Search alternatives:
cost » post (Expand Search)
Showing 1,401 - 1,420 results of 3,190 for search '(( improved cost optimization algorithm ) OR ( improve most optimization algorithm ))', query time: 0.36s Refine Results
  1. 1401

    Multi-Objective Optimization for Green BTS Site Selection in Telecommunication Networks Using NSGA-II and MOPSO by Salar Babaei, Mehran Khalaj, Mehdi Keramatpour, Ramin Enayati

    Published 2025-01-01
    “…These algorithms were chosen due to their proven efficiency in handling NP-hard optimization problems and their ability to balance exploration and exploitation in search spaces.…”
    Get full text
    Article
  2. 1402

    The Application of the SubChain Salp Swarm Algorithm in the Less-Than-Truckload Freight Matching Problem by Yibo Sun, Lei Yue, Yi Liu, Weitong Chen, Zhe Sun

    Published 2025-04-01
    “…Traditional LTL matching methods are challenged by delays in updating logistic information and higher distribution costs. In order to solve LTL challenges, we developed a novel SubChain Salp Swarm Algorithm (SSSA) by improving the traditional Salp Swarm Algorithm with the utilization of a SubChain operation. …”
    Get full text
    Article
  3. 1403

    Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm by Saite CHEN, Weihai LI, Yuanzhi YAO, Nenghai YU

    Published 2023-06-01
    “…The use of location-based service brings convenience to people’s daily lives, but it also raises concerns about users’ location privacy.In the k-nearest neighbor query problem, constructing K-anonymizing spatial regions is a method used to protects users’ location privacy, but it results in a large waste of communication overhead.The SpaceTwist scheme is an alternative method that uses an anchor point instead of the real location to complete the k-nearest neighbor query,which is simple to implement and has less waste of communication overhead.However,it cannot guarantee K-anonymous security, and the specific selection method of the anchor point is not provided.To address these shortcomings in SpaceTwist, some schemes calculate the user’s K-anonymity group by introducing a trusted anonymous server or using the way of user collaboration, and then enhance the end condition of the query algorithm to achieve K-anonymity security.Other schemes propose the anchor point optimization method based on the approximate distribution of interest points, which can further reduce the average communication overhead.A lightweight K-anonymity incremental nearest neighbor (LKINN) location privacy protection algorithm was proposed to improve SpaceTwist.LKINN used convex hull mathematical tool to calculate the key points of K-anonymity group, and proposed an anchor selection method based on it, achieving K-anonymity security with low computational and communication costs.LKINN was based on a hybrid location privacy protection architecture, making only semi-trusted security assumptions for all members of the system, which had lax security assumptions compared to some existing research schemes.Simulation results show that LKINN can prevent semi-trusted users from stealing the location privacy of normal users and has smaller query response time and communication overhead compare to some existing schemes.…”
    Get full text
    Article
  4. 1404

    An investigation on energy-saving scheduling algorithm of wireless monitoring sensors in oil and gas pipeline networks by Zhifeng Ma, Zhanjun Hao, Zhenya Zhao

    Published 2024-10-01
    “…Therefore, this paper proposes an energy-saving scheduling algorithm based on transformer networks, aimed at optimizing energy consumption and data transmission efficiency of wireless monitoring sensors in oil and gas pipelines. …”
    Get full text
    Article
  5. 1405

    Social Network Analysis: A Novel Paradigm for Improving Community Detection by Rodrigo Hernández, Inmaculada Gutiérrez, Javier Castro

    Published 2025-04-01
    “…One of the most considered philosophies when defining this type of technique is the use of the graph’s adjacency matrix as input and the consideration of modularity as the function to be optimized. …”
    Get full text
    Article
  6. 1406

    Improvement of RT-DETR model for ground glass pulmonary nodule detection. by Siyuan Tang, Qiangqiang Bao, Qingyu Ji, Tong Wang, Naiyu Wang, Min Yang, Yu Gu, Jinliang Zhao, Yuhan Qu, Siriguleng Wang

    Published 2025-01-01
    “…This article proposed an algorithm based on RT-DETR model with the following enhancement: 1) optimize the backbone network with FCGE blocks to increase the detection accuracy of small-sized and blurred edge nodules; 2) replace the AIFI module with HiLo-AIFI module to reduce redundant computation and improve the detection accuracy of pure ground glass pulmonary nodules and mixed ground glass pulmonary nodules; 3) replace the DGAK module with CCFF module to address the issue of capturing complex features and recognition of irregularly shaped ground glass nodules. …”
    Get full text
    Article
  7. 1407

    Development and Comparison of Interrupt-Based and Analog-to-Digital Converter Algorithms for Seed Counting in Precision Planters by A. Ghaffarnezhad, H. Navid, H. Karimi

    Published 2024-12-01
    “…Both developed circuits featured the deployment of the STM32F103C8T6 microcontroller, renowned for its robust capabilities and cost efficiency.In the interrupt-based algorithm's development, the microcontroller's external interrupt was used, selecting its sensitivity to detect both rising and falling edges. …”
    Get full text
    Article
  8. 1408

    Advancing sustainable renewable energy: XGBoost algorithm for the prediction of water yield in hemispherical solar stills by Salwa Ahmad Sarow, Hasan Abbas Flayyih, Maryam Bazerkan, Luttfi A. Al-Haddad, Zainab T. Al-Sharify, Ahmed Ali Farhan Ogaili

    Published 2024-12-01
    “…Initially explored was the effect of different sand types and bed heights on HSS performance, with the findings indicating that black sand, especially at a height of 1 cm combined with reflectors and a fan, markedly improved efficiency and production. An economic analysis revealed a significant reduction in water treatment costs with the optimized system. …”
    Get full text
    Article
  9. 1409
  10. 1410

    Optimization of external container delivery and pickup scheduling based on appointment mechanism. by Pengfei Huang, Hao Wang, Fangjiao Tan, Yuyue Jiang, Jinfen Cai

    Published 2025-01-01
    “…Through case studies, we have demonstrated the superior performance of this algorithm in addressing relevant problems. The results show that, in terms of truck operational costs, the improved algorithm reduces costs by 10.96% and 3.02% compared to traditional Ant Colony Optimization and Variable Neighborhood Search algorithms, respectively, and by 4.89% compared to manual scheduling. …”
    Get full text
    Article
  11. 1411

    Medical Image Hybrid Watermark Algorithm Based on Frequency Domain Processing and Inception v3 by Yu Fan, Jingbing Li, Uzair Aslam Bhatti, Saqib Ali Nawaz, Yenwei Chen

    Published 2025-06-01
    “…Existing research has mostly focused on optimizing individual techniques, lacking comprehensive solutions that integrate the strengths of different methods. …”
    Get full text
    Article
  12. 1412

    Optimized YOLOv8 framework for intelligent rockfall detection on mountain roads by Peng Peng, Langchao Gao, Jiachun Li, Hongzhen Zhang

    Published 2025-04-01
    “…To enable efficient detection, this study proposes a rockfall detection system based on embedded technology and an improved Yolov8 algorithm, termed Yolov8-GCB. The algorithm enhances detection performance through the following optimizations: (1) integrating a lightweight DeepLabv3+ road segmentation module at the input stage to generate mask images, which effectively exclude non-road regions from interference; (2) replacing Conv convolution units in the backbone network with Ghost convolution units, significantly reducing model parameters and computational cost while improving inference speed; (3) introducing the CPCA (Channel Priori Convolution Attention) mechanism to strengthen the feature extraction capability for targets with diverse shapes; and (4) incorporating skip connections and weighted fusion in the Neck feature extraction network to enhance multi-scale object detection. …”
    Get full text
    Article
  13. 1413

    Explorative Binary Gray Wolf Optimizer with Quadratic Interpolation for Feature Selection by Yijie Zhang, Yuhang Cai

    Published 2024-10-01
    “…This paper proposes a novel binary Gray Wolf Optimization algorithm to address the feature selection problem in classification tasks. …”
    Get full text
    Article
  14. 1414

    Distribution Network Differential Protection Technology Based on 5G Communication and Improved DTW by YU Yang, TANG Wei, YE Yuanbo, SHAO Qingzhu, YANG Ruijin, HUANG Yuhui

    Published 2023-08-01
    “…Aiming at the shortcomings of traditional DTW algorithms, such as large overhead, algorithm accuracy and efficiency limited by sequence amplitude difference, and empirical selection of parameters, the global path constraint strategy, data standardization strategy and particle swarm optimization strategy are proposed to be improved. …”
    Get full text
    Article
  15. 1415

    Improved Splitting-Integrating Methods for Image Geometric Transformations: Error Analysis and Applications by Hung-Tsai Huang, Zi-Cai Li, Yimin Wei, Ching Yee Suen

    Published 2025-05-01
    “…The splitting-integrating method (SIM) is well suited to the inverse transformation <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msup><mi>T</mi><mrow><mo>−</mo><mn>1</mn></mrow></msup></semantics></math></inline-formula> of digital images and patterns, but it encounters difficulties in nonlinear solutions for the forward transformation <i>T</i>. We propose improved techniques that entirely bypass nonlinear solutions for <i>T</i>, simplify numerical algorithms and reduce computational costs. …”
    Get full text
    Article
  16. 1416

    Significance of Machine Learning-Driven Algorithms for Effective Discrimination of DDoS Traffic Within IoT Systems by Mohammed N. Alenezi

    Published 2025-06-01
    “…Findings revealed that the RF model outperformed other models by delivering optimal detection speed and remarkable performance across all evaluation metrics, while KNN (K = 7) emerged as the most efficient model in terms of training time.…”
    Get full text
    Article
  17. 1417
  18. 1418

    Securing IoT Communications via Anomaly Traffic Detection: Synergy of Genetic Algorithm and Ensemble Method by Behnam Seyedi, Octavian Postolache

    Published 2025-06-01
    “…The second phase focuses on optimal feature selection using a Genetic Algorithm enhanced with eagle-inspired search strategies. …”
    Get full text
    Article
  19. 1419

    Optimal Search Strategy of Robotic Assembly Based on Neural Vibration Learning by Lejla Banjanovic-Mehmedovic, Senad Karic, Fahrudin Mehmedovic

    Published 2011-01-01
    “…Using optimal search strategy based on minimal distance path between vibration parameter stage sets (amplitude and frequencies of robots gripe vibration) and recovery parameter algorithm, we can improve the robot assembly behaviour, that is, allow the fastest possible way of mating. …”
    Get full text
    Article
  20. 1420

    Stability Analysis and Construction Parameter Optimization of Tunnels in the Fractured Zone of Faults by Banma Huang, Haibo Chen, Chenglong Duan, Wenhu Li

    Published 2022-01-01
    “…In order to improve the construction method of highway tunnel fault, improve the excavation level, improve the construction efficiency, reduce the project cost, and shorten the construction period, so as to find a specific road, this paper puts forward the research method of tunnel stability analysis and construction parameter optimization in the fault fracture zone. …”
    Get full text
    Article