Results 51 to 60 of about 27,916 (231)

Energy Optimization Strategy for Reconfigurable Distribution Network with High Renewable Penetration Based on Bald Eagle Search Algorithm

open access: diamondEnergy Engineering
: This paper proposes a cost-optimal energy management strategy for reconfigurable distribution networks with high penetration of renewable generation. The proposed strategy accounts for renewable generation costs, maintenance and operating expenses of ...
Jian Wang   +4 more
openalex   +2 more sources

An Advanced Bald Eagle Search Algorithm for Image Enhancement [PDF]

open access: diamondComputers, Materials & Continua
Pei Hu, Yibo Han, Jeng‐Shyang Pan
openalex   +2 more sources

BES-OEERP: Bald Eagle Search Inspired Optimized Energy-Efficient Routing Protocol for IoT assisted WSNs

open access: diamondInternational Energy Journal
WSN technology is widely used in IoT to gather data from several sensors and transmit it to a central server or BS for processing and analysis. IoT applications that demand real time data collecting from dispersed sources are made possible by WSN.
Soni Chaurasia   +3 more
openalex   +2 more sources

Prevalence and Genetic Diversity of Haemoproteus and Leucocytozoon in Raptors and Other Captive Birds at the National Zoological Garden in South Africa. [PDF]

open access: yesIntegr Zool
Captive birds at the National Zoological Garden in South Africa harbor diverse haemosporidian parasite species and lineages. This might compromise conservation efforts of threatened species. ABSTRACT Avian haemosporidian infections have been associated with disease outbreaks in zoos and rehabilitation centers globally. This study aimed to determine the
Gaorekwe RM   +3 more
europepmc   +2 more sources

Efficient Multiuser Computation for Mobile-Edge Computing in IoT Application Using Optimization Algorithm

open access: yesApplied Bionics and Biomechanics, 2021
Mobile edge computing (MEC) is a paradigm novel computing that promises the dramatic effect of reduction in latency and consumption of energy by computation offloading intensive; these tasks to the edge clouds in proximity close to the smart mobile users.
Tawfiq Hasanin   +5 more
doaj   +1 more source

Optimal Cluster Head Selection in WSN with Convolutional Neural Network-Based Energy Level Prediction

open access: yesSensors, 2022
Currently, analysts in a variety of nations have developed various WSN clustering protocols. The major characteristic is the Low Energy Adaptive Clustering Hierarchy (LEACH), which attained the objective of energy balance by sporadically varying the ...
Sasikumar Gurumoorthy   +3 more
doaj   +1 more source

Radiometric Constraints on the Timing, Tempo, and Effects of Large Igneous Province Emplacement

open access: yesGeophysical Monograph Series, Page 27-82., 2021

Exploring the links between Large Igneous Provinces and dramatic environmental impact

An emerging consensus suggests that Large Igneous Provinces (LIPs) and Silicic LIPs (SLIPs) are a significant driver of dramatic global environmental and biological changes, including mass extinctions.
Jennifer Kasbohm   +2 more
wiley  

+1 more source

Soil moisture content prediction model for tea plantations based on SVM optimised by the bald eagle search algorithm

open access: yesCognitive Computation and Systems, 2021
In order to solve the problem of low accuracy and efficiency of soil moisture content prediction in tea plantations and improve the level of soil water content prediction, a soil moisture content prediction model for tea plantations based on the support ...
Ying Huang   +4 more
doaj   +1 more source

A Multi-Objective Hybrid BESSA Optimization Scheme for Parameter Extraction from PV Modules

open access: yesApplied Sciences, 2023
In this work, a multi-objective Hybrid Bald Eagle Search Simulated Annealing (Hybrid BESSA) parameter extraction technique for photovoltaic (PV) modules is discussed.
Nutan Saha, Prakash Chandra Mishra
doaj   +1 more source

Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption

open access: yesAlexandria Engineering Journal, 2023
In the digital era, information security becomes a challenging process that can be mitigated by the utilization of cryptography and steganography techniques.
Adel A. Bahaddad   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy