Search alternatives:
post » most (Expand Search)
Showing 21 - 40 results of 173 for search 'improve post optimization algorithm', query time: 0.14s Refine Results
  1. 21

    Optimizing airway network efficiency with the A-star algorithm: a case study of Ho Chi Minh FIR by Ngoc Hoang Quan Nguyen, Thi Hoai An Vu, Hoang Mai Le, Mai Phuong Nguyen, Thi Thu Tra Le, Thi Thuy Trang Nguyen, Ngoc Nhu Y Nguyen

    Published 2025-06-01
    “…To address these challenges, this study proposes optimizing the airway network in 2D space using the A-star algorithm, tailored for the HCM FIR. …”
    Get full text
    Article
  2. 22
  3. 23

    TBESO-BP: an improved regression model for predicting subclinical mastitis by Kexin Han, Yongqiang Dai, Huan Liu, Junjie Hu, Leilei Liu, Zhihui Wang, Liping Wei

    Published 2025-04-01
    “…In comparison to six alternative models, the TBESO-BP model demonstrates superior accuracy and lower error values.DiscussionThe TBESO-BP model emerges as a precise tool for predicting subclinical mastitis in dairy cows. The TBESO algorithm notably enhances the efficacy of the BP neural network in regression prediction, ensuring elevated computational efficiency and practicality post-improvement.…”
    Get full text
    Article
  4. 24
  5. 25

    Frequency regulation of two-area thermal and photovoltaic power system via flood algorithm by Serdar Ekinci, Davut Izci, Cebrail Turkeri, Aseel Smerat, Absalom E. Ezugwu, Laith Abualigah

    Published 2025-03-01
    “…The implementation details of the FLA-tuned PI controller are provided, and its performance is rigorously compared with PI controllers tuned using several state-of-the-art optimization techniques. These include sea horse optimization, salp swarm algorithm, whale optimization algorithm, shuffled frog-leaping algorithm, and firefly algorithm. …”
    Get full text
    Article
  6. 26
  7. 27

    An application of Arctic puffin optimization algorithm of a production model for selling price and green level dependent demand with interval uncertainty by Hachen Ali, Md. Al-Amin Khan, Ali Akbar Shaikh, Adel Fahad Alrasheedi, Seyedali Mirjalili

    Published 2025-07-01
    “…Furthermore, seven other algorithms (Dandelion Optimizer (DO), Grey wolf optimizer (GWO), The whale optimization algorithm (WOA), Artificial electric field algorithm (AEFA), Harris hawks optimization (HHO), Multi-verse optimizer (MVO) and Slime mould algorithm (SMA)) are used to compare the obtained solution from APO. …”
    Get full text
    Article
  8. 28
  9. 29
  10. 30
  11. 31

    A metaheuristic-based approach for optimizing the allocation of emergency water reservoirs for fire following earthquake suppression by Ali Tanoumand, Mohammadreza Mashayekhi, Ali Majdi, Ehsan Noroozinejad Farsangi

    Published 2025-09-01
    “…Using a metaheuristic algorithm, the optimal allocation zones are identified based on the total distance from urban areas and the FFE risk factor. …”
    Get full text
    Article
  12. 32
  13. 33
  14. 34
  15. 35

    Emergency Resource Dispatch Scheme for Ice Disasters Based on Pre-Disaster Prediction and Dynamic Scheduling by Runyi Pi, Yuxuan Liu, Nuoxi Huang, Jianyu Lian, Xin Chen, Chao Yang

    Published 2025-07-01
    “…First, the fast Newman algorithm is employed to cluster communities, optimizing the preprocessing of resource scheduling and reducing scheduling costs. …”
    Get full text
    Article
  16. 36

    Hardware implementation of RSA encryption algorithm based on pipeline by Yang Longfei, Lu Shi, Peng Kuang

    Published 2024-01-01
    “…To address the high cost of implementing long-bits RSA encryption algorithms in hardware, improvements have been made to the traditional radix-4 Montgomery algorithm. …”
    Get full text
    Article
  17. 37
  18. 38
  19. 39
  20. 40

    Advances in Digital Signature Algorithms: Performance, Security and Future Prospects by Lyu Shuhan

    Published 2025-01-01
    “…The results show that while optimizations improve computational efficiency, challenges persist, especially with potential quantum threats that could undermine these algorithms' security. …”
    Get full text
    Article