Search alternatives:
whale » whole (Expand Search)
Showing 5,401 - 5,420 results of 5,910 for search '"\"((\\"(whale OR while) optimizer algorithm\\") OR (\\"(whale OR while) optimize algorithm\\"))\""', query time: 0.25s Refine Results
  1. 5401

    Research on the effectiveness of data compression methods in relational and NoSQL DBMS by V. A. Egunov, V. S. Surin, P. S. Stupnitskiy, R. D. Akhmetova

    Published 2024-04-01
    “…Data compression in OpenSearch is more efficient than in MySQL when using standard algorithms. OpenSearch is an excellent choice if youneed to conserve storage resources while making optimal use of the processor, otherwise both systems will do the job well.…”
    Get full text
    Article
  2. 5402

    Convolutional neural network model over encrypted data based on functional encryption by Chen WANG, Jiarun LI, Jian XU

    Published 2024-03-01
    “…Currently, homomorphic encryption, secure multi-party computation, and other encryption schemes are used to protect the privacy of sensitive data in outsourced convolutional neural network (CNN) models.However, the computational and communication overhead caused by the above schemes would reduce system efficiency.Based on the low cost of functional encryption, a new convolutional neural network model over encrypted data was constructed using functional encryption.Firstly, two algorithms based on functional encryption were designed, including inner product functional encryption and basic operation functional encryption algorithms to implement basic operations such as inner product, multiplication, and subtraction over encrypted data, reducing computational and communication costs.Secondly, a secure convolutional computation protocol and a secure loss optimization protocol were designed for each of these basic operations, which achieved ciphertext forward propagation in the convolutional layer and ciphertext backward propagation in the output layer.Finally, a secure training and classification method for the model was provided by the above secure protocols in a module-composable way, which could simultaneously protect the confidentiality of user data as well as data labels.Theoretical analysis and experimental results indicate that the proposed model can achieve CNN training and classification over encrypted data while ensuring accuracy and security.…”
    Get full text
    Article
  3. 5403

    Addressing grading bias in rock climbing: machine and deep learning approaches by B. O’Mara, M. S. Mahmud

    Published 2025-01-01
    “…The primary three approaches were from a route-centric, climber-centric, or path finding and path generation context. Of these, the most optimal methods used natural language processing or recurrent neural network algorithms. …”
    Get full text
    Article
  4. 5404

    Review of the Research on Underwater Explosion Ice-Breaking Technology by Xiao Huang, Zi-Xian Zhong, Xiao Luo, Yuan-Dong Wang

    Published 2025-07-01
    “…Key findings establish that shock waves initiate brittle fracture via stress superposition while bubble pulsation drives crack propagation through pressure oscillation; optimal ice fragmentation depends critically on charge weight, standoff distance, and ice thickness. …”
    Get full text
    Article
  5. 5405

    Exploring Machine Learning Models for Vault Safety in ICL Implantation: A Comparative Analysis of Regression and Classification Models by Qing Zhang, Qi Li, Zhilong Yu, Ruibo Yang, Emmanuel Eric Pazo, Yue Huang, Hui Liu, Chen Zhang, Salissou Moutari, Shaozhen Zhao

    Published 2025-06-01
    “…Regression and classification models were developed using gradient boosting, random forest, and CatBoost algorithms. Regression models predicted vault height as a continuous variable, while classification models categorized vault heights into binary and multi-class tasks. …”
    Get full text
    Article
  6. 5406

    Revolutionizing pharmacology: AI-powered approaches in molecular modeling and ADMET prediction by Irfan Pathan, Arif Raza, Adarsh Sahu, Mohit Joshi, Yamini Sahu, Yash Patil, Mohammad Adnan Raza, Ajazuddin

    Published 2025-12-01
    “…The fusion of Artificial intelligence (AI) with computational chemistry has revolutionized drug discovery by enhancing compound optimization, predictive analytics, and molecular modeling. …”
    Get full text
    Article
  7. 5407

    ON TRAVERSABILITY COST EVALUATION FROM PROPRIOCEPTIVE SENSING FOR A CRAWLING ROBOT by Jakub Mrva, Martin Stejskal, Jan Faigl

    Published 2015-12-01
    “…This paper addresses the problem of traversability cost evaluation based on proprioceptive sensing for a hexapod walking robot while optimizing different criteria. We present several methods of evaluating the robot-terrain interaction that can be used as a cost function for an assessment of the robot motion that can be utilized in high-level path-planning algorithms.…”
    Get full text
    Article
  8. 5408

    Advanced parameter tuning scheme for double CFO based fractional order composite controller synthesis method by Siyi Chen, Yang Shu, Haiyang Kuang, Dongqi Cheng, Ying Luo

    Published 2025-12-01
    “…This method sequentially employs D-decomposition and optimization algorithms to address these challenges. …”
    Get full text
    Article
  9. 5409

    Utilizing UAVs in Wireless Networks: Advantages, Challenges, Objectives, and Solution Methods by Mohammad Javad Sobouti, Amirhossein Mohajerzadeh, Haitham Y. Adarbah, Zahra Rahimi, Hamed Ahmadi

    Published 2024-10-01
    “…Additionally, we discuss the main methods and algorithms employed for UAV placement and trajectory optimization. …”
    Get full text
    Article
  10. 5410

    Deep Clustering of Student Code Strategies Using Multi-View Code Representation (CMVAE) by Zhengting Tang, Shizhou Wang, Liangyu Chen

    Published 2025-03-01
    “…The model captures structural features by transforming code into tree graphs and extracting centrality measures, while CodeBERT provides semantic embeddings. Through a joint optimization of reconstruction loss and clustering loss, the model effectively integrates multiple code representations. …”
    Get full text
    Article
  11. 5411

    Integrated Waste Management in the Circular Economy Era: Insights from Research and Practice by Charisios Achillas, Christos Vlachokostas

    Published 2025-02-01
    “…Technological advancements, such as AI-driven waste sorting and route optimization algorithms, are highlighted alongside policy frameworks supporting circular economy principles. …”
    Get full text
    Article
  12. 5412

    Revolutionizing Supply Chain Management With AI: A Path to Efficiency and Sustainability by Kassem Danach, Ali El Dirani, Hassan Rkein

    Published 2024-01-01
    “…Through an in-depth analysis of various AI techniques—such as machine learning, predictive analytics, and optimization algorithms—this study offers novel insights into their applicability in solving complex supply chain problems like demand forecasting, inventory management, and logistics optimization. …”
    Get full text
    Article
  13. 5413

    Privacy-preserving method for face recognition based on homomorphic encryption. by Zhigang Song, Gong Wang, Wenqin Yang, Yunliang Li, Yinsheng Yu, Zeli Wang, Xianghan Zheng, Yang Yang

    Published 2025-01-01
    “…To overcome this limitation, this paper introduces an optimization scheme based on clustering algorithms to accelerate the facial recognition process within the HE_FaceNet framework. …”
    Get full text
    Article
  14. 5414

    A Clinically Interpretable Approach for Early Detection of Autism Using Machine Learning With Explainable AI by Oishi Jyoti, Hafsa Binte Kibria, Zareen Tasnim Pear, Md Nahiduzzaman, Md. Faysal Ahamed, Khandaker Reajul Islam, Jaya Kumar, Muhammad E. H. Chowdhury

    Published 2025-01-01
    “…This study focuses on optimizing and comparing various machine learning models for ASD diagnosis, while incorporating explainable AI techniques to ensure model transparency and interpretability. …”
    Get full text
    Article
  15. 5415

    Enhancing anomaly detection in IoT-driven factories using Logistic Boosting, Random Forest, and SVM: A comparative machine learning approach by Mohammed Aly, Mohamed H. Behiry

    Published 2025-07-01
    “…Abstract Three machine learning algorithms—Logistic Boosting, Random Forest, and Support Vector Machines (SVM)—were evaluated for anomaly detection in IoT-driven industrial environments. …”
    Get full text
    Article
  16. 5416

    SLR Systematic Literature Review: Metode Penilaian Kinerja Karyawan Menggunakan Human Performance Technology by Roni Habibi, Artha Glory Romey Manurung

    Published 2023-11-01
    “…Therefore, this systematic literature review is carried out to identify the methods used for employee performance appraisal and mentions that optimization algorithms and fuzzy comprehensive methods are used as evaluation methods to assess performance appraisal methods. …”
    Get full text
    Article
  17. 5417

    Design of Gain-Scheduled Lateral Controllers for Autonomous Vehicles by Ákos Bokor, Ádám Szabó, Szilárd Aradi, László Palkovics

    Published 2024-11-01
    “…The results show that while traditional controllers, such as Pure Pursuit, perform adequately under constant speed conditions, adaptive model-based algorithms significantly enhance the performance, especially in dynamic driving situations involving speed variations.…”
    Get full text
    Article
  18. 5418

    Intelligent Modeling; Single (Multi-layer perceptron) and Hybrid (Neuro-Fuzzy Network) Method in Forest Degradation (Case Study: Sari County) by somayeh mehrabadi

    Published 2021-03-01
    “…The mean squared error (MSE) was used to evaluate the performance of models, which was 0.0535, 0.0704, and 0.0908 for the perceptron neural network in the Levenberg-Marquardt, Bayesian regularization, and scaled conjugate gradient algorithms, respectively. Also, the MSE value for the neuro-fuzzy model in the optimization and hybrid algorithms was 0.0190 and 0.0102, respectively. …”
    Get full text
    Article
  19. 5419

    Modern fixation techniques versus traditional tension band wiring for olecranon fractures: a systematic review and meta-analysis of functional outcomes, healing time, and complicat... by Chengjing Wang, Changqing Li

    Published 2025-08-01
    “…Cable-pin System appears optimal for simple fractures, while Eyelet K-wire System shows advantages for comminuted fractures. …”
    Get full text
    Article
  20. 5420

    GAB-YOLO: a lightweight deep learning model for real-time detection of abnormal behaviors in juvenile greater amberjack fish by Mingxin Liu, Mingxin Liu, Chun Zhang, Cong Lin, Cong Lin

    Published 2025-05-01
    “…Finally, the introduction of the Wise-ShapeIoU loss function further accelerates the model’s convergence and optimization process. Experimental results demonstrate that, compared to the original model, the number of parameters and FLOPs are reduced by 36.7% and 28.4%, respectively, while the Precision is increased by 5.1%. …”
    Get full text
    Article