-
1901
-
1902
Optimal Sizing of a Hybrid Renewable Energy System for Auxiliary Services in Substations Through Genetic Algorithm and Variable Neighborhood Search
Published 2025-01-01“…Furthermore, a hybrid algorithm, based on Genetic Algorithm (GA) and Variable Neighborhood Search (VNS), is introduced. …”
Get full text
Article -
1903
Co-Optimization of the Hardware Configuration and Energy Management Parameters of Ship Hybrid Power Systems Based on the Hybrid Ivy-SA Algorithm
Published 2025-04-01“…The algorithm is tested with the CEC2017 benchmark functions and outperforms 11 other algorithms. …”
Get full text
Article -
1904
ALGORITHM FOR SELECTING A PUMP AND A DIESEL INTERNAL COMBUSTION ENGINE WHEN ASSEMBLING A PUMPING UNIT FOR RECLAMATION PURPOSES
Published 2024-11-01“…Results. The proposed algorithm has the following stages: source data capture – preliminary selection of a pump and an internal combustion engine – establishment of the pump speed control range – calculation of head, flow rate, power and torque on the pump shaft – digitization of the main characteristics of the internal combustion engine in a given crankshaft speed limit – comparison of pump and engine torques – comparison of pump and internal combustion engine capacities – analysis of graphic data on the torque and power of the pump and internal combustion engine – calculation of the energy characteristic of the water flow (Q·H) and construction of its dependence on RPM – clarification of the number of revolutions of the engine crankshaft to ensure the specified head-flow characteristics of the pump. …”
Get full text
Article -
1905
Micro-classification of orchards and agricultural croplands by applying object based image analysis and fuzzy algorithms for estimating the area under cultivation
Published 2018-03-01“…This approach make use of spectral, environmental, physical and geometrical characteristics (e.g. texture, shape) together images contexts for modeling of land use/cover classes. The main objective of this study is to classify micro land use/cover of Meyandoab County by applying appropriate and effective algorithms and parameters in the object based approach. …”
Get full text
Article -
1906
Using Sono-Electro-Persulfate Process for Atenolol Removal from Aqueous Solutions: Prediction and Optimization with the ANFIS Model and Genetic Algorithm
Published 2022-01-01“…Finally, an adaptive neuro-fuzzy inference system (ANFIS) with 99.63% accuracy and a genetic algorithm (GA) were used to analyze and interpret data and predict optimal conditions. …”
Get full text
Article -
1907
Unveiling smart contract vulnerabilities: Toward profiling smart contract vulnerabilities using enhanced genetic algorithm and generating benchmark dataset
Published 2025-06-01“…Previous methods for analyzing SCs vulnerabilities typically suffer from a lack of accuracy and effectiveness. Many of them, such as rule-based methods, machine learning techniques, and neural networks, also struggle to detect complex vulnerabilities due to limited data availability. …”
Get full text
Article -
1908
Optimal sizing and placement of STATCOM, TCSC and UPFC using a novel hybrid genetic algorithm-improved particle swarm optimization
Published 2024-12-01“…Comparison of GA-IPSO technique with other algorithms such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Improved Grey Wolf Optimization (IGWO) and Differential Evolution Algorithm (DEA) showed that the proposed hybrid technique was superior and more efficient in solving the FACTS optimization problem.…”
Get full text
Article -
1909
Using a seasonal and trend decomposition algorithm to improve machine learning prediction of inflow from the Yellow River, China, into the sea
Published 2025-05-01“…Time decomposition algorithms, combined with machine learning, are effective tools to enhance the capabilities of inflow prediction models. …”
Get full text
Article -
1910
PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM
Published 2019-05-01“…Analysis of the existing methodology for the formation of requirements for information protection systems (GIS) from unauthorized access (NSD) to automated systems (AS) revealed a number of significant flaws, the main of which is the following: despite the fact that the considered method undoubtedly has theoretical significance, the same time, it can not claim practical value. …”
Get full text
Article -
1911
Design and application research of traditional Chinese medicine teaching resource recommendation system based on multivariate data mining driven algorithm
Published 2025-12-01“…In this study, a multivariate data mining-driven algorithm was used to design a teaching resource recommendation system. …”
Get full text
Article -
1912
Petrophysical evaluation of clastic formations in boreholes with incomplete well log dataset by using joint inversion technique and machine learning algorithms
Published 2025-07-01“…Unfortunately, it is not always possible to fulfill these conditions, and in many cases the set of well logs is incomplete. To determine petrophysical parameters (i.e., volumes of laminar, structural and disperse shale) in clastic rocks from incomplete well log data we followed three approaches which are based on a hierarchical model, and on a joint inversion technique: 1) Available well log data (excluding the incomplete well log) are used to train machine learning algorithms to generate a predictive model; 2) the first step of the second approach machine learning algorithms are used to generate the missing data which are subsequently included a joint inversion; 3) in the third approach, machine learning process is used to estimate the missing data which are subsequently included in the prediction of the petrophysical properties. …”
Get full text
Article -
1913
Validation study of health administrative data algorithms to identify individuals experiencing homelessness and estimate population prevalence of homelessness in Ontario, Canada
Published 2019-10-01“…Two reference standard definitions of homelessness were adopted: the housing episode and the annual housing experience (any homelessness within a calendar year).Main outcome measures Sensitivity, specificity, positive and negative predictive values and positive likelihood ratios of 30 case ascertainment algorithms for detecting homelessness using up to eight health service databases.Results Sensitivity estimates ranged from 10.8% to 28.9% (housing episode definition) and 18.5% to 35.6% (annual housing experience definition). …”
Get full text
Article -
1914
An advanced fire detection system for assisting visually challenged people using recurrent neural network and sea-horse optimizer algorithm
Published 2025-07-01“…This manuscript presents a Smart Fire Detection System for Assisting the Blind Using Attention Mechanism-Driven Recurrent Neural Network and Seahorse Optimizer Algorithm (SFDAB-ARNNSHO). The main intention of the SFDAB-ARNNSHO method is to detect and classify fire for blind people. …”
Get full text
Article -
1915
An AI deep learning algorithm for detecting pulmonary nodules on ultra-low-dose CT in an emergency setting: a reader study
Published 2024-11-01“…Abstract Background To retrospectively assess the added value of an artificial intelligence (AI) algorithm for detecting pulmonary nodules on ultra-low-dose computed tomography (ULDCT) performed at the emergency department (ED). …”
Get full text
Article -
1916
Artificial intelligence-driven cybersecurity: enhancing malicious domain detection using attention-based deep learning model with optimization algorithms
Published 2025-07-01“…Abstract Malicious domains are one of the main resources mandatory for adversaries to run attacks over the Internet. …”
Get full text
Article -
1917
Leveraging self attention driven gated recurrent unit with crocodile optimization algorithm for cyberattack detection using federated learning framework
Published 2025-07-01“…This study proposes a Self-Attention Mechanism-Driven Federated Learning for Secure Cyberattack Detection with Crocodile Optimization Algorithm (SAMFL-SCDCOA) methodology. The main objective of the SAMFL-SCDCOA methodology is to provide an effective method for preventing cyberattacks in real time using FL and advanced optimization algorithms. …”
Get full text
Article -
1918
High-efficiency Axial Flow Fan Design by Combining Through-flow Modeling, Optimization Algorithm and Computational Fluid Dynamics Simulation
Published 2025-06-01“…In this study, a high-efficiency axial fan design method and process are proposed by integrating the controlled blading design (CBD) method for the spanwise design of blade angles, the through-flow analysis method incorporating three-dimensional flow effects for performance prediction of the designed fan, and an optimization algorithm suitable for multi-variable problems. The main objective of this study is to obtain the optimal spanwise distribution of blade angles and chord length. …”
Get full text
Article -
1919
Identification and Correction of Phase Unwrapping Errors in Multitemporal Small Baseline DInSAR Interferograms: A Three-Step Cascade Algorithm
Published 2025-01-01“…In particular, the proposed algorithm is based on the cascade of three main steps: the first one consists in reducing the amount of pixels and interferograms to be analyzed for the errors identification by generating a novel parameter for the evaluation of the best possible corrections. …”
Get full text
Article -
1920