Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (25)

Search Parameters:
Keywords = hunter–prey optimization algorithm

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 4018 KB  
Article
HPO-Optimized Bidirectional LSTM for Gas Concentration Prediction in Coal Mine Working Faces
by Xiaoliang Zheng, Shilong Liu and Lei Zhang
Eng 2026, 7(3), 112; https://doi.org/10.3390/eng7030112 - 1 Mar 2026
Viewed by 221
Abstract
An HPO (Hunter–Prey Optimizer)-optimized Bidirectional LSTM (HPO-BiLSTM) model is introduced to address the challenges in predicting gas concentration within coal mining working faces. This study aims to adaptively adjust the key hyperparameters (such as learning rate and number of hidden layer units) of [...] Read more.
An HPO (Hunter–Prey Optimizer)-optimized Bidirectional LSTM (HPO-BiLSTM) model is introduced to address the challenges in predicting gas concentration within coal mining working faces. This study aims to adaptively adjust the key hyperparameters (such as learning rate and number of hidden layer units) of the BiLSTM network through intelligent optimization algorithms. While the BiLSTM architecture inherently mitigates gradient vanishing and exploding problems through its gating mechanisms, the proposed HPO method focuses on addressing the inefficiency of manual parameter tuning and the risk of trapping in local optima that traditional methods encounter when dealing with nonlinear and non-stationary gas concentration time series. The experiment utilized the actual methane monitoring data from the 15117 working face of Jishazhuang Coal Mine in Jinzhong City, Shanxi Province (with a sampling interval of 2 min). The proposed HPO-BiLSTM model was compared with baseline models such as LSTM, BiLSTM, GA-BiLSTM, and PSO-BiLSTM in terms of performance. This study systematically compares the performance of LSTM, BiLSTM, and BiLSTM models optimized with GA, PSO, and HPO. Results demonstrate that all optimized models outperform the baselines, with HPO-BiLSTM achieving the best overall performance. It attained the lowest RMSE and highest R2 across the training, validation, and test sets, showcasing superior fitting and generalization capabilities. Furthermore, HPO-BiLSTM converged to the lowest loss value (0.00062) in only 15 iterations, demonstrating significantly greater efficiency and stability than both GA-BiLSTM (loss 0.00072, 25 iterations) and PSO-BiLSTM (loss 0.00071, 30 iterations). The experiments confirm that the HPO algorithm effectively configures BiLSTM hyperparameters, mitigates overfitting, and provides a more accurate and robust solution for gas concentration prediction in coal mines. Full article
(This article belongs to the Special Issue Artificial Intelligence for Engineering Applications, 2nd Edition)
Show Figures

Figure 1

20 pages, 2525 KB  
Article
A Fault Diagnosis Method for Excitation Transformers Based on HPO-DBN and Multi-Source Heterogeneous Information Fusion
by Mingtao Yu, Jingang Wang, Yang Liu, Peng Bao, Weiguo Zu, Yinglong Deng, Shiyi Chen, Lijiang Ma, Pengcheng Zhao and Jinyao Dou
Energies 2025, 18(20), 5505; https://doi.org/10.3390/en18205505 - 18 Oct 2025
Viewed by 605
Abstract
In response to the limitations of traditional single-signal approaches, which fail to comprehensively reflect fault conditions, and the difficulties of existing feature extraction methods in capturing subtle fault patterns in transformer fault diagnosis, this paper proposes an innovative fault diagnosis methodology. Initially, to [...] Read more.
In response to the limitations of traditional single-signal approaches, which fail to comprehensively reflect fault conditions, and the difficulties of existing feature extraction methods in capturing subtle fault patterns in transformer fault diagnosis, this paper proposes an innovative fault diagnosis methodology. Initially, to address common severe faults in excitation transformers, Principal Component Analysis (PCA) is applied to reduce the dimensionality of multi-source feature data, effectively eliminating redundant information. Subsequently, to mitigate the impact of non-stationary noise interference in voiceprint signals, a Deep Belief Network (DBN) optimized using the Hunter–Prey Optimization (HPO) algorithm is employed to automatically extract deep features highly correlated with faults, thus enabling the detection of complex, subtle fault patterns. For temperature and electrical parameter signals, which contain abundant time-domain information, the Random Forest algorithm is utilized to evaluate and select the most relevant time-domain statistics. Nonlinear dimensionality reduction is then performed using an autoencoder to further reduce redundant features. Finally, a multi-classifier model based on Adaptive Boosting with Support Vector Machine (Adaboost-SVM) is constructed to fuse multi-source heterogeneous information. By incorporating a pseudo-label self-training strategy and integrating a working condition awareness mechanism, the model effectively analyzes feature distribution differences across varying operational conditions, selecting potential unseen condition samples for training. This approach enhances the model’s adaptability and stability, enabling real-time fault diagnosis. Experimental results demonstrate that the proposed method achieves an overall accuracy of 96.89% in excitation transformer fault diagnosis, outperforming traditional models such as SVM, Extreme Gradient Boosting with Support Vector Machine (XGBoost-SVM), and Convolutional Neural Network (CNN). The method proves to be highly practical and generalizable, significantly improving fault diagnosis accuracy. Full article
Show Figures

Figure 1

19 pages, 2322 KB  
Article
A Rolling Bearing Vibration Signal Noise Reduction Processing Algorithm Using the Fusion HPO-VMD and Improved Wavelet Threshold
by Siqi Peng, Jing Xing and Xiaohu Liu
Symmetry 2025, 17(8), 1316; https://doi.org/10.3390/sym17081316 - 13 Aug 2025
Cited by 2 | Viewed by 1175
Abstract
In order to solve the problem of random noise in rolling bearing vibration signals under complex working conditions, this paper use a symmetry VMD theory to set up a rolling bearing vibration signal noise reduction processing algorithm using the fusion HPO-VMD and improved [...] Read more.
In order to solve the problem of random noise in rolling bearing vibration signals under complex working conditions, this paper use a symmetry VMD theory to set up a rolling bearing vibration signal noise reduction processing algorithm using the fusion HPO-VMD and improved wavelet threshold. Based on the theory of variational mode decomposition (VMD), we introduce the hunter–prey optimization (HPO) algorithm to optimize the core parameters of VMD with the minimum envelope entropy as the objective function and obtain the optimal decomposition modes that contain the rolling bearing vibration signal. And then, we propose to use an improved wavelet threshold processing method to denoise the decomposed rolling bearing vibration signal to improve the recognition effect. Through the acquisition and test of the rolling bearing vibration signal, the proposed algorithm is verified; the results show that the method can reduce random noise and avoid the information loss caused by excessive noise reduction and improve the signal-to-noise ratio. Full article
(This article belongs to the Special Issue Symmetry and Its Applications in Computer Vision)
Show Figures

Figure 1

21 pages, 3907 KB  
Article
ANN and RF Optimized by Hunter–Prey Algorithm for Predicting Post-Blast RC Column Morphology
by Kai Rong, Yongsheng Jia, Yingkang Yao, Jinshan Sun, Qi Yu, Hongliang Tang, Jun Yang and Xianqi Xie
Buildings 2025, 15(13), 2351; https://doi.org/10.3390/buildings15132351 - 4 Jul 2025
Viewed by 564
Abstract
The drilling and blasting method is commonly employed for the rapid demolition of outdated buildings by destroying key structural components and inducing progressive collapse. The residual bearing capacity of these components is governed by the deformation morphology of the longitudinal reinforcement, characterized by [...] Read more.
The drilling and blasting method is commonly employed for the rapid demolition of outdated buildings by destroying key structural components and inducing progressive collapse. The residual bearing capacity of these components is governed by the deformation morphology of the longitudinal reinforcement, characterized by bending deflection and exposed height. This study develops and validates a finite element (FE) model of a reinforced concrete (RC) column subjected to demolition blasting. By varying concrete compressive strength, the yield strength of longitudinal reinforcement, the longitudinal reinforcement ratio, and the shear reinforcement ratio, 45 FE models are established to simulate the post-blast morphology of longitudinal reinforcement. Two databases are created: one containing 45 original simulation cases, and an augmented version with 225 cases generated through data augmentation. To predict bending deflection and the exposed height of longitudinal reinforcement, artificial neural network (ANN) and random forest (RF) models are optimized using the hunter–prey optimization (HPO) algorithm. Results show that the HPO-optimized RF model trained on the augmented database achieves the best performance, with MSE, MAE, and R2 values of 0.004, 0.041, and 0.931 on the training set, and 0.007, 0.057, and 0.865 on the testing set, respectively. Sensitivity analysis reveals that the yield strength of longitudinal reinforcement has the most significant impact, while the shear reinforcement ratio has the least influence on both output variables. The partial dependence plot (PDP) analysis indicates that the ratio of shear reinforcement has the most significant impact on the deformation of longitudinal reinforcement. Full article
(This article belongs to the Section Building Structures)
Show Figures

Figure 1

20 pages, 8941 KB  
Article
Comprehensive Analysis of Improved Hunter–Prey Algorithms in MPPT for Photovoltaic Systems Under Complex Localized Shading Conditions
by Zhuoxuan Li, Changxin Fu, Lixin Zhang and Jiawei Zhao
Electronics 2024, 13(21), 4148; https://doi.org/10.3390/electronics13214148 - 22 Oct 2024
Viewed by 1449
Abstract
The Hunter–Prey Optimization (HPO) algorithm represents a novel population-based optimization approach renowned for its efficacy in addressing intricate problems and optimization challenges. Photovoltaic (PV) systems, characterized by multi-peaked shading conditions, often pose a challenge to conventional maximum power point tracking (MPPT) techniques in [...] Read more.
The Hunter–Prey Optimization (HPO) algorithm represents a novel population-based optimization approach renowned for its efficacy in addressing intricate problems and optimization challenges. Photovoltaic (PV) systems, characterized by multi-peaked shading conditions, often pose a challenge to conventional maximum power point tracking (MPPT) techniques in accurately identifying the global maximum power point. In this research, an MPPT control strategy grounded in an improved Hunter–Prey Optimization (IHPO) algorithm is proposed. Eight distinct shading scenarios are meticulously crafted to assess the feasibility and effectiveness of the proposed MPPT method in capturing the maximum power point. A performance evaluation is conducted utilizing both MATLAB/simulation and an embedded system, alongside a comparative analysis with alternative power tracking methodologies, considering the diverse climatic conditions across different seasons. The simulation outcomes demonstrate the capability of the proposed control strategy in accurately tracking the global maximum power point, achieving a commendable efficiency of 100% across seven shading conditions, with a tracking response time of approximately 0.2 s. Verification results obtained from the experimental platform illustrate a tracking efficiency of 98.75% for the proposed method. Finally, the IHPO method’s output performance is evaluated on the StarSim Rapid Control Prototyping (RCP) platform, indicating a substantial enhancement in the tracking efficiency of the photovoltaic system while maintaining rapid response times. Full article
Show Figures

Figure 1

21 pages, 8896 KB  
Article
Ultra-Short-Term Photovoltaic Power Generation Prediction Based on Hunter–Prey Optimized K-Nearest Neighbors and Simple Recurrent Unit
by Yin Tang, Lizhuo Zhang, Dan Huang, Sha Yang and Yingchun Kuang
Appl. Sci. 2024, 14(5), 2159; https://doi.org/10.3390/app14052159 - 5 Mar 2024
Cited by 7 | Viewed by 1748
Abstract
In view of the current problems of complex models and insufficient data processing in ultra-short-term prediction of photovoltaic power generation, this paper proposes a photovoltaic power ultra-short-term prediction model named HPO-KNN-SRU, based on a Simple Recurrent Unit (SRU), K-Nearest Neighbors (KNN), and Hunter–Prey [...] Read more.
In view of the current problems of complex models and insufficient data processing in ultra-short-term prediction of photovoltaic power generation, this paper proposes a photovoltaic power ultra-short-term prediction model named HPO-KNN-SRU, based on a Simple Recurrent Unit (SRU), K-Nearest Neighbors (KNN), and Hunter–Prey Optimization (HPO). Firstly, the sliding time window is determined by using the autocorrelation function (ACF), partial correlation function (PACF), and model training. The Pearson correlation coefficient method is used to filter the principal meteorological factors that affect photovoltaic power. Then, the K-Nearest Neighbors (KNN) algorithm is utilized for effective outlier detection and processing to ensure the quality of input data for the prediction model, and the Hunter–Prey Optimization (HPO) algorithm is applied to optimize the parameters of the KNN algorithm. Finally, the efficient Simple Recurrent Unit (SRU) model is used for training and prediction, with the Hunter–Prey Optimization (HPO) algorithm applied to optimize the parameters of the SRU model. Simulation experiments and extensive ablation studies using photovoltaic data from the Desert Knowledge Australia Solar Centre (DKASC) in Alice Springs, Australia, validate the effectiveness of the integrated model, the KNN outlier handling, and the HPO algorithm. Compared to the Support Vector Regression (SVR), Long Short-Term Memory (LSTM), Temporal Convolutional Network (TCN), and Simple Recurrent Unit (SRU) models, this model exhibits an average reduction of 19.63% in Mean Square Error (RMSE), 27.54% in Mean Absolute Error (MAE), and an average increase of 1.96% in coefficient of determination (R2) values. Full article
(This article belongs to the Section Applied Physics General)
Show Figures

Figure 1

24 pages, 6594 KB  
Article
Voiceprint Fault Diagnosis of Converter Transformer under Load Influence Based on Multi-Strategy Improved Mel-Frequency Spectrum Coefficient and Temporal Convolutional Network
by Hui Li, Qi Yao and Xin Li
Sensors 2024, 24(3), 757; https://doi.org/10.3390/s24030757 - 24 Jan 2024
Cited by 10 | Viewed by 2468
Abstract
In order to address the challenges of low recognition accuracy and the difficulty in effective diagnosis in traditional converter transformer voiceprint fault diagnosis, a novel method is proposed in this article. This approach takes account of the impact of load factors, utilizes a [...] Read more.
In order to address the challenges of low recognition accuracy and the difficulty in effective diagnosis in traditional converter transformer voiceprint fault diagnosis, a novel method is proposed in this article. This approach takes account of the impact of load factors, utilizes a multi-strategy improved Mel-Frequency Spectrum Coefficient (MFCC) for voiceprint signal feature extraction, and combines it with a temporal convolutional network for fault diagnosis. Firstly, it improves the hunter–prey optimizer (HPO) as a parameter optimization algorithm and adopts IHPO combined with variational mode decomposition (VMD) to achieve denoising of voiceprint signals. Secondly, the preprocessed voiceprint signal is combined with Mel filters through the Stockwell transform. To adapt to the stationary characteristics of the voiceprint signal, the processed features undergo further mid-temporal processing, ultimately resulting in the implementation of a multi-strategy improved MFCC for voiceprint signal feature extraction. Simultaneously, load signal segmentation is introduced for the diagnostic intervals, forming a joint feature vector. Finally, by using the Mish activation function to improve the temporal convolutional network, the IHPO-ITCN is proposed to adaptively optimize the size of convolutional kernels and the number of hidden layers and construct a transformer fault diagnosis model. By constructing multiple sets of comparison tests through specific examples and comparing them with the traditional voiceprint diagnostic model, our results show that the model proposed in this paper has a fault recognition accuracy as high as 99%. The recognition accuracy was significantly improved and the training speed also shows superior performance, which can be effectively used in the field of multiple fault diagnosis of converter transformers. Full article
(This article belongs to the Special Issue Sensors and Fault Diagnostics in Power System)
Show Figures

Figure 1

17 pages, 7048 KB  
Article
Low-Resource Language Processing Using Improved Deep Learning with Hunter–Prey Optimization Algorithm
by Fahd N. Al-Wesabi, Hala J. Alshahrani, Azza Elneil Osman and Elmouez Samir Abd Elhameed
Mathematics 2023, 11(21), 4493; https://doi.org/10.3390/math11214493 - 30 Oct 2023
Cited by 8 | Viewed by 5233
Abstract
Low-resource language (LRL) processing refers to the development of natural language processing (NLP) techniques and tools for languages with limited linguistic resources and data. These languages often lack well-annotated datasets and pre-training methods, making traditional approaches less effective. Sentiment analysis (SA), which involves [...] Read more.
Low-resource language (LRL) processing refers to the development of natural language processing (NLP) techniques and tools for languages with limited linguistic resources and data. These languages often lack well-annotated datasets and pre-training methods, making traditional approaches less effective. Sentiment analysis (SA), which involves identifying the emotional tone or sentiment expressed in text, poses unique challenges for LRLs due to the scarcity of labelled sentiment data and linguistic intricacies. NLP tasks like SA, powered by machine learning (ML) techniques, can generalize effectively when trained on suitable datasets. Recent advancements in computational power and parallelized graphical processing units have significantly increased the popularity of deep learning (DL) approaches built on artificial neural network (ANN) architectures. With this in mind, this manuscript describes the design of an LRL Processing technique that makes use of Improved Deep Learning with Hunter–Prey Optimization (LRLP-IDLHPO). The LRLP-IDLHPO technique enables the detection and classification of different kinds of sentiments present in LRL data. To accomplish this, the presented LRLP-IDLHPO technique initially pre-processes these data to improve their usability. Subsequently, the LRLP-IDLHPO approach applies the SentiBERT approach for word embedding purposes. For the sentiment classification process, the Element-Wise–Attention GRU network (EWAG-GRU) algorithm is used, which is an enhanced version of the recurrent neural network. The EWAG-GRU model is capable of processing temporal features and includes an attention strategy. Finally, the performance of the EWAG-GRU model can be boosted by adding the HPO algorithm for use in the hyperparameter tuning process. A widespread simulation analysis was performed to validate the superior results derived from using the LRLP-IDLHPO approach. The extensive results indicate the significant superiority of the performance of the LRLP-IDLHPO technique compared to the state-of-the-art approaches described in the literature. Full article
Show Figures

Figure 1

20 pages, 5134 KB  
Article
An IHPO-WNN-Based Federated Learning System for Area-Wide Power Load Forecasting Considering Data Security Protection
by Bujin Shi, Xinbo Zhou, Peilin Li, Wenyu Ma and Nan Pan
Energies 2023, 16(19), 6921; https://doi.org/10.3390/en16196921 - 1 Oct 2023
Cited by 3 | Viewed by 2108
Abstract
With the rapid growth of power demand and the advancement of new power system intelligence, smart energy measurement system data quality and security are also facing the influence of diversified factors. To solve the series of problems such as low data prediction efficiency, [...] Read more.
With the rapid growth of power demand and the advancement of new power system intelligence, smart energy measurement system data quality and security are also facing the influence of diversified factors. To solve the series of problems such as low data prediction efficiency, poor security perception, and “data islands” of the new power system, this paper proposes a federated learning system based on the Improved Hunter–Prey Optimizer Optimized Wavelet Neural Network (IHPO-WNN) for the whole-domain power load prediction. An improved HPO algorithm based on Sine chaotic mapping, dynamic boundaries, and a parallel search mechanism is first proposed to improve the prediction and generalization ability of wavelet neural network models. Further considering the data privacy in each station area and the potential threat of cyber-attacks, a localized differential privacy-based federated learning architecture for load prediction is designed by using the above IHPO-WNN as a base model. In this paper, the actual dataset of a smart energy measurement master station is selected, and simulation experiments are carried out through MATLAB software to test and examine the performance of IHPO-WNN and the federal learning system, respectively, and the results show that the method proposed in this paper has high prediction accuracy and excellent practical performance. Full article
(This article belongs to the Special Issue Forecasting Techniques for Power Systems with Machine Learning)
Show Figures

Figure 1

22 pages, 8811 KB  
Article
Blockchain-Assisted Machine Learning with Hybrid Metaheuristics-Empowered Cyber Attack Detection and Classification Model
by Ashwag Albakri, Bayan Alabdullah and Fatimah Alhayan
Sustainability 2023, 15(18), 13887; https://doi.org/10.3390/su151813887 - 19 Sep 2023
Cited by 23 | Viewed by 3210
Abstract
Cyber attack detection is the process of detecting and responding to malicious or unauthorized activities in networks, computer systems, and digital environments. The objective is to identify these attacks early, safeguard sensitive data, and minimize the potential damage. An intrusion detection system (IDS) [...] Read more.
Cyber attack detection is the process of detecting and responding to malicious or unauthorized activities in networks, computer systems, and digital environments. The objective is to identify these attacks early, safeguard sensitive data, and minimize the potential damage. An intrusion detection system (IDS) is a cybersecurity tool mainly designed to monitor system activities or network traffic to detect and respond to malicious or suspicious behaviors that may indicate a cyber attack. IDSs that use machine learning (ML) and deep learning (DL) have played a pivotal role in helping organizations identify and respond to security risks in a prompt manner. ML and DL techniques can analyze large amounts of information and detect patterns that may indicate the presence of malicious or cyber attack activities. Therefore, this study focuses on the design of blockchain-assisted hybrid metaheuristics with a machine learning-based cyber attack detection and classification (BHMML-CADC) algorithm. The BHMML-CADC method focuses on the accurate recognition and classification of cyber attacks. Moreover, the BHMML-CADC technique applies Ethereum BC for attack detection. In addition, a hybrid enhanced glowworm swarm optimization (HEGSO) system is utilized for feature selection (FS). Moreover, cyber attacks can be identified with the design of a quasi-recurrent neural network (QRNN) model. Finally, hunter–prey optimization (HPO) algorithm is used for the optimal selection of the QRNN parameters. The experimental outcomes of the BHMML-CADC system were validated on the benchmark BoT-IoT dataset. The wide-ranging simulation analysis illustrates the superior performance of the BHMML-CADC method over other algorithms, with a maximum accuracy of 99.74%. Full article
Show Figures

Figure 1

17 pages, 6302 KB  
Article
Binary Hunter–Prey Optimization with Machine Learning—Based Cybersecurity Solution on Internet of Things Environment
by Adil O. Khadidos, Zenah Mahmoud AlKubaisy, Alaa O. Khadidos, Khaled H. Alyoubi, Abdulrhman M. Alshareef and Mahmoud Ragab
Sensors 2023, 23(16), 7207; https://doi.org/10.3390/s23167207 - 16 Aug 2023
Cited by 13 | Viewed by 2246
Abstract
Internet of Things (IoT) enables day-to-day objects to connect with the Internet and transmit and receive data for meaningful purposes. Recently, IoT has resulted in many revolutions in all sectors. Nonetheless, security risks to IoT networks and devices are persistently disruptive due to [...] Read more.
Internet of Things (IoT) enables day-to-day objects to connect with the Internet and transmit and receive data for meaningful purposes. Recently, IoT has resulted in many revolutions in all sectors. Nonetheless, security risks to IoT networks and devices are persistently disruptive due to the growth of Internet technology. Phishing becomes a common threat to Internet users, where the attacker aims to fraudulently extract confidential data of the system or user by using websites, fictitious emails, etc. Due to the dramatic growth in IoT devices, hackers target IoT gadgets, including smart cars, security cameras, and so on, and perpetrate phishing attacks to gain control over the vulnerable device for malicious purposes. These scams have been increasing and advancing over the last few years. To resolve these problems, this paper presents a binary Hunter–prey optimization with a machine learning-based phishing attack detection (BHPO-MLPAD) method in the IoT environment. The BHPO-MLPAD technique can find phishing attacks through feature selection and classification. In the presented BHPO-MLPAD technique, the BHPO algorithm primarily chooses an optimal subset of features. The cascaded forward neural network (CFNN) model is employed for phishing attack detection. To adjust the parameter values of the CFNN model, the variable step fruit fly optimization (VFFO) algorithm is utilized. The performance assessment of the BHPO-MLPAD method takes place on the benchmark dataset. The results inferred the betterment of the BHPO-MLPAD technique over compared approaches in different evaluation measures. Full article
Show Figures

Figure 1

16 pages, 5000 KB  
Article
Hybrid Hunter–Prey Optimization with Deep Learning-Based Fintech for Predicting Financial Crises in the Economy and Society
by Iyad Katib, Fatmah Y. Assiri, Turki Althaqafi, Zenah Mahmoud AlKubaisy, Diaa Hamed and Mahmoud Ragab
Electronics 2023, 12(16), 3429; https://doi.org/10.3390/electronics12163429 - 14 Aug 2023
Cited by 16 | Viewed by 2316
Abstract
Financial technology (Fintech) plays a pivotal role in driving contemporary technology, society, economies, and many other fields. The new-generation Fintech is Smart Fintech, mainly empowered and inspired by data science and artificial intelligence (DSAI) technologies. Smart Fintech combines DSAI and transforms finance and [...] Read more.
Financial technology (Fintech) plays a pivotal role in driving contemporary technology, society, economies, and many other fields. The new-generation Fintech is Smart Fintech, mainly empowered and inspired by data science and artificial intelligence (DSAI) technologies. Smart Fintech combines DSAI and transforms finance and economies for driving automated, intelligent, personalized financial and economic businesses, services and systems, and the whole of business. The strength and growth of the country’s economy were evaluated with the accurate prediction of how many companies will succeed and how many will fail. Financial crisis prediction (FCP) has a considerable effect on the economy. Prior research focuses mainly on deep learning (DL), machine learning (ML), and statistical approaches for forecasting the financial health of a company. Thus, this study presents a hybrid hunter–prey optimization with a deep learning-based FCP (HHPODL-FCP) technique. The objective of the HHPODL-FCP algorithm lies in the effective identification of the financial crisis in enterprises or organizations. To accomplish this, the HHPODL-FCP method makes use of the HHPO algorithm for the feature subset selection process. In addition, the HHPODL-FCP technique employs the gated attention recurrent network (GARN) model for the identification and classification of financial and non-financial crises. The HHPODL-FCP method exploits a sparrow search algorithm (SSA)-based hyperparameter tuning process to enrich the performance of the GARN model. The simulation results of the HHPODL-FCP method are tested on different financial datasets. A wide range of experiments highlighted the remarkable performance of the HHPODL-FCP method over recent techniques under various measures. Full article
Show Figures

Figure 1

18 pages, 5109 KB  
Article
Electricity Market Price Prediction Based on Quadratic Hybrid Decomposition and THPO Algorithm
by Laiqing Yan, Zutai Yan, Zhenwen Li, Ning Ma, Ran Li and Jian Qin
Energies 2023, 16(13), 5098; https://doi.org/10.3390/en16135098 - 1 Jul 2023
Cited by 8 | Viewed by 1989
Abstract
Electricity price forecasting is a crucial aspect of spot trading in the electricity market and optimal scheduling of microgrids. However, the stochastic and periodic nature of electricity price sequences often results in low accuracy in electricity price forecasting. To address this issue, this [...] Read more.
Electricity price forecasting is a crucial aspect of spot trading in the electricity market and optimal scheduling of microgrids. However, the stochastic and periodic nature of electricity price sequences often results in low accuracy in electricity price forecasting. To address this issue, this study proposes a quadratic hybrid decomposition method based on ensemble empirical modal decomposition (EEMD) and wavelet packet decomposition (WPD), along with a deep extreme learning machine (DELM) optimized by a THPO algorithm to enhance the accuracy of electricity price prediction. To overcome the problem of the optimization algorithm falling into local optima, an improved optimization algorithm strategy is proposed to enhance the optimization-seeking ability of HPO. The electricity price series is decomposed into a series of components using EEMD decomposition and WPD decomposition, and the DELM model optimized by the THPO algorithm is built for each component separately. The predicted values of all the series are then superimposed to obtain the final electricity price prediction. The proposed prediction model is evaluated using electricity price data from an Australian electricity market. The results demonstrate that the proposed improved algorithm strategy significantly improves the convergence performance of the algorithm, and the proposed prediction model effectively enhances the accuracy and stability of electricity price prediction, as compared to several other prediction models. Full article
(This article belongs to the Section C: Energy Economics and Policy)
Show Figures

Figure 1

21 pages, 6448 KB  
Article
Four-Dimensional Trajectory Planning Algorithm for Fixed-Wing Aircraft Formation Based on Improved Hunter—Prey Optimization
by Jianli Wei, Hongjia Fan and Jinghao Li
Electronics 2023, 12(13), 2820; https://doi.org/10.3390/electronics12132820 - 26 Jun 2023
Cited by 5 | Viewed by 2106
Abstract
The aircraft four-dimensional trajectory planning is an important technology for multiple aircraft to achieve cooperation. However, the current four-dimensional trajectory planning technology is mainly used for civil aviation and helicopters and is difficult to meet the requirements of fixed-wing aircraft. This paper proposed [...] Read more.
The aircraft four-dimensional trajectory planning is an important technology for multiple aircraft to achieve cooperation. However, the current four-dimensional trajectory planning technology is mainly used for civil aviation and helicopters and is difficult to meet the requirements of fixed-wing aircraft. This paper proposed a four-dimensional trajectory planning algorithm for a fixed-wing aircraft formation, considering the speed range, turning radius and maximum overload. The improved tau-J strategy (ITJS) is used to generate the four-dimensional trajectory of the aircraft. This strategy is a bio-inspired trajectory planning algorithm that can generate a four-dimensional trajectory with continuous acceleration. Furthermore, the improved hunter–prey optimization (IHPO) algorithm is used to optimize the trajectory to make the generated trajectory meet the constraints and speed up the algorithm convergence. This algorithm improves the updated strategy and initialization strategy based on the hunter–prey optimization (HPO) algorithm, which prevents the algorithm from falling into local optima. The results of the benchmark test function show that the optimization result of the algorithm is improved by more than 10% compared with the original HPO algorithm. The simulation results show that the proposed algorithm jumps out of local optima and generates a trajectory that meets the constraints. Full article
Show Figures

Figure 1

14 pages, 2540 KB  
Article
Machine Learning-Driven Ubiquitous Mobile Edge Computing as a Solution to Network Challenges in Next-Generation IoT
by Moteeb Al Moteri, Surbhi Bhatia Khan and Mohammed Alojail
Systems 2023, 11(6), 308; https://doi.org/10.3390/systems11060308 - 16 Jun 2023
Cited by 12 | Viewed by 3068
Abstract
Ubiquitous mobile edge computing (MEC) using the internet of things (IoT) is a promising technology for providing low-latency and high-throughput services to end-users. Resource allocation and quality of service (QoS) optimization are critical challenges in MEC systems due to the large number of [...] Read more.
Ubiquitous mobile edge computing (MEC) using the internet of things (IoT) is a promising technology for providing low-latency and high-throughput services to end-users. Resource allocation and quality of service (QoS) optimization are critical challenges in MEC systems due to the large number of devices and applications involved. This results in poor latency with minimum throughput and energy consumption as well as a high delay rate. Therefore, this paper proposes a novel approach for resource allocation and QoS optimization in MEC using IoT by combining the hybrid kernel random Forest (HKRF) and ensemble support vector machine (ESVM) algorithms with crossover-based hunter–prey optimization (CHPO). The HKRF algorithm uses decision trees and kernel functions to capture the complex relationships between input features and output labels. The ESVM algorithm combines multiple SVM classifiers to improve the classification accuracy and robustness. The CHPO algorithm is a metaheuristic optimization algorithm that mimics the hunting behavior of predators and prey in nature. The proposed approach aims to optimize the parameters of the HKRF and ESVM algorithms and allocate resources to different applications running on the MEC network to improve the QoS metrics such as latency, throughput, and energy efficiency. The experimental results show that the proposed approach outperforms other algorithms in terms of QoS metrics and resource allocation efficiency. The throughput and the energy consumption attained by our proposed approach are 595 mbit/s and 9.4 mJ, respectively. Full article
(This article belongs to the Special Issue AI, IoT, and Edge Computing for Sustainable Smart Cities)
Show Figures

Figure 1

Back to TopTop