-
401
Identifying Strong Connectivity in Urban Road Networks Considering Traffic Constraints: An Analysis of Road Networks With Different Patterns
Published 2025-01-01“…Secondly, combining the Floyd-Warshall algorithm and the depth-first search algorithm, we constructed a strong connectivity effective path search algorithm to adapt to the refined traffic management situation, and identified the key road sections that have the greatest impact on the connectivity of the road network by considering the maximum acceptable level of the path and the road access constraints. …”
Get full text
Article -
402
Examining the Impact of Fingerprint Vector Size on Similarity Determination and Clustering Performance of a Pattern-Based Similarity Metric
Published 2025-01-01“…The correlation-based context similarity coefficient (CSC) metric is a pattern-based fingerprint similarity metric that has gained interest in fingerprint database clustering operations. …”
Get full text
Article -
403
A novel energy pattern factor-based optimized approach for assessing Weibull parameters for wind power applications
Published 2025-01-01“…., Weibull distribution (WD), that fits well with the wind speed data must be known. In this research, we proposed a novel optimized energy pattern factor method (NOEPFM) based on the trust-region-dogleg algorithm and applied it to wind speed data of four cities of the Southern region of Punjab, Pakistan, to determine WD parameters, i.e., shape k and scale c parameters. …”
Get full text
Article -
404
Developing an Algorithm for Detecting Suspicious Trades in Tehran Stock Exchange Based on Spoof Trading Model
Published 2023-03-01“…Thoughtful and accurate manipulation techniques adopted by manipulators may not easily be detected. This research examines stock price manipulation in Tehran Stock Exchange and addresses the identification and detection of stock price manipulation by mathematical algorithm (spoof trading). …”
Get full text
Article -
405
Development and Use of Biotechnological System Models in Applied Scientific Research
Published 2023-12-01“…The system includes three subsystems: two of them have a biological nature and exhibit probabilistic behavior, while the milking machine, serving as a connecting element with inanimate characteristics, is to be regarded as a deterministic technical subsystem. (Research purpose) The research aims to substantiate the conceptual approach to the functioning of an «operator-machine-animal» biotechnical system, taking into account the subsystem interaction patterns. …”
Get full text
Article -
406
An investigation on energy-saving scheduling algorithm of wireless monitoring sensors in oil and gas pipeline networks
Published 2024-10-01“…However, since sensor nodes typically rely on limited battery power, extending the network’s lifecycle and improving energy utilization efficiency have become focal points of research. Therefore, this paper proposes an energy-saving scheduling algorithm based on transformer networks, aimed at optimizing energy consumption and data transmission efficiency of wireless monitoring sensors in oil and gas pipelines. …”
Get full text
Article -
407
Text classification using SVD, BERT, and GRU optimized by improved Seagull optimization (ISO) algorithm
Published 2025-06-01“…In the present research, a Gated Recurrent Unit (GRU) optimized by the Improved Seagull Optimization (ISO) algorithm was utilized to address these issues, resulting in notable improvements in classification performance. …”
Get full text
Article -
408
Enhanced Network Traffic Classification Using Bayesian-Optimized Logistic Regression and Random Forest Algorithm
Published 2025-01-01“…It examines the performance of a logistic regression model enhanced by Bayesian optimization for detecting TOR traffic using the UNB-CIC TOR-NonTOR datasets and a Bayesian-optimized random forest model for the CIC-Darknet2020 dataset. The research evaluates four key machine learning algorithms: Random forest, logistic regression, support vector machine (SVM), and K-nearest neighbors (K-NN). …”
Get full text
Article -
409
Improving Performance of the Convolutional Neural Networks for Electricity Theft Detection by using Cheetah Optimization Algorithm
Published 2022-12-01“…Early detection of abnormal consumers can prevent security and financial losses. Extensive research studies have been done to detect electricity theft by analyzing customer consumption patterns. …”
Get full text
Article -
410
Electricity usage prediction using developed human evolutionary optimization algorithm and Xception neural network
Published 2025-07-01“…Abstract The research paper introduces a novel technique for forecasting electricity usage by utilizing the Developed human evolutionary optimization (DHEO) algorithm and the Xception Neural Network (Xception-NN) model. …”
Get full text
Article -
411
A Cluster Head Selection Algorithm for Extending Last Node Lifetime in Wireless Sensor Networks
Published 2025-05-01“…Experimental results demonstrate that our method significantly extends the lifetime of the last active node compared to representative state-of-the-art algorithms. This research provides a practical and robust solution for energy-efficient WSN operation in real deployment scenarios by considering realistic and application-driven communication behavior along with hardware-level energy consumption.…”
Get full text
Article -
412
Application of Random Forest Algorithm to Analyze the Confidence Level of Forest Fire Hotspots in Riau Peatland
Published 2025-03-01“…The research focuses on peatlands spanning 3.86 million ha, using key variables such as NDVI, surface temperature, and peat thickness derived from satellite data. …”
Get full text
Article -
413
Multi-Threshold Remote Sensing Image Segmentation Based on Improved Black-Winged Kite Algorithm
Published 2025-05-01“…This paper proposes an adaptive multi-threshold image segmentation method named IBKA-OTSU to address the limitations of existing deep learning-based image segmentation methods, particularly their heavy reliance on large-scale annotated datasets and high computational complexity. The proposed algorithm significantly enhances the capability of complex remote sensing scenarios by systematic improvements to core algorithm components, including population initialization strategy, attack behavior patterns, migration mechanisms, and opposition-based learning strategy. …”
Get full text
Article -
414
Quantum Marine Predator Algorithm: A Quantum Leap in Photovoltaic Efficiency Under Dynamic Conditions
Published 2024-11-01“…The Quantum Marine Predator Algorithm (QMPA) presents a groundbreaking solution to the inherent limitations of conventional Maximum Power Point Tracking (MPPT) techniques in photovoltaic systems. …”
Get full text
Article -
415
A New Algorithm Model Based on Extended Kalman Filter for Predicting Inter-Well Connectivity
Published 2024-10-01“…Given that more and more oil reservoirs are reaching the high water cut stage during water flooding, the construction of an advanced algorithmic model for identifying inter-well connectivity is crucial to improve oil recovery and extend the oilfield service life cycle. …”
Get full text
Article -
416
Generation of Julia Sets for a Novel Class of Generalized Rational Functions via Generalized Viscosity Iterative Method
Published 2025-04-01“…This approach enhances existing algorithms, enabling the visualization of intricate fractal patterns as Julia sets. …”
Get full text
Article -
417
Urban growth simulation using cellular automata model and machine learning algorithms (case study: Tabriz metropolis)
Published 2021-12-01“…Also, among the algorithms used in this research, the random forest algorithm based on ensemble learning has a higher advantage than the two-support vector machine and the artificial neural network algorithms.…”
Get full text
Article -
418
Real-time locomotion mode detection in individuals with transfemoral amputation and osseointegration
Published 2025-06-01Get full text
Article -
419
-
420