Search alternatives:
improved » improve (Expand Search)
cost » most (Expand Search)
post » most (Expand Search)
improved » improve (Expand Search)
cost » most (Expand Search)
post » most (Expand Search)
-
3581
Intelligent Obstacle Avoidance Algorithm for Mobile Robots in Uncertain Environment
Published 2022-01-01“…In a nondeterministic environment, a mobile robot intelligent obstacle avoidance algorithm based on an improved fuzzy neural network with self-learning is firstly proposed. …”
Get full text
Article -
3582
Time-Dependent Vehicle Routing Problem with Drones Under Vehicle Restricted Zones and No-Fly Zones
Published 2025-02-01“…Compared to the genetic neighborhood search algorithm and the hybrid genetic algorithm, the improvement rates are 5.1% and 13.0%, respectively. …”
Get full text
Article -
3583
Water Quality Prediction Based on Hybrid Deep Learning Algorithm
Published 2023-01-01Get full text
Article -
3584
An Intelligent Client Selection Algorithm of Federated Learning for Class-imbalance
Published 2024-04-01“… In the federated learning application scenario, if the data among the client devices shows the characteristics of non- independence identically distribution, or even class-imbalance, the optimization goal of the client local model will deviate from the global optimization goal, which brings great challenges to the performance of the global model. …”
Get full text
Article -
3585
YOLOX-S-TKECB: A Holstein Cow Identification Detection Algorithm
Published 2024-11-01“…Therefore, this paper proposes a cow identification method based on YOLOX-S-TKECB. (1) Based on the characteristics of Holstein cows and their breeding practices, we constructed a real-time acquisition and preprocessing platform for two-dimensional Holstein cow images and built a cow identification model based on YOLOX-S-TKECB. (2) Transfer learning was introduced to improve the convergence speed and generalization ability of the cow identification model. (3) The CBAM attention mechanism module was added to enhance the model’s ability to extract features from cow torso patterns. (4) The alignment between the apriori frame and the target size was improved by optimizing the clustering algorithm and the multi-scale feature fusion method, thereby enhancing the performance of object detection at different scales. …”
Get full text
Article -
3586
An improved hybrid approach involving deep learning for urban greening tree species classification with Pléiades Neo 4 imagery—A case study from Nanjing, Eastern China
Published 2025-12-01“…Future work will integrate multi-source data, multi-seasonal observations, and adaptive algorithms to further enhance classification performance and improve model robustness across diverse urban environments.…”
Get full text
Article -
3587
Design of task dividing and offloading algorithm in mobile edge computing
Published 2021-06-01Get full text
Article -
3588
Multiobjective Optimized Routing Protocol for VANETs
Published 2018-01-01“…Fuzzy controllers were employed to assess routes’ costs and their lifetimes. Furthermore, artificial bee colony (ABC) algorithm was used to concurrently optimize all used fuzzy systems and obtain the optimal highest rank of links’ cost values within which the neighbors could be selected as relay nodes in route discovery process. …”
Get full text
Article -
3589
Investigating of Machine Learning Based Algorithms for Liver Cirrhosis Prediction
Published 2024-03-01“…These findings not only underscore the superiority of the algorithm but also highlight its potential to revolutionize liver cirrhosis diagnosis and management practices, potentially leading to improved patient outcomes and reduced healthcare costs. …”
Get full text
Article -
3590
Advances in Digital Signature Algorithms: Performance, Security and Future Prospects
Published 2025-01-01“…The results show that while optimizations improve computational efficiency, challenges persist, especially with potential quantum threats that could undermine these algorithms' security. …”
Get full text
Article -
3591
Self-Supervised Social Recommendation Algorithm Fusing Residual Networks
Published 2024-12-01“…Experimental results show that the algorithm has good recommendation performance compared with the benchmark model.…”
Get full text
Article -
3592
Implications of algorithmic bias in AI-driven emergency response systems
Published 2026-01-01“…Our numerical simulations further illustrate the economic viability and effectiveness of bias mitigation strategies, such as fairness-constrained optimization and improved data representativeness, in simultaneously enhancing equity and economic efficiency. …”
Get full text
Article -
3593
Classification of Real-World Objects Using Supervised ML-Assisted Polarimetry: Cost/Benefit Analysis
Published 2024-11-01Get full text
Article -
3594
Cost-effectiveness analysis of best management practices for non-point source pollution in watersheds: A review
Published 2017-03-01“…Application of cost-effectiveness analysis method included three categories, coupling NPS model with empirical calculation methods, coupling NPS model with economic model and cost-effectiveness analysis based on optimization algorithm. …”
Get full text
Article -
3595
Differential analysis of lightweight cipher algorithm ACE based on MILP
Published 2023-01-01“…The differential property of the lightweight cipher algorithm ACE was researched.n-dimension ring AND-gate combination was defined and its differential property was described accurately by only O(n) expressions with the MILP method by analyzing the relationship among AND gates.The nonlinear operation of ACE was transformed to the 32-dimension ring AND-gate combination and the MILP differential model of ACE was proposed.According to the characteristics of Gurobi solver, a model for fast solving the MILP differential model of ACE was given.For ACE permutation with 3 to 6 steps, the optimal differential characteristic was obtained and its probability was improved by multi-difference technique.The differential forge attack on authenticated encryption algorithm ACE-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">A</mi><mi mathvariant="script">E</mi></math></inline-formula>-128 and the differential collision attack on hash algorithm ACE-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">H</mi></math></inline-formula>-256 was given with 3-step ACE permutation, and the success probability was 2<sup>-90.52</sup>.And it was proved that the 4-steps ACE permutation arrived the differential security bound of 128 bit.Actually, the MILP differential description of ring AND-gate combination can be applied on more cipher algorithms, such as SIMON, Simeck.…”
Get full text
Article -
3596
Radio Mean Labeling Algorithm, Its Complexity and Existence Results
Published 2025-06-01“…The existing ILP model does not guarantee that the vertex labels are distinct, positive and satisfy the radio mean condition, prompting the need for an improved approach. …”
Get full text
Article -
3597
Research on short-term traffic flow prediction based on the PCC-IGA-LSTM model
Published 2025-04-01“…To effectively address the spatial–temporal feature mining problem in short-term traffic flow prediction for complex road networks, a new method that combined the Pearson correlation coefficient (PCC) and improved genetic algorithm to optimize the long short-term memory model (IGA-LSTM) was constructed. …”
Get full text
Article -
3598
A Flexible Interconnected Distribution Network Power Supply Restoration Method Based on E-SOP
Published 2025-02-01“…To solve this complex optimization model, an innovative hybrid approach combining the Improved Whale Optimization Algorithm (IWOA) with second-order cone programming is developed. …”
Get full text
Article -
3599
Artificial Intelligence Meets Bioequivalence: Using Generative Adversarial Networks for Smarter, Smaller Trials
Published 2025-05-01“…This approach proved effective across various scenarios, enhancing BE study sample sizes, reducing costs, and accelerating trial durations. This study highlights the potential of WGANs to improve data augmentation and optimize subject recruitment in BE studies.…”
Get full text
Article -
3600
MTAD: A Multitarget Heuristic Algorithm for Virtual Machine Placement
Published 2015-10-01“…In order to solve the virtual machine placement problems in large scale, three algorithms are proposed. Firstly, we propose a physical machine (PM) classification algorithm by analyzing pseudotime complexity and find out an important factor (the number of physical hosts) that affects the efficiency, which improves running efficiency through reduction number of physical hosts; secondly, we present a VM placement optimization model using multitarget heuristic algorithm and figure out the positive and negative vectors of three goals using matrix transformation so as to provide the mapping of VMs to hosts by comparing distance with positive and negative vectors such that the energy consumption is saved, resources wastage of occupied PM is lowered, multidimension resource utilization is optimized, and the running time is shortened. …”
Get full text
Article