Showing 4,641 - 4,660 results of 5,934 for search '(( whole optimization algorithm ) OR ( while optimization algorithm ))', query time: 0.25s Refine Results
  1. 4641

    Computing mutual similarity of 3D human faces in nearly linear time. by Radek Ošlejšek, Petra Urbanová, Jiří Sochor

    Published 2025-01-01
    “…Our solution utilizes properties of facial scan geometry to optimize individual steps. Moreover, the algorithm deals with possible holes and other artifacts in polygonal meshes automatically. …”
    Get full text
    Article
  2. 4642

    Benthos-DETR: a high-precision efficient network for benthic organisms detection by Weibo Rao, Gang Chen, Yifei Zhang, Jue Cang, Shusen Chen, Chenyang Wang

    Published 2025-08-01
    “…Through a series of experimental analyses, it was evident that the performance of the Benthos-DETR network surpasses existing target detection algorithms, achieving an optimal equilibrium between high recognition precision and a trim network scale.…”
    Get full text
    Article
  3. 4643

    Integrated multiomics analysis and machine learning refine neutrophil extracellular trap-related molecular subtypes and prognostic models for acute myeloid leukemia by Fangmin Zhong, Fangyi Yao, Zihao Wang, Jing Liu, Bo Huang, Xiaozhong Wang

    Published 2025-02-01
    “…The formation of NETs is impaired in acute myeloid leukemia (AML), which can result in immunodeficiency and increased susceptibility to infection.MethodsThe gene set variation analysis (GSVA) algorithm was employed for the calculation of NET score, while the consensus clustering algorithm was utilized to identify molecular subtypes. …”
    Get full text
    Article
  4. 4644

    Minimization of Resource Consumption with URLLC Constraints for Relay-Assisted IIoT by Yujie Zhao, Tao Peng, Yichen Guo, Yijing Niu, Wenbo Wang

    Published 2025-08-01
    “…In this work, the packet error probability (PEP) and blocklength allocation across two-hop links are jointly optimized to minimize total blocklength (resource consumption) while satisfying reliability, latency, and throughput requirements. …”
    Get full text
    Article
  5. 4645

    A Model‐Independent Strategy for the Targeted Observation Analysis and Its Application in ENSO Prediction by Weixun Rao, Youmin Tang, Yanling Wu, Xiaojing Li

    Published 2025-07-01
    “…Sensitive experiments show that while number of data sets reaches 12, a robust optimal observational array is obtained. …”
    Get full text
    Article
  6. 4646

    Deep reinforcement learning applications and prospects in industrial scenarios by JING TAN, Ligang YANG, Xiaorui LI, Zhaolin YUAN, Yunduan CUI, Chao YAO, Zongjie WANG, Xiaojuan BAN

    Published 2025-04-01
    “…Central to these systems are control algorithms, which enable the automation of operations, optimization of process parameters, and reduction of operational costs. …”
    Get full text
    Article
  7. 4647

    A Blockchain-Based Architecture of Web3.0: A Comprehensive Decentralized Model With Relay Nodes, Unique IDs and P2P by Hyunjoo Yang, Sejin Park

    Published 2025-01-01
    “…When faced with malicious requests, the system significantly reduces verification latency to an average of 0.0106 ms, ensuring rapid rejection and preserving network stability, while legitimate requests are processed efficiently with an average latency of 0.4125 ms.Experiments comparing latency-based and random-based relay selection methods across various network configurations (public-public, public-private, private-private) demonstrate that latency-based selection optimizes connection setup times in low-latency environments, while random-based selection provides robust performance in complex network scenarios. …”
    Get full text
    Article
  8. 4648

    Adaptive Switching Redundant-Mode Multi-Core System for Photovoltaic Power Generation by Liang Liu, Xige Zhang, Jiahui Zhou, Kai Niu, Zixuan Guo, Yawen Zhao, Meng Zhang

    Published 2024-11-01
    “…Additionally, by analyzing the relationship between performance and reliability, we proposed optimization methods to improve reliability while ensuring a high performance was maintained. …”
    Get full text
    Article
  9. 4649

    Novel channel attention-based filter pruning methods for low-complexity semantic segmentation models by Md. Bipul Hossain, Na Gong, Mohamed Shaban

    Published 2025-09-01
    “…Examples of widely used semantic segmentation models are the U-Net and DeeplabV3+ models. While the aforementioned models have been deemed very successful in segmenting medical targets including organs and diseases in high resolution images, the computational complexity represents a burden for the real-time application of the algorithms or the deployment of the models on resource-constrained platforms. …”
    Get full text
    Article
  10. 4650

    Towards a smart debt collection system: a Design Science Research approach by Michał Przybyłek, Adam Przybyłek, Konrad Wojciechowski, Illia Shkroba

    Published 2025-07-01
    “…Abstract While manual, expert-based approaches to debt collection have long dominated the industry, the growing complexity and volume of data—resulting in information overload—highlight the need for machine-learning solutions. …”
    Get full text
    Article
  11. 4651

    Evaluation of a Polarimetric Contrast Enhancement Technique as Preprocessing Step for Vessel Detection in SAR Images: Comparison of Frequency Bands and Polarimetric Modes by Alejandro Mestre-Quereda, Juan M. Lopez-Sanchez

    Published 2025-03-01
    “…A potential solution to this issue is to develop methodologies that suppress backscattered signals from the sea while preserving the radar returns from ships. In this work, we analyse a contrast enhancement method which is designed to suppress unwanted sea clutter while preserving signals from potential ships. …”
    Get full text
    Article
  12. 4652

    Convolutional neural network model over encrypted data based on functional encryption by Chen WANG, Jiarun LI, Jian XU

    Published 2024-03-01
    “…Currently, homomorphic encryption, secure multi-party computation, and other encryption schemes are used to protect the privacy of sensitive data in outsourced convolutional neural network (CNN) models.However, the computational and communication overhead caused by the above schemes would reduce system efficiency.Based on the low cost of functional encryption, a new convolutional neural network model over encrypted data was constructed using functional encryption.Firstly, two algorithms based on functional encryption were designed, including inner product functional encryption and basic operation functional encryption algorithms to implement basic operations such as inner product, multiplication, and subtraction over encrypted data, reducing computational and communication costs.Secondly, a secure convolutional computation protocol and a secure loss optimization protocol were designed for each of these basic operations, which achieved ciphertext forward propagation in the convolutional layer and ciphertext backward propagation in the output layer.Finally, a secure training and classification method for the model was provided by the above secure protocols in a module-composable way, which could simultaneously protect the confidentiality of user data as well as data labels.Theoretical analysis and experimental results indicate that the proposed model can achieve CNN training and classification over encrypted data while ensuring accuracy and security.…”
    Get full text
    Article
  13. 4653

    Digital mapping of peat thickness and extent in Finland using remote sensing and machine learning by Jonne Pohjankukka, Timo A. Räsänen, Timo P. Pitkänen, Arttu Kivimäki, Ville Mäkinen, Tapio Väänänen, Jouni Lerssi, Aura Salmivaara, Maarit Middleton

    Published 2025-03-01
    “…In this study, we present a workflow for producing peat occurrence maps for the whole of Finland. For this, we used random forest classification to map areas with peat thicknesses of ≥ 10 cm, ≥30 cm, ≥40 cm, and > 60 cm. …”
    Get full text
    Article
  14. 4654

    Path Planning for Lunar Rovers in Dynamic Environments: An Autonomous Navigation Framework Enhanced by Digital Twin-Based A*-D3QN by Wei Liu, Gang Wan, Jia Liu, Dianwei Cong

    Published 2025-06-01
    “…This paper proposes a digital twin-enhanced hierarchical planning method, A*-D3QN-Opt (A-Star-Dueling Double Deep Q-Network-Optimized). The framework combines the A* algorithm for global optimal paths in static environments with an improved D3QN (Dueling Double Deep Q-Network) for dynamic obstacle avoidance. …”
    Get full text
    Article
  15. 4655

    YOLOv8-Based Estimation of Estrus in Sows Through Reproductive Organ Swelling Analysis Using a Single Camera by Iyad Almadani, Mohammed Abuhussein, Aaron L. Robinson

    Published 2024-10-01
    “…Accurate and efficient estrus detection in sows is crucial in modern agricultural practices to ensure optimal reproductive health and successful breeding outcomes. …”
    Get full text
    Article
  16. 4656

    Cross-sectional imaging of speed-of-sound distribution using photoacoustic reversal beacons by Yang Wang, Danni Wang, Liting Zhong, Yi Zhou, Qing Wang, Wufan Chen, Li Qi

    Published 2025-02-01
    “…By picking up the PRB signal using a graph-based dynamic programing algorithm, we formulate a linear inverse model for pixel-wise SOS reconstruction and solve it with iterative optimization technique. …”
    Get full text
    Article
  17. 4657

    Separable Reversible Data Hiding in Encrypted 3D Mesh Models Based on Spatial Clustering and Multi-MSB Prediction by Y. Mao, Y. Xu

    Published 2025-07-01
    “…Input model vertices are partitioned into exclusive clusters through spatial clustering, ensuring close proximity within each cluster. An optimal reference vertex search algorithm is then used to identify the best reference vertex in each cluster to maximize embeddable capacity, and multi-MSB prediction determines the embedding length for each embeddable vertex. …”
    Get full text
    Article
  18. 4658

    Enhancing Vertical Trajectory Reconstruction in SASS-C: Advanced Segmentation, Outlier Detection, and Filtering Techniques by Daniel Amigo, David Sánchez Pedroche, Jesús García, José Manuel Molina, Jekaterina Trofimova, Emmanuel Voet, Benoît Van Bogaert

    Published 2024-10-01
    “…The invalid detection algorithm, while incurring a slight computational cost, significantly enhances trajectory accuracy. …”
    Get full text
    Article
  19. 4659

    Recommendations on Chronic Constipation (Including Constipation Associated with Irritable Bowel Syndrome) Treatment by Pierre Paré, Ronald Bridges, Malcolm C Champion, Subhas C Ganguli, James R Gray, E Jan Irvine, Victor Plourde, Pierre Poitras, Geoffrey K Turnbull, Paul Moayyedi, Nigel Flook, Stephen M Collins

    Published 2007-01-01
    “…The myriad of treatment options available to Canadian physicians can be confusing; thus, the main aim of the recommendations and treatment algorithm is to optimize the approach in clinical care based on available evidence.…”
    Get full text
    Article
  20. 4660