[HTML][HTML] Optimal Energy Management Strategies for Hybrid Electric Vehicles: A Recent Survey of Machine Learning Approaches
Abstract Hybrid Electric Vehicles (HEVs) have emerged as a viable option for reducing
pollution and attaining fuel savings in addition to reducing emissions. The effectiveness of …
pollution and attaining fuel savings in addition to reducing emissions. The effectiveness of …
[HTML][HTML] Thermal conductivity improvement in a green building with Nano insulations using machine learning methods
In this paper, the energy loss of the green building is optimized based on the thickness and
lay-up of the Nano-insulation. As different thicknesses and lay-up of the Nano-insulation …
lay-up of the Nano-insulation. As different thicknesses and lay-up of the Nano-insulation …
Path analysis of energy economic management standardization in the context of carbon neutralization and carbon peak
J Liu - Frontiers in Ecology and Evolution, 2023 - frontiersin.org
Carbon neutrality and carbon peak are two important measures to control climate change.
They have a huge impact on many companies in the fields of energy, industry, construction …
They have a huge impact on many companies in the fields of energy, industry, construction …
Machine learning models for predicting bank loan eligibility
UE Orji, CH Ugwuishiwu… - 2022 IEEE Nigeria …, 2022 - ieeexplore.ieee.org
Machine learning algorithms are revolutionizing processes in all fields including; real-estate,
security, bioinformatics, and the financial industry. The loan approval process is one of the …
security, bioinformatics, and the financial industry. The loan approval process is one of the …
The evaluation of online education course performance using decision tree mining algorithm
Y Yang - Complexity, 2021 - Wiley Online Library
With the continuous development of “Internet+ Education”, online learning has become a hot
topic of concern. Decision tree is an important technique for solving classification problems …
topic of concern. Decision tree is an important technique for solving classification problems …
Shannon entropy in artificial intelligence and its applications based on information theory
A Ali, S Anam, MM Ahmed - Journal of Applied and Emerging …, 2023 - journal.buitms.edu.pk
In the 21st century, the era of communication and technology, entropy arises as an
application of information theory in safe data transfer, lossless data compression, data …
application of information theory in safe data transfer, lossless data compression, data …
An mechanical/thermal analytical model for prismatic lithium-ion cells with silicon‑carbon electrodes in charge/discharge cycles
Z Huang, H Wang, Z Gan, T Yang, C Yuan, B Lei… - Applied Energy, 2024 - Elsevier
Conventional lithium-ion cell state analysis methods face challenges in applicability,
efficiency, and convergence for online state evaluation of cells with silicon‑carbon …
efficiency, and convergence for online state evaluation of cells with silicon‑carbon …
Application of data mining based on improved ant colony algorithm in college students' employment and entrepreneurship education
Y Zhang - Soft Computing, 2023 - Springer
Under the background of the new era of economy, the employment and entrepreneurship
education of college students has also ushered in new problems. In the construction of …
education of college students has also ushered in new problems. In the construction of …
[HTML][HTML] Random forests for detecting weak signals and extracting physical information: a case study of magnetic navigation
It has been recently demonstrated that two machine-learning architectures, reservoir
computing and time-delayed feed-forward neural networks, can be exploited for detecting …
computing and time-delayed feed-forward neural networks, can be exploited for detecting …
Description of information security events of production and technological systems using fuzzy graphs
I Kotenko, I Parashchuk - 2022 International Russian …, 2022 - ieeexplore.ieee.org
The issues of using fuzzy graphs to formally describe unreliable (uncertain, fuzzy)
information security events for protecting production and technological systems are …
information security events for protecting production and technological systems are …