Showing 2,201 - 2,220 results of 3,188 for search '(( improved whole optimization algorithm ) OR ( improve while optimization algorithm ))', query time: 0.27s Refine Results
  1. 2201

    Deep Reinforcement Learning-Based Active Disturbance Rejection Control for Trajectory Tracking of Autonomous Ground Electric Vehicles by Xianjian Jin, Huaizhen Lv, Yinchen Tao, Jianning Lu, Jianbo Lv, Nonsly Valerienne Opinat Ikiela

    Published 2025-06-01
    “…The framework integrates active disturbance rejection control (ADRC) for real-time disturbance estimation and compensation with a deep deterministic policy gradient (DDPG)-based deep reinforcement learning (DRL) algorithm for dynamic optimization of controller parameters to improve tracking accuracy and robustness. …”
    Get full text
    Article
  2. 2202

    Linear B-cell epitope prediction for SARS and COVID-19 vaccine design: Integrating balanced ensemble learning models and resampling strategies by Fatih Gurcan

    Published 2025-06-01
    “…The rebalanced datasets were then used in model building with ensemble classifiers employing Boosting, Bagging, and Balancing strategies. Hyperparameter optimization for the classifiers was conducted using GridSearchCV, while feature selection was performed with the recursive feature elimination (RFE) algorithm. …”
    Get full text
    Article
  3. 2203

    Incremental learning with SVM for multimodal classification of prostatic adenocarcinoma. by José Fernando García Molina, Lei Zheng, Metin Sertdemir, Dietmar J Dinter, Stefan Schönberg, Matthias Rädle

    Published 2014-01-01
    “…We propose a pattern recognition system with an incremental learning ensemble algorithm using support vector machines (SVM) tackling this problem employing multimodal MR images and a texture-based information strategy. …”
    Get full text
    Article
  4. 2204

    Multi-Underwater Target Interception Strategy Based on Deep Reinforcement Learning by Wenhao GAN, Yunfei PENG, Lei QIAO

    Published 2025-04-01
    “…Next, the multi-agent proximal policy optimization algorithm was used to construct a scalable state and action space and design a compound reward function, enhancing interception efficiency and cooperation of AUVs. …”
    Get full text
    Article
  5. 2205

    3D evolutionarily designed metamaterials for scattering maximization by Dmitry Dobrykh, Konstantin Grotov, Anna Mikhailovskaya, Dmytro Vovchuk, Vladyslav Tkach, Mykola Khobzei, Anton Kharchevskii, Aviel Glam, Pavel Ginzburg

    Published 2025-03-01
    “…The resonance cascading is engineered with the aid of multi-objective optimization, implemented on top of a genetic algorithm, operating in a large search space, encompassing over 100 independent variables. …”
    Get full text
    Article
  6. 2206

    Eecs-fl: energy-efficient client selection for federated learning in AIoT by Yiyang Zhang, Yiming Luo, Tao Yang, Xiaofeng Wu, Bo Hu

    Published 2025-03-01
    “…We formulate the client selection problem as a multi-dimensional knapsack problem (MKP) and solve it using dynamic programming to maximize energy efficiency while maintaining fast convergence. Experimental results show that incorporating WPT leads to a reduction in unit energy consumption by over 24.54%; while, the proposed algorithm achieves a reduction of over 15.31% compared to random selection. …”
    Get full text
    Article
  7. 2207

    A comprehensive techno-economic analysis for a PHEV-integrated microgrid system involving wind uncertainty and diverse demand side management policies by Bishwajit Dey, Laishram Khumanleima Chanu, Gulshan Sharma, Pitshou N. Bokoro

    Published 2025-06-01
    “…The research investigation employed the Differential Evolution (DE) algorithm as an optimization technique. Numerical results show that the total operating cost (TOC) of the MG system reduced from $25,575 during the base load model to $24,521 when the proposed hybrid DSM was implemented. …”
    Get full text
    Article
  8. 2208

    A cartographic generalization method for 3D visualization of trajectories in space–time cubes: case study of epidemic spread by Fei Yang, Jie Shen, Fengzhen Zhu, Junrui Zhang

    Published 2025-08-01
    “…The proposed method incorporates a 3D generalization algorithm that mitigates visual stickiness, while leveraging a 3D line field visualization technique to optimize opacity, thereby minimizing visual occlusion and spatial clutter. …”
    Get full text
    Article
  9. 2209

    Efficient and secure multi-party computation protocol supporting deep learning by Shancheng Zhang, Gang Qu, Zongyang Zhang, Minzhe Huang, Haochun Jin, Liqun Yang

    Published 2025-07-01
    “…Our convolution protocol leverages the Winograd algorithm to significantly reduce multiplication gate count, yielding over 50% performance improvement. …”
    Get full text
    Article
  10. 2210

    Advanced artificial intelligence with federated learning framework for privacy-preserving cyberthreat detection in IoT-assisted sustainable smart cities by Mahmoud Ragab, Ehab Bahaudien Ashary, Bandar M. Alghamdi, Rania Aboalela, Naif Alsaadi, Louai A. Maghrabi, Khalid H. Allehaibi

    Published 2025-02-01
    “…Eventually, the walrus optimization algorithm (WOA) is used for hyperparameter tuning to improve the parameters of the SSAE approach and achieve optimal performance. …”
    Get full text
    Article
  11. 2211

    Adaptive machine learning framework: Predicting UHPC performance from data to modelling by Yinzhang He, Shaojie Gao, Yan Li, Yongsheng Guan, Jiupeng Zhang, Dongliang Hu

    Published 2025-09-01
    “…Bayesian optimization fine-tuned each model's hyperparameters to identify the optimal model-FS combination. …”
    Get full text
    Article
  12. 2212

    An online tool based on the Internet of Things and intelligent blockchain technology for data privacy and security in rural and agricultural development by Krishnaprasath Vellimalaipattinam Thiruvenkatasamy, Hayder M. A. Ghanimi, Sudhakar Sengan, Meshal Ghalib Alharbi

    Published 2025-07-01
    “…Central to this model is the proposed Quantum Neural Network + Bayesian Optimization (QNN + BO), a practiced algorithm that, when combined with methods like the Elliptic Curve Cryptography (ECC) and Coyote Optimization Algorithm (COA), guarantees secure data flow, processing, and storage. …”
    Get full text
    Article
  13. 2213

    Perbandingan Metode Penyelesaian Permasalahan Optimasi Lintas Domain dengan Pendekatan Hyper-Heuristic Menggunakan Algoritma Reinforcement-Late Acceptance by Anang Firdaus, Ahmad Muklason, Vicha Azthanty Supoyo

    Published 2021-10-01
    “…In improving performance, this study examines the effect of the adaptation of the Reinforcement Learning (RL) algorithm as LLH selection combined with the Late Acceptance algorithm as a move acceptance. …”
    Get full text
    Article
  14. 2214

    Hybrid beamforming for ISAC based on mmWave cell-free MIMO by DUO Lin, YANG Xin, REN Yong, XU Boyu

    Published 2024-10-01
    “…Two kinds of power constraints are considered in the study, and the improved orthogonal matching pursuit algorithm and the Riemann conjugate gradient algorithm are used for optimization. …”
    Get full text
    Article
  15. 2215

    An echo state network based on enhanced intersecting cortical model for discrete chaotic system prediction by Xubin Wang, Pei Ma, Jing Lian, Jizhao Liu, Yide Ma

    Published 2025-07-01
    “…The model incorporates a neuron model with internal dynamics, including adaptive thresholds and inter-neuron feedback, into the reservoir structure. A Bayesian Optimization algorithm was employed for the selection of hyperparameters. …”
    Get full text
    Article
  16. 2216

    Enhancing Secure Energy Efficiency of SWIPT IoT Network Considering IRS and Artificial-Noise: A Deep Learning Approach by Kimchheang Chhea, Jung-Ryun Lee

    Published 2025-01-01
    “…Our goal is to maximize secure EE, where the secure EE is defined as the secrecy rate over the power consumption of the user. We aim to jointly optimize phase-shift of IRS, transmit power of jammer and user, to maximize the objective function while ensuring that the secrecy rate is greater than the predefined threshold while allowing the eavesdroppers to harvest energy using SWIPT. …”
    Get full text
    Article
  17. 2217

    Enhanced Spectral Efficiency in RIS-Assisted MIMO Systems Through Joint Precoding and RIS Configuration by Mohammed Adil Abbas, Aqiel N. Almamori, Ahmed Jumaa Lafta, Asaad H. Sahar

    Published 2025-01-01
    “…Water-filling is used for power allocation across channel eigenmodes, while manifold optimization ensures efficient phase shift updates under unit-modulus constraints. …”
    Get full text
    Article
  18. 2218

    Research on Laser Radar Inspection Station Planning of Vehicle Body-In-White (BIW) with Complex Constraints by Lijuan Li, Siyi Wang, Jichao Ma, Xiaobing Gao

    Published 2025-05-01
    “…Focusing on the spatially constrained industrial environments and complex measurement specifications, the work reformulates Laser Radar inspection planning as a multi-constrained optimization problem challenge. Firstly, a parametric geometric modeling approach is developed to define measurement spaces for individual features, accompanied by an innovative maximal complete subgraph mining algorithm to intelligently identify shared feasible measurement regions among multiple features. …”
    Get full text
    Article
  19. 2219

    Local Search-Based Metaheuristic Methods for the Solid Waste Collection Problem by Haneen Algethami

    Published 2023-01-01
    “…Local search methods, notably GLS, have significantly improved the route construction process. The nearest neighbour algorithm has often outperformed the Clarke and Wright's methods. …”
    Get full text
    Article
  20. 2220

    Adaptive Anomaly Detection in Network Flows With Low-Rank Tensor Decompositions and Deep Unrolling by Lukas Schynol, Marius Pesavento

    Published 2025-01-01
    “…Inspired by Bayesian approaches, we extend the model architecture to perform online adaptation to per-flow and per-time-step statistics, improving AD performance while maintaining a low parameter count and preserving the problem's permutation equivariances. …”
    Get full text
    Article