Search alternatives:
improved most » improved model (Expand Search)
Showing 1,061 - 1,080 results of 1,675 for search '(( improved post optimization algorithm ) OR ( improved most optimization algorithm ))', query time: 0.30s Refine Results
  1. 1061

    Encoding-Based Machine Learning Approach for Health Status Classification and Remote Monitoring of Cardiac Patients by Sohaib R. Awad, Faris S. Alghareb

    Published 2025-02-01
    “…In short, this study aims to explore how ML algorithms can enhance diagnostic accuracy, improve real-time monitoring, and optimize treatment outcomes. …”
    Get full text
    Article
  2. 1062

    GRU-based multi-scenario gait authentication for smartphones by Qi JIANG, Ru FENG, Ruijie ZHANG, Jinhua WANG, Ting CHEN, Fushan WEI

    Published 2022-10-01
    “…At present, most of the gait-based smartphone authentication researches focus on a single controlled scenario without considering the impact of multi-scenario changes on the authentication accuracy.The movement direction of the smartphone and the user changes in different scenarios, and the user’s gait data collected by the orientation-sensitive sensor will be biased accordingly.Therefore, it has become an urgent problem to provide a multi-scenario high-accuracy gait authentication method for smartphones.In addition, the selection of the model training algorithm determines the accuracy and efficiency of gait authentication.The current popular authentication model based on long short-term memory (LSTM) network can achieve high authentication accuracy, but it has many training parameters, large memory footprint, and the training efficiency needs to be improved.In order to solve the above problems a multi-scenario gait authentication scheme for smartphones based on Gate Recurrent Unit (GRU) was proposed.The gait signals were preliminarily denoised by wavelet transform, and the looped gait signals were segmented by an adaptive gait cycle segmentation algorithm.In order to meet the authentication requirements of multi-scenario, the coordinate system transformation method was used to perform direction-independent processing on the gait signals, so as to eliminate the influence of the orientation of the smartphone and the movement of the user on the authentication result.Besides, in order to achieve high-accuracy authentication and efficient model training, GRUs with different architectures and various optimization methods were used to train the gait model.The proposed scheme was experimentally analyzed on publicly available datasets PSR and ZJU-GaitAcc.Compared with the related schemes, the proposed scheme improves the authentication accuracy.Compared with the LSTM-based gait authentication model, the training efficiency of the proposed model is improved by about 20%.…”
    Get full text
    Article
  3. 1063

    Discrete Phase Shift IRS-Assisted Energy Harvesting in Cognitive Radio Networks With Spectrum Sensing by Lilian Chiru Kawala, Guoquan Li, Mihertie Habtamu Demeke, Junzhou Xiong, Hao Xiong, Hang Hu

    Published 2025-01-01
    “…Simulation results demonstrate the superior performance of the proposed framework and the novel resource allocation algorithm based on alternating optimization. These results highlight the transformative potential of IRS with discrete phase shifts in enhancing EH-CRN efficiency, particularly in improving energy harvesting and SU throughput under practical constraints.…”
    Get full text
    Article
  4. 1064

    A Minimal Path-Based Method for Computing Multistate Network Reliability by Xiu-Zhen Xu, Yi-Feng Niu, Can He

    Published 2020-01-01
    “…Most of modern technological networks that can perform their tasks with various distinctive levels of efficiency are multistate networks, and reliability is a fundamental attribute for their safe operation and optimal improvement. …”
    Get full text
    Article
  5. 1065

    A Deep Learning Framework for Chronic Kidney Disease stage classification by Gayathri Hegde M, P Deepa Shenoy, Venugopal KR, Arvind Canchi

    Published 2025-06-01
    “…MHMXAI approach selects the features with the highest scores from the Metaheuristic algorithm-Eagle Search Strategy, Hybrid Metaheuristic algorithm-Great Salmon Run-Thermal Exchange Optimization and eXplainable AI (XAI) tools like Local Interpretable Model-agnostic Explanations (LIME) and Shapley Additive exPlanations (SHAP) for their effectiveness. …”
    Get full text
    Article
  6. 1066

    Mortality prediction of heart transplantation using machine learning models: a systematic review and meta-analysis by Ida Mohammadi, Setayesh Farahani, Asal Karimi, Saina Jahanian, Shahryar Rajai Firouzabadi, Mohammadreza Alinejadfard, Alireza Fatemi, Bardia Hajikarimloo, Mohammadhosein Akhlaghpasand

    Published 2025-04-01
    “…IntroductionMachine learning (ML) models have been increasingly applied to predict post-heart transplantation (HT) mortality, aiming to improve decision-making and optimize outcomes. …”
    Get full text
    Article
  7. 1067

    Corrosion rate prediction for long-distance submarine pipelines based on MWIWOA-SVM by Zhengshan LUO, Haipeng LYU, Jihao LUO

    Published 2025-05-01
    “…MethodsTo address these issues, Multi-Way Improved Whale Optimization Algorithm (MWIWOA) was proposed to optimize the SVM-based prediction model for the internal corrosion rate of long-distance submarine pipelines. …”
    Get full text
    Article
  8. 1068
  9. 1069

    Designing and implementing a Web-based real time routing service for crisis management (a case study for district 11 of Tehran) by javad sadidi, seyed hassan hosseini sajedi

    Published 2019-06-01
    “…Timing framework associated with catastrophes is one of the most important issues in crisis management. In such cases, being immediate has a considerable importance and web based real-time routing service as an important tool has a significant role in relief operations improvement. …”
    Get full text
    Article
  10. 1070
  11. 1071

    Maximum Power Exploitation of Photovoltaic System under Fast-Varying Solar Irradiation and Local Shading by Yi-Jui Chiu, Bi Li, Chin-Ling Chen, Shui-Yang Lien, Ding Chen, Ji-Ming Yi, Yung-Hui Shih

    Published 2022-01-01
    “…In addition, under fast-varying solar irradiation and local shading, the speed, ability, and stability of the improved MPPT system with the PF-MPPT algorithm when tracking the maximum power were 9.52, 1.32, and 1.84 times of the MPPT system with the P&O algorithm and 2.18, 1.41, and 2.00 times of the MPPT system with the particle swarm optimization algorithm, respectively.…”
    Get full text
    Article
  12. 1072
  13. 1073

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  14. 1074

    Multidisciplinary Collaborative Reliability Analysis of the Gear Reducer based on Inverse Reliability Strategy by Wang Liangliang, Peng Jinshuan, Shao Yiming

    Published 2015-01-01
    “…The IRS- GA- CO,which not only lifted the coupling between all disciplines to improve the search most probable point,the burden of system- level optimizer also can be significantly reduced. …”
    Get full text
    Article
  15. 1075

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  16. 1076

    基于改进Kriging模型的主动学习可靠性分析方法 by 陈哲, 杨旭锋, 程鑫

    Published 2021-01-01
    “…,the differential evolution algorithm is introduced to explore the optimal parameter of Kriging model and improve the accuracy of Kriging prediction information.As a result,the training point in each iteration is guaranteed to be the global optimal one and the efficiency of ALK model is largely improved.…”
    Get full text
    Article
  17. 1077

    Spatiotemporal pattern analysis of land use in Jiangsu Province based on long-term time series remote sensing images by Zhendong Ji, Lingzhi Yin, Jinhong Wang

    Published 2025-06-01
    “…Principal Component Analysis (PCA) was applied to reduce feature dimensionality, and the Random Forest classification algorithm was optimized with Bayesian Optimization and Tree-structured Parzen Estimators (TPE) for improved performance. …”
    Get full text
    Article
  18. 1078
  19. 1079

    Modular-based psychotherapy (MoBa) versus cognitive–behavioural therapy (CBT) for patients with depression, comorbidities and a history of childhood maltreatment: study protocol fo... by Elisabeth Schramm, Martin Hautzinger, Carolin Jenkner, Moritz Elsaesser, Sabine Herpertz, Hannah Piosczyk

    Published 2022-07-01
    “…By optimally tailoring module selection and application to the specific needs of each patient, MoBa has great potential to improve the currently unsatisfying results of psychotherapy as a bridge between disorder-specific and personalised approaches.Methods and analysis In a randomised controlled feasibility trial, N=70 outpatients with episodic or persistent major depression, comorbidity and childhood maltreatment are treated in 20 individual sessions with MoBa or standard cognitive–behavioural therapy for depression. …”
    Get full text
    Article
  20. 1080

    Novel method for robust bilateral filtering point cloud denoising by Huan Yang, Wei Wang, Yue Wang, Peng Wang

    Published 2025-08-01
    “…Moreover, when compared to algebraic point set surfaces (APSS), robust implicit moving least squares (RIMLS), anisotropic weighted locally optimal projection (AWLOP), bilateral filtering, and guided filtering point cloud denoising algorithms, the proposed method consistently achieved the smallest MSE and the highest SNR in most cases on the dataset used in this study.…”
    Get full text
    Article