-
661
Back-Analysis of Parameters of Jointed Surrounding Rock of Metro Station Based on Random Forest Algorithm Optimized by Cuckoo Search Algorithm
Published 2022-01-01“…In this method, the mean square error between the measured displacement (stress) and the calculated displacement (stress) is taken as the objective function, and the joint parameters are taken as the decision variables. …”
Get full text
Article -
662
Parental acceptance of novel children's medical syringes and their influencing factors
Published 2025-03-01“…Furthermore, the product's function and price value significantly shape users' behavioral intentions. …”
Get full text
Article -
663
DeBo: Contrast enhancement for image registration using binary differential evolution and bat optimization.
Published 2024-01-01“…In this study, we proposed a hybrid binary differential evolution and BAT optimization model to enhance contrast stretching by optimizing a decision variables in the transformation function. To validate its efficiency, the proposed approach is utilized as a preprocessor before feature extraction in image registration. …”
Get full text
Article -
664
Proportional Topology Optimization algorithm with virtual elements for multi-material problems considering mass and cost constraints
Published 2023-12-01“…., the derivative of the objective function with respect to design variables. Instead, the amount of material distributed into each element is determined proportionally to the contribution of that element to the objective function. …”
Get full text
Article -
665
Numerical Mixing Index: Definition and Application on Concrete Mixer
Published 2025-03-01“…The method predicts the distribution efficiency of the materials within a truck mixer as a function of its internal geometry, rotation speed, and mixture composition. …”
Get full text
Article -
666
Providing a Framework for Performance Evaluation of Organizations in Successfully Implementing TQM, Based on Knowledge Management Approach and Organizational Agility
Published 2023-01-01“…To express the above-given relationship, group interpretive structural modelling (ISM (interpretive structural modelling)) techniques have been used to rank the components of each domain; also, fuzzy quality function deployment (FQFD (fuzzy quality function deployment)) technique has been applied to find the weight and relationship of the three mentioned domains by examining the independent and interface variables of the previous step. …”
Get full text
Article -
667
Research on multi-UAV autonomous obstacle avoidance algorithm integrating improved dynamic window approach and ORCA
Published 2025-04-01“…Confronted with the difficulty of balancing calculation speed and accuracy in the DWA algorithm, a dynamic time step adjusted according to the environment was designed to weigh the computational efficiency. Aiming at the poor environmental adaptability of the DWA algorithm, a trajectory evaluation function with variable weights was put forward to improve environmental fitness. …”
Get full text
Article -
668
Theoretical and technical concept of cemented backfill material for flexible enhanced thermal energy storage in coal underground space
Published 2025-04-01“…The research status of backfill mining is analyzed based on the current coal mining technology and the scientific concept of "cemented backfill material for flexible enhanced thermal energy storage (CBM–FETES)" is proposed by integrating the idea of functional filling. The core of CBM–FETES is to ensure the four essential conditions: the suitability of geological conditions, the feasibility of thermal storage and extraction technologies, high efficiency in heat and mass transfer, and the safety and stability of the operational cycle. …”
Get full text
Article -
669
Multiobjective optimization of suspension bridges via coupled modeling and dual population multiobjective particle swarm optimization
Published 2025-07-01“…The Lasso function is used for elastic net regression analysis to evaluate the impact of design variables on the objective functions. …”
Get full text
Article -
670
A non-dominated sorting based multi-objective neural network algorithm of ethylene glycol hydrogenation reactor in energy reduction
Published 2024-12-01“…Artificial intelligence (AI) can be applied to various ethylene glycol (EG) production aspects to improve efficiency, quality, and overall process optimization. …”
Get full text
Article -
671
Global path planning algorithm for mining vehicles integrating simplified visibility graph and A* algorithm
Published 2024-10-01“…To address the low path planning efficiency of mining vehicles in narrow, winding underground tunnels with unknown obstacles, a global path planning algorithm, DVGA*, was proposed, integrating simplified visibility graphs (SVG) and the A* algorithm. …”
Get full text
Article -
672
Methods to Quantitatively Evaluate the Effect of Shale Gas Fracturing Stimulation Based on Least Squares
Published 2025-07-01“…Advanced optimization algorithms were employed to efficiently address both the fitting and calculation tasks. …”
Get full text
Article -
673
Decomposed Linear Dynamical Systems (dLDS) models reveal instantaneous, context-dependent dynamic connectivity in C. elegans
Published 2025-08-01“…Abstract Mounting evidence indicates that neural “tuning” can be highly variable within an individual across time and across individuals. …”
Get full text
Article -
674
On the Modular Design Application for the Gas Turbine Sector: A Performance Optimization Approach in the Context of Industry 4.0
Published 2025-02-01“…Indeed, this study presents the functioning of the novel application, the different deployed components and their variables, such as the compressor efficiency, heat exchangers, or turbine stages, and the decision variable, e.g., the costs of generated energy. …”
Get full text
Article -
675
Possibilities of Using Artificial Intelligence in Security Analysis
Published 2024-12-01“…In total, out of twelve features/variables that make up analytical imagination, artificial intelligence already functions efficiently (or will function efficiently soon) in practically all of them.…”
Get full text
Article -
676
New Approach of Blind Adaptive Equalizer Based on Genetic Algorithms
Published 2025-01-01“…Unlike traditional methods that rely on linear programming and suffer from local minima issues, this technique utilizes a stochastic linear programming cost function with GAs for robust optimization. The proposed method termed Blind Linear Equalizer based on genetic algorithm (BLE-GA) enhances performance by leveraging a GA’s ability to handle stochastic variables, offering rapid convergence and resilience against signal noise and inter-symbol interference. …”
Get full text
Article -
677
Predicting the onset of chronic kidney disease (CKD) for diabetic patients with aggregated longitudinal EMR data.
Published 2025-01-01“…This research focuses on developing a predictive model to classify diabetic patients showing signs of kidney function impairment based on their CKD development risk. …”
Get full text
Article -
678
Assignment of the cutting mode when boring holes on CNC machine
Published 2023-10-01“…In addition, positive feedback is taken into account through the delay argument function, which represents machining along traces. …”
Get full text
Article -
679
Universal Simulation Model of Battery Degradation with Optimization of Parameters by Genetic Algorithm
Published 2022-12-01“…A simple empirical model is presented that does not consider in detail the characteristics of the state of batteries during a separate charge-discharge cycle, and does not include voltaic variables. The model considers the intensity of the current wear of the battery as a function of the state of its charge, temperature, the current of the external circuit and the current of self-discharge, the full charge that has flowed through the battery since the beginning of its operation. …”
Get full text
Article -
680
Stability and Optimal Control Analysis for a Fractional-Order Industrial Virus-Propagation Model Based on SCADA System
Published 2025-04-01“…The growing interconnectivity among systems enhances operational efficiency and also increases network security threats, especially attacks from industrial viruses. …”
Get full text
Article