Showing 1,861 - 1,880 results of 2,363 for search 'integration construction algorithm', query time: 0.11s Refine Results
  1. 1861
  2. 1862

    Study of Synergetic Optimization Operation for Distribution Network Considering Multiple Reactive Power Output Modes of Photovoltaics and Different Port Numbers of Flexible Interco... by Yijin Li, Jibo Wang, Zihao Zhang, Wenhao Xu, Ming Wu, Geng Niu

    Published 2025-03-01
    “…An optimization model with the aim of reducing voltage deviation, network loss, and the ratio of PV abandonment was constructed. Three algorithms were used for solving the multi-objective optimization model. …”
    Get full text
    Article
  3. 1863

    Multi-source data-driven Bayesian network for risk analysis of maritime accidents in the high sea by Xiaotong Qu, Chengbo Wang, Chengbo Wang, Ruijia Zhao, Mingxing Fang, Mingxing Fang, Mingxing Fang, Xinlian Xie

    Published 2025-06-01
    “…Informed by a two-stage risk evolution theory, this approach integrates evidence from structured data, text analysis, and expert knowledge to construct a unified network structure, ensuring that derived causal relationships align with both statistical evidence and domain expertise. …”
    Get full text
    Article
  4. 1864

    An optimized ensemble model with advanced feature selection for network intrusion detection by Afaq Ahmed, Muhammad Asim, Irshad Ullah, Zainulabidin, Abdelhamied A. Ateya

    Published 2024-11-01
    “…To address this challenge, our study presents the “Optimized Random Forest (Opt-Forest),” an innovative ensemble model that combines decision forest approaches with genetic algorithms (GAs) for enhanced intrusion detection. The genetic algorithms based decision forest construction offers notable benefits by traversing a wider exploration space and mitigating the risk of becoming stuck in local optima, resulting in the discovery of more accurate and compact decision trees. …”
    Get full text
    Article
  5. 1865

    Prediction and Optimization of Bolt Parameters for Automotive Fuel Cell Stack under Random Vibration by Yao Junqi, Yin Yan, Wang Bowen, Zhang Fan, Qin Zhikun, Wang Zixuan, Guo Ting

    Published 2025-01-01
    “…By integrating XGBoost with a genetic algorithm (GA), a GA-XGBoost predictive model is developed to optimize the structural parameters of the fastening bolts. …”
    Get full text
    Article
  6. 1866

    Surface Roughness Prediction of Bearing Ring Precision Grinding Based on Feature Extraction by Chaoyu Shi, Bohao Chen, Yao Shi, Jun Zha

    Published 2025-05-01
    “…Grinding, as the most crucial finishing process for bearing rings, influences the surface integrity of bearings through the roughness of the ground surface. …”
    Get full text
    Article
  7. 1867

    Population-Level Cell Trajectory Inference Based on Gaussian Distributions by Xiang Chen, Yibing Ma, Yongle Shi, Yuhan Fu, Mengdi Nan, Qing Ren, Jie Gao

    Published 2024-11-01
    “…CPvGTI utilizes a Gaussian mixture model, optimized by the Expectation–Maximization algorithm, to construct new cell populations in the original data space. …”
    Get full text
    Article
  8. 1868

    Predictive analytics in gamified education: A hybrid model for identifying at-risk students by Devanshu Sawarkar, Latika Pinjarkar, Pratham Agrawal, Devansh Motghare

    Published 2025-12-01
    “…This research proposes a hybrid predictive model designed to identify at-risk students within a gamified education environment accurately. By integrating logistic regression, decision trees, and random forests, we construct a robust ensemble model that leverages the strengths of each algorithm for precise risk assessment. …”
    Get full text
    Article
  9. 1869

    Detection and Optimization of Photovoltaic Arrays’ Tilt Angles Using Remote Sensing Data by Niko Lukač, Sebastijan Seme, Klemen Sredenšek, Gorazd Štumberger, Domen Mongus, Borut Žalik, Marko Bizjak

    Published 2025-03-01
    “…LiDAR data are used to construct a 2.5D grid to estimate the modules’ tilt (inclination) and aspect (orientation) angles. …”
    Get full text
    Article
  10. 1870

    Towards Intelligent Unmanned Adversarial Games: A Reinforcement Learning Framework with the PHP-ROW Method by Guoqing Shi, Yi Cao, Dinghan Wang, Qiming Yang, Jiandong Zhang, Zhuoyong Shi

    Published 2025-04-01
    “…The superiority of the PHP-ROW method is showcased by contrasting it against the conventional proximal policy optimization (PPO) algorithm. Conclusively, the utility and efficacy of the presented framework are corroborated through human–machine adversarial game simulations in a hyper-realistic environment. …”
    Get full text
    Article
  11. 1871

    A trajectory planning and tracking method based on deep hierarchical reinforcement learning by Jiajie Zhang, Bao-Lin Ye, Xin Wang, Lingxi Li, Bo Song

    Published 2025-06-01
    “…We design an upper-level decision model based on the trust region policy optimization algorithm integrated with long short-term memory to obtain more accurate strategies. …”
    Get full text
    Article
  12. 1872

    Improvement of Network Traffic Prediction in Beyond 5G Network using Sparse Decomposition and BiLSTM Neural Network by Rihab Abdullah Jaber Al Hamadani, Mahdi Mosleh, Ali Hashim Abbas Al-Sallami, Rasool Sadeghi

    Published 2025-04-01
    “…Next, sparse feature extraction is performed using Discrete Wavelet Transform (DWT), and a sparse matrix is constructed. A Genetic Algorithm (GA) is used to optimize the sparse matrix, which effectively selects the most significant features for prediction. …”
    Get full text
    Article
  13. 1873

    Research on Civil Aviation Airport Site Selection Considering Group Consensus Level Under Large-Scale Uncertain Information by Rui Wang, Jing-Han Zeng, Jing-Yang Huang, Rui Kang, Jiang Yuan, Qing-Wei Zhong

    Published 2025-05-01
    “…The method comprises five key processes: (1) Evaluation process: Based on the constructed multicriteria evaluation system for airport site selection, the q-Rung Orthopair Fuzzy (q-ROF) information is employed to represent evaluations from large-scale decision makers, which effectively characterizes the uncertainty of information and broadens the evaluative scope. (2) Clustering process: A clustering procedure is designed for large-scale q-ROF evaluation data and weight information of criteria, identifying and removing outliers. (3) Consensus reaching process: Considering the characteristics of q-ROF evaluations and multiplicative preference relations, two adaptive consensus reaching algorithms are developed to enhance group consensus levels, thereby improving the rationality of decision-making results. (4) Weight determination process: Criteria and subcriteria weights are calculated using multiplicative preference weighting approach and a deviation maximization model, respectively, derived from aggregated group evaluations. (5) Ranking process: The q-ROF Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) method is applied, in conjunction with the induced q-ROF information integration paradigm, to comprehensively rank the alternative sites. …”
    Get full text
    Article
  14. 1874

    Transfer Kernel Extreme Learning Machine Based on Bidirectional Cross Domain Approximation by Yuanxiao Zeng, Huimin Li, Yanbing Song

    Published 2025-01-01
    “…Subsequently, these SDCDMAs are integrated with KELM to construct two transfer KELMs respectively. …”
    Get full text
    Article
  15. 1875

    Research on Self-Diagnosis and Self-Healing Technologies for Intelligent Fiber Optic Sensing Networks by Ruiqi Zhang, Liang Fan, Dongzhu Lu

    Published 2025-03-01
    “…To address the issue of insufficient reliability of fiber optic sensing networks in complex environments, this study proposes a self-diagnosis and self-healing method based on intelligent algorithms. This method integrates redundant fiber paths and a fault detection mechanism, enabling rapid data transmission recovery through redundant paths during network faults, ensuring the stable operation of the monitoring system. …”
    Get full text
    Article
  16. 1876

    Node Classification Method Based on Hierarchical Hypergraph Neural Network by Feng Xu, Wanyue Xiong, Zizhu Fan, Licheng Sun

    Published 2024-11-01
    “…The HCHG combines the high-order relationship-capturing capability of hypergraphs, uses the Louvain community detection algorithm to identify community structures within the network, and constructs hypergraphs layer by layer. …”
    Get full text
    Article
  17. 1877

    YOLO-HVS: Infrared Small Target Detection Inspired by the Human Visual System by Xiaoge Wang, Yunlong Sheng, Qun Hao, Haiyuan Hou, Suzhen Nie

    Published 2025-07-01
    “…To address challenges of background interference and limited multi-scale feature extraction in infrared small target detection, this paper proposes a YOLO-HVS detection algorithm inspired by the human visual system. Based on YOLOv8, we design a multi-scale spatially enhanced attention module (MultiSEAM) using multi-branch depth-separable convolution to suppress background noise and enhance occluded targets, integrating local details and global context. …”
    Get full text
    Article
  18. 1878

    The numerical solution of the nonlinear boundary value problem with singularity for the system of delay integrodifferential-algebraic equations by M.N. Afanaseva, E.B. Kuznetsov

    Published 2019-06-01
    “…To find the value of the integral components of the problem, the trapezoid method was used. …”
    Get full text
    Article
  19. 1879

    An Adaptive Multi-Bernoulli Filter for Coexisting Point Target and Extended Target Tracking With Unknown Detection Probability by Yuansheng Li, Ling Cui, Junhu Ma, Zhaohui Luo

    Published 2025-01-01
    “…Simulation results verify the effectiveness and robustness of the proposed algorithm.…”
    Get full text
    Article
  20. 1880

    Lattice-Based Certificateless Proxy Re-Signature for IoT: A Computation-and-Storage Optimized Post-Quantum Scheme by Zhanzhen Wei, Gongjian Lan, Hong Zhao, Zhaobin Li, Zheng Ju

    Published 2025-08-01
    “…This ensures the security and integrity of multi-party communication in quantum-threat environments. …”
    Get full text
    Article