wind energy forecasting models, which can improve energy trading strategies, enhance grid stability, and support informed decision making in renewable energy investments. …”
Get full text
Article -
1605
Bi-Objective Optimization of Product Selection and Ranking Considering Sequential Search
Published 2025-08-01“…Customer choices in online retailing are often influenced by sequential search behavior. However, most existing models ignore the dynamic property of this process. …”
Get full text
Article -
1606
Reliability-Based Optimization of Impeller Structure Using Exponential Function Approximation
Published 2025-06-01“…Then, the obtained explicit exponential function approximation is used to decouple the reliability-based optimization problem and transform it into an equivalent deterministic optimization problem, where a general optimization algorithm can be adopted to solve steadily with a neglectable computational cost. …”
Get full text
Article -
1607
A New Image Encryption Method Using an Optimized Smart Codebook
Published 2025-01-01Get full text
Article -
1608
Optimization of external container delivery and pickup scheduling based on appointment mechanism.
Published 2025-01-01“…Through case studies, we have demonstrated the superior performance of this algorithm in addressing relevant problems. The results show that, in terms of truck operational costs, the improved algorithm reduces costs by 10.96% and 3.02% compared to traditional Ant Colony Optimization and Variable Neighborhood Search algorithms, respectively, and by 4.89% compared to manual scheduling. …”
Get full text
Article -
1609
Optimization Techniques on Quantum and Classical Systems: A Comprehensive Comparative Study
Published 2025-01-01“…This study compares Particle Swarm Optimization (PSO), Moth Flame Optimization (MFO), and Genetic Algorithm (GA) on three platforms : a local computer, a local computer with quantum integration, and an IBM quantum machine. …”
Get full text
Article -
1610
Integrated deep learning for cardiovascular risk assessment and diagnosis: An evolutionary mating algorithm-enhanced CNN-LSTM
Published 2025-12-01“…EMA was applied for hyperparameter optimization, demonstrating improved convergence and generalization over conventional methods. …”
Get full text
Article -
1611
Optimization of Toolpath Planning and CNC Machine Performance in Time-Efficient Machining
Published 2025-01-01“…We propose a method that integrates advanced algorithms to identify and eliminate redundant movements, optimize the toolpaths, and improve the machining strategies. …”
Get full text
Article -
1612
Resource allocation strategy based on optimal matching auction in the enterprise network
Published 2019-08-01“…To address the issue that the owners of computer are selfish in the enterprise networks,which caused the low available number of resource nodes and low efficiency of resource allocation,an optimized matching resource allocation strategy OMRA was proposed and its core was the auction mechanism.Selfishness was restrained and the number of available resources was increased by OMRA,so as the operating efficiency of the whole auction market was improved.First,the initial prices were determined by normalizing the costs of different type of resources on the beginning of auction.Secondly,an optimal matching auction algorithm was designed to maximize the interests of the auction markets.Then,service perfecting algorithm was performed such that the sellers could get more services at the current transaction value,thus ensuring the benefits of resource providers.At last,a request price updating algorithm was adopted to assurance that both sellers and buyers could get priorities in the next auction processing.Compared with the cloud resource allocating algorithm via fitness-enabled auction (CRAA/FA),the experiment results indicate that the efficiency of resource allocation improves by 10% and the benefits of market increase by 11.4%.…”
Get full text
Article -
1613
Solution Approach to the Minimum Spanning Tree Problem in Tsukamoto Fuzzy and Fermantean Fuzzy Environments
Published 2024-11-01“…Solving Fuzzy Minimum Spanning Tree (FFMST) and Fuzzy Tsukamoto using modified Prim Algorithm for Undirected Graphs and modified Optimal Branching Algorithm for Directed Graphs in FFN environment. …”
Get full text
Article -
1614
Dynamic Coal Flow-Based Energy Consumption Optimization of Scraper Conveyor
Published 2025-06-01“…Conversely, simultaneously increasing both chain and drum speeds helps to maintain lump coal size. The final optimization scheme demonstrates this balance—achieving improved energy efficiency at the cost of increased coal fragmentation. …”
Get full text
Article -
1615
MODEL FOR THE FORMATION OF A PROJECT TEAM COMPOSITION BASED ON DISCRETE OPTIMIZATION METHODS
Published 2025-05-01“…The problem lies in the need to improve the efficiency and effectiveness of projects by optimizing the composition of teams. …”
Article -
1616
Optimization mechanism of attack and defense strategy in honeypot game with evidence for deception
Published 2022-11-01“…Using game theory to optimize honeypot behavior is an important method in improving defender’s trapping ability.Existing work tends to use over simplified action spaces and consider isolated game stages.A game model named HoneyED with expanded action spaces and covering comprehensively the whole interaction process between a honeypot and its adversary was proposed.The model was focused on the change in the attacker’s beliefs about its opponent’s real identity.A pure-strategy-equilibrium involving belief was established for the model by theoretical analysis.Then, based on the idea of deep counterfactual regret minimization (Deep-CFR), an optimization algorithm was designed to find an approximate hybrid-strategy-equilibrium.Agents for both sides following hybrid strategies from the approximate equilibrium were obtained.Theoretical and experimental results show that the attacker should quit the game when its belief reaches a certain threshold for maximizing its payoff.But the defender’s strategy is able to maximize the honeypot’s profit by reducing the attacker’s belief to extend its stay as long as possible and by selecting the most suitable response to attackers with different deception recognition abilities.…”
Get full text
Article -
1617
Binary program taint analysis optimization method based on function summary
Published 2023-04-01“…Taint analysis is a popular software analysis method, which has been widely used in the field of information security.Most of the existing binary program dynamic taint analysis frameworks use instruction-level instrumentation analysis methods, which usually generate huge performance overhead and reduce the program execution efficiency by several times or even dozens of times.This limits taint analysis technology’s wide usage in complex malicious samples and commercial software analysis.An optimization method of taint analysis based on function summary was proposed, to improve the efficiency of taint analysis, reduce the performance loss caused by instruction-level instrumentation analysis, and make taint analysis to be more widely used in software analysis.The taint analysis method based on function summary used function taint propagation rules instead of instruction taint propagation rules to reduce the number of data stream propagation analysis and effectively improve the efficiency of taint analysis.For function summary, the definition of function summary was proposed.And the summary generation algorithms of different function structures were studied.Inside the function, a path-sensitive analysis method was designed for acyclic structures.For cyclic structures, a finite iteration method was designed.Moreover, the two analysis methods were combined to solve the function summary generation of mixed structure functions.Based on this research, a general taint analysis framework called FSTaint was designed and implemented, consisting of a function summary generation module, a data flow recording module, and a taint analysis module.The efficiency of FSTaint was evaluated in the analysis of real APT malicious samples, where the taint analysis efficiency of FSTaint was found to be 7.75 times that of libdft, and the analysis efficiency was higher.In terms of accuracy, FSTaint has more accurate and complete propagation rules than libdft.…”
Get full text
Article -
1618
Optimization of Identification and Zoning Method for Landscape Characters of Urban Historic Districts
Published 2025-01-01“…Then the research utilizes K-means clustering algorithm to optimize the zoning method for historic landscape characters. …”
Get full text
Article -
1619
Optimized detection of insertions/deletions (INDELs) in whole-exome sequencing data.
Published 2017-01-01Get full text
Article -
1620
Optimization of microwave components using machine learning and rapid sensitivity analysis
Published 2024-12-01“…On the other hand, the most widely used nature-inspired algorithms require large numbers of system simulations to yield a satisfactory design. …”
Get full text
Article