Showing 3,521 - 3,540 results of 5,620 for search '(( while optimizer algorithm ) OR ( while optimize algorithm ))', query time: 1.39s Refine Results
  1. 3521

    Self-Adjusting Look-Ahead Distance of Precision Path Tracking for High-Clearance Sprayers in Field Navigation by Xu Wang, Bo Zhang, Xintong Du, Huailin Chen, Tianwen Zhu, Chundu Wu

    Published 2025-06-01
    “…This is done based on the principle of minimizing the overall error, enabling the dynamic and adaptive optimization of the look-ahead distance within the pure pursuit algorithm. …”
    Get full text
    Article
  2. 3522

    IMSBA: A Novel Integrated Sensing and Communication Beam Allocation Based on Multi-Agent Reinforcement Learning for mmWave Internet of Vehicles by Jinxiang Lai, Deqing Wang, Yifeng Zhao

    Published 2025-05-01
    “…To address these challenges, this paper proposes an integrated sensing and communication (ISAC) beam allocation algorithm, termed IMSBA, which jointly optimizes beam direction, transmission power, and spectrum resource allocation to effectively mitigate the interference between I2V and V2V while maximizing the overall network performance. …”
    Get full text
    Article
  3. 3523

    Modeling and control of automatic voltage regulation for a hydropower plant using advanced model predictive control by Ebunle Akupan Rene, Willy Stephen Tounsi Fokui

    Published 2025-04-01
    “…The findings were compared with those derived from an optimal proportional integral derivative (PID) controller designed using the artificial bee colony (ABC) algorithm. …”
    Get full text
    Article
  4. 3524

    Maintenance Scheduling Strategy for MMCs Within an MVDC System Using Sensitivity Analysis by Tae-Yang Nam, Dong-Il Cho, Joong-Woo Shin, Kwang-Hoon Yoon, Jae-Chul Kim, Won-Sik Moon

    Published 2024-01-01
    “…The proposed algorithm optimizes the maintenance timing and priority by performing a sensitivity analysis of the system reliability indicators, from both the consumer and operator perspectives. …”
    Get full text
    Article
  5. 3525

    Jumping knowledge graph attention network for resource allocation in wireless cellular system by Qiushi Sun, Zhou Fang, Yin Li, Ovanes Petrosian

    Published 2025-05-01
    “…The realization of these features hinges on the development of rational resource allocation strategies to optimize the utilization of radio resources. This study addresses the beamforming design problem for downlink transmission in multi-cell cellular networks, with a focus on maximizing user data rates while adhering to stringent power constraints. …”
    Get full text
    Article
  6. 3526

    A hybrid blockchain-based solution for secure sharing of electronic medical record data by Gang Han, Yan Ma, Zhongliang Zhang, Yuxin Wang

    Published 2025-01-01
    “…This algorithm not only streamlines the signature process across chains but also strengthens system security and optimizes storage efficiency, addressing a key challenge in multi-chain systems. …”
    Get full text
    Article
  7. 3527

    Development and evaluation of a triplex real-time PCR assay for enhanced plague diagnostics in Madagascar. by Beza Ramasindrazana, Zoé A Rahalison, Philippe Gauthier, Guillain Mikaty, Zaina I Bodoarison, Lanto A Maminirina, Soloandry Rahajandraibe, Mamy G Randriamanantsoa, Gilbert Kayoko, Jean-Claude Manuguerra, Anne-Sophie Le Guern, Andriamiliharison J Rasamindrakotroka, Minoarisoa Rajerison

    Published 2025-07-01
    “…Notably, the new assay resolved 100% of previously inconclusive cases from the duplex qPCR test targeting only pla and caf1.<h4>Discussion</h4>While a new plague diagnostic algorithm has been set up after the outbreak in 2017, the present study suggests a real-time PCR assay based on three genes to improve the speed and accuracy of plague diagnostic. …”
    Get full text
    Article
  8. 3528

    Joint uplink and downlink resource allocation for D2D communication based on weighted bipartite graph matching and interference clustering by SHEN Bin, YUAN Wenjun, LI Xuan

    Published 2024-06-01
    “…Moreover, the transmit power of DUE was optimized to maximize the system sum rate while ensured that DUE did not cause serious interference to CUE. …”
    Get full text
    Article
  9. 3529

    Aircraft Flight Autonomous Decision-Making Method Based on Target Predicted Trajectory and Markov Decision Process by Yang Zhou, Xinmin Tang, Xuanming Ren

    Published 2024-12-01
    “…Secondly, we adopt the Markov Decision Process as the autonomous decision-making method for the own aircraft, proposing a method by which to calculate the optimal decision sequence based on the prediction scenarios of the IMM algorithm; that is, in both multi-step prediction and single-step prediction scenarios, the payoff values of different action strategies at each decision moment are calculated to obtain the optimal decision sequence. …”
    Get full text
    Article
  10. 3530

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  11. 3531

    Learned Shrinkage Approach for Low-Dose Reconstruction in Computed Tomography by Joseph Shtok, Michael Elad, Michael Zibulevsky

    Published 2013-01-01
    “…Our numerical simulations indicate that the proposed algorithm can manage well with noisy measurements, allowing a dose reduction by a factor of 4, while reducing noise and streak artifacts in the FBP reconstruction, comparable to the performance of a statistically based iterative algorithm.…”
    Get full text
    Article
  12. 3532

    WSNs data acquisition by combining expected network coverage and clustered compressed sensing. by Zhouzhou Liu, Yangmei Zhang, Yang Bi, Jingxuan Wang, Yuanyuan Hou, Chao Liu, Guangyi Jiang, Shan Li

    Published 2025-01-01
    “…Combined with an optimized network coverage algorithm, a node scheduling strategy is introduced to focus on critical observation areas while minimizing overall energy consumption. …”
    Get full text
    Article
  13. 3533

    Hybrid energy storage systems for photovoltaic storage microgrids power allocation and capacity determination based on adaptive Savitzky-Golay filtering and VMD-DTW by Zengqiang Ma, Zejia Zhou, Tianming Mu, Cheng Wen

    Published 2025-09-01
    “…An enhanced dung beetle optimization algorithm is employed to optimize this model, enabling adaptive parameter adjustments in SG filtering. …”
    Get full text
    Article
  14. 3534

    Masks-to-Skeleton: Multi-View Mask-Based Tree Skeleton Extraction with 3D Gaussian Splatting by Xinpeng Liu, Kanyu Xu, Risa Shinoda, Hiroaki Santo, Fumio Okura

    Published 2025-07-01
    “…Furthermore, we use a minimum spanning tree (MST) algorithm during the optimization loop to regularize the graph to a tree structure. …”
    Get full text
    Article
  15. 3535

    Shells and Spheres: An n-Dimensional Framework for Medial-Based Image Segmentation by Aaron Cois, John Galeotti, Robert Tamburo, Michael Sacks, George Stetten

    Published 2010-01-01
    “…For the automated 3D algorithm, the only manual interaction consists of tracing a single contour on a 2D slice to optimize parameters, and identifying an initial point within the target structure.…”
    Get full text
    Article
  16. 3536

    Accelerated Tensor Robust Principal Component Analysis via Factorized Tensor Norm Minimization by Geunseop Lee

    Published 2025-07-01
    “…Experimental results demonstrate that our algorithm achieves significantly faster performance than existing reference methods known for efficient computation while maintaining high accuracy in recovering low-rank tensors for applications such as color image recovery and background subtraction.…”
    Get full text
    Article
  17. 3537

    Fast Processing of Massive Hyperspectral Image Anomaly Detection Based on Cloud-Edge Collaboration by Yunchang Wang, Jin Sun, Yang Xu, Zhihui Wei, Shangdong Zheng, Zebin Wu

    Published 2025-01-01
    “…With the improvement of hyperspectral image resolution, existing anomaly detection algorithms find it challenging to quickly process large volumes of hyperspectral data while fully exploiting spectral information. …”
    Get full text
    Article
  18. 3538

    A Study on Multi-ship Avoidance System for Unmanned Surface Vehicles Using the Quaternion Ship Domain and Collision Risk Index by Dong-Hun Lee, Mu-Yeong Seo, Hyo-Geun Lee, Won-Jun Yoo, Sanghyun Kim, Kwang-Jun Paik

    Published 2025-02-01
    “…This paper proposes a multi-ship collision avoidance algorithm that integrates the quaternion ship domain (QSD) and collision risk index (CRI) to assess collision risk and generate optimal avoidance trajectories. …”
    Get full text
    Article
  19. 3539

    A Time- and Space-Integrated Expansion Planning Method for AC/DC Hybrid Distribution Networks by Yao Guo, Shaorong Wang, Dezhi Chen

    Published 2025-04-01
    “…A modified graph attention network (MGAT)-based deep reinforcement learning (DRL) algorithm is used for optimization, balancing economic and reliability objectives. …”
    Get full text
    Article
  20. 3540

    Utilizing weak graph for edge consolidation-based efficient enhancement of network robustness by Wei Ding, Zhengdan Wang

    Published 2025-05-01
    “…We compare the proposed algorithm with optimal and approximate algorithms across graphs of varying scales. …”
    Get full text
    Article