Search alternatives:
improved most » improved model (Expand Search)
cost » post (Expand Search)
Showing 2,621 - 2,640 results of 3,190 for search '(( improve cost optimization algorithm ) OR ( improved most optimization algorithm ))', query time: 0.29s Refine Results
  1. 2621

    Molecular biomarkers in salivary diagnostic materials: Point-of-Care solutions — PoC-Diagnostics and -Testing by Ziyad S. Haidar

    Published 2025-02-01
    “…Addressing these challenges requires continued research into improving assay sensitivity, data integration, and cost-effectiveness. …”
    Get full text
    Article
  2. 2622

    Proactive Data Placement in Heterogeneous Storage Systems via Predictive Multi-Objective Reinforcement Learning by Suchuan Xing, Yihan Wang

    Published 2025-01-01
    “…Through comprehensive evaluation using both synthetic and real-world traces from deep learning training workloads, our method demonstrates substantial improvements over state-of-the-art algorithms: achieving up to 45.1% reduction in average I/O latency, 32.5% improvement in throughput for critical applications, and 28.8% reduction in storage costs. …”
    Get full text
    Article
  3. 2623

    Fish Detection Using Deep Learning by Suxia Cui, Yu Zhou, Yonghui Wang, Lujun Zhai

    Published 2020-01-01
    “…Authors of this article have learned the necessity of platform upgrade from a previous AUV design project, and would like to share the experience of one task extension in the area of fish detection. Because most of the embedded systems have been improved by fast growing computing and sensing technologies, which makes them possible to incorporate more and more complicated algorithms. …”
    Get full text
    Article
  4. 2624

    Artificial intelligence tools for engagement prediction in neuromotor disorder patients during rehabilitation by Simone Costantini, Anna Falivene, Mattia Chiappini, Giorgia Malerba, Carla Dei, Silvia Bellazzecca, Fabio A. Storm, Giuseppe Andreoni, Emilia Ambrosini, Emilia Biffi

    Published 2024-12-01
    “…This study aimed at methodologically exploring the performance of artificial intelligence (AI) algorithms applied to structured datasets made of heart rate variability (HRV) and electrodermal activity (EDA) features to predict the level of patient engagement during RAGR. …”
    Get full text
    Article
  5. 2625

    An Efficient Design of DCT Approximation Based on Quantum Dot Cellular Automata (QCA) Technology by Ismail Gassoumi, Lamjed Touil, Bouraoui Ouni, Abdellatif Mtibaa

    Published 2019-01-01
    “…Optimization for power is one of the most important design objectives in modern digital image processing applications. …”
    Get full text
    Article
  6. 2626

    Maximizing the biochemical resolving power of fluorescence microscopy. by Alessandro Esposito, Marina Popleteeva, Ashok R Venkitaraman

    Published 2013-01-01
    “…We describe optimized imaging protocols, provide optimization algorithms and describe precision and resolving power in biochemical imaging thanks to the analysis of the general properties of Fisher information in fluorescence detection. …”
    Get full text
    Article
  7. 2627

    Integrated Energy Management in Small-Scale Smart Grids Considering the Emergency Load Conditions: A Combined Battery Energy Storage, Solar PV, and Power-to-Hydrogen System by Hossein Jokar, Taher Niknam, Moslem Dehghani, Pierluigi Siano, Khmaies Ouahada, Mokhtar Aly

    Published 2024-12-01
    “…Compared to conventional evolutionary methods like particle swarm optimization, non-dominated sorting genetic algorithm III, and biogeography-based optimization, the proposed model exhibits remarkable improvements, outperforming them by 11.4%, 5.6%, and 11.6%, respectively. …”
    Get full text
    Article
  8. 2628

    5G-oriented information sharing mechanism within D2D clusters by Shaomin WANG, Bin ZHOU

    Published 2016-01-01
    “…Device-to-Device(D2D)communication is an important technology in 5G network.It helps to improve the transmission efficiency of data dissemination services.However,due to the extra signaling overhead caused by D2D communications,currently most of enhanced-multicast solutions cannot solve the contradiction between high-efficient data transmission and low-efficient signaling procedure,so as to reduce the overall performance gain.An intra-cluster D2D information sharing algorithm based on matrix analysis which includes centralized and distributed modes was proposed.The proposed algorithm could significantly reduce D2D retransmission times in clusters by adaptively selecting the optimal transmitters and data packets for D2D multicast retransmission,achieving the aim of reducing signaling overhead and transmission delay.…”
    Get full text
    Article
  9. 2629

    Boosting skin cancer diagnosis accuracy with ensemble approach by Priya Natha, Sivarama Prasad Tera, Ravikumar Chinthaginjala, Safia Obaidur Rab, C. Venkata Narasimhulu, Tae Hoon Kim

    Published 2025-01-01
    “…Moreover, feature vectors that were optimally produced from image data by a Genetic Algorithm (GA) were given to the ML models. …”
    Get full text
    Article
  10. 2630

    A neighborhood search-based heuristic for the dynamic vehicle routing problem by Wilton Gustavo Gomes da Costa, Ricardo Santos, Willy Alves de Oliveira Soler, Bianca de Almeida Dantas

    Published 2025-05-01
    “…The DSNR achieved improvements of 15% to 17% in terms of distance and final delivery costs.…”
    Get full text
    Article
  11. 2631

    Distributed Coordinated Dispatch Model for Multi-area Interconnected Integrated Energy Systems Based on Sequential Cone Programming by Yujie REN, Yuhan HUANG, Zhenbo WEI

    Published 2025-01-01
    “…The solution of the distributed algorithm based on ATC is close to the global optimal solution of the distributed algorithm. …”
    Get full text
    Article
  12. 2632

    A Secure Data Collection Method Based on Deep Reinforcement Learning and Lightweight Authentication by Yunlong Wang, Jie Zhang, Guangjie Han, Dugui Chen

    Published 2025-05-01
    “…To address such challenges, we propose a lightweight chain authentication protocol for scalable IoT environments (LCAP-SIoT), which uses Physical Unclonable Functions (PUFs) and distributed authentication to secure communications, and a secure data collection algorithm, named LS-QMIX, which fuses the LCAP-SIoT and Q-learning Mixer (QMIX) algorithm to optimize the path planning and cooperation efficiency of the multi-UAV system. …”
    Get full text
    Article
  13. 2633

    Hybridized Deep Learning Model for Perfobond Rib Shear Strength Connector Prediction by Jamal Abdulrazzaq Khalaf, Abeer A. Majeed, Mohammed Suleman Aldlemy, Zainab Hasan Ali, Ahmed W. Al Zand, S. Adarsh, Aissa Bouaissi, Mohammed Majeed Hameed, Zaher Mundher Yaseen

    Published 2021-01-01
    “…In the second scenario, a comparable AI model hybridized with genetic algorithm (GA) as a robust bioinspired optimization approach for optimizing the related predictors for the PRSC is proposed. …”
    Get full text
    Article
  14. 2634

    Intelligent Data Reduction for IoT: A Context-Driven Framework by Laercio Pioli, Douglas D. J. De Macedo, Daniel G. Costa, Mario A. R. Dantas

    Published 2025-01-01
    “…With these predictions based on existing datasets, a selector algorithm module is adopted to identify the most suitable data reduction approach for specific IoT applications. …”
    Get full text
    Article
  15. 2635

    Research on Urban Traffic Signal Control Systems Based on Cyber Physical Systems by Li-li Zhang, Qi Zhao, Li Wang, Ling-yu Zhang

    Published 2020-01-01
    “…Finally, considering China, the system designs a general control strategy API to separate data from control strategy. Most of the popular communication protocols between signal controllers and detectors are private protocols. …”
    Get full text
    Article
  16. 2636

    DS-AdaptNet: An Efficient Retinal Vessel Segmentation Framework With Adaptive Enhancement and Depthwise Separable Convolutions by Shuting Chen, Chengxi Hong, Hong Jia

    Published 2025-01-01
    “…Second, we develop a Context-Aware Adaptive Threshold Optimization (CA-ATO) algorithm that dynamically determines optimal thresholds by integrating multi-scale contextual information and uncertainty estimates, substantially improving boundary delineation accuracy and fine structure preservation. …”
    Get full text
    Article
  17. 2637

    A Cross-Stage Focused Small Object Detection Network for Unmanned Aerial Vehicle Assisted Maritime Applications by Gege Ding, Jiayue Liu, Dongsheng Li, Xiaming Fu, Yucheng Zhou, Mingrui Zhang, Wantong Li, Yanjuan Wang, Chunxu Li, Xiongfei Geng

    Published 2025-01-01
    “…The CFSD-UAVNet model was evaluated on the publicly available SeaDronesSee maritime dataset and compared with other cutting-edge algorithms. The experimental results showed that the CFSD-UAVNet model achieved an mAP@50 of 80.1% with only 1.7 M parameters and a computational cost of 10.2 G, marking a 12.1% improvement over YOLOv8 and a 4.6% increase compared to DETR. …”
    Get full text
    Article
  18. 2638

    Lightweight security architecture design for wireless sensor network by Chao WANG, Guang-yue HU, Huan-guo ZHANG

    Published 2012-02-01
    “…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
    Get full text
    Article
  19. 2639

    Enhancing Lifetime and Reliability in WSNs: Complementary of Dual-Battery Systems Energy Management Strategy by Mehrshad Eskandarpour, Hossein Soleimani

    Published 2025-01-01
    “…Unlike previous approaches, this system enables simultaneous charging and load powering and is specifically optimized for energy-harvesting WSN environments. Simulation results in MATLAB/Simulink demonstrate that the system improves battery lifespan by up to 25% compared to conventional single-battery configurations, while ensuring stable voltage regulation and improved reliability under variable loads. …”
    Get full text
    Article
  20. 2640

    Intelligent Data Processing Methods for the Atypical Values Correction of Stock Quotes by T. V. Zolotova, D. A. Volkova

    Published 2022-05-01
    “…The multiple imputation method creates for each missing value not one, but many imputations, which avoids a systematic error, but at the expense of high computational costs. For the initial data used in the work, the best result was shown by the implementation of the multiple imputation algorithm based on the detected outliers by the support vector method.Conclusion. …”
    Get full text
    Article