Showing 4,641 - 4,660 results of 5,934 for search '(( whole optimize algorithm ) OR ( while optimize algorithm ))', query time: 0.24s Refine Results
  1. 4641

    Enhancing the effectiveness of wireless sensor networks through consensus estimation and universal coverage by Hua Tian

    Published 2025-07-01
    “…The method divides the network environment into distinct regions, activating only one node per region based on its residual energy and centrality, while other nodes enter a low-energy sleep mode to conserve power. …”
    Get full text
    Article
  2. 4642

    Trainable embedding quantum physics informed neural networks for solving nonlinear PDEs by Stefan Berger, Norbert Hosters, Matthias Möller

    Published 2025-05-01
    “…In direct comparison with classical PINNs, this approach showed an ability to achieve superior results while using the same number of parameters, highlighting their potential for more efficient optimization in high-dimensional parameter spaces, which could be transformative for future applications.…”
    Get full text
    Article
  3. 4643

    A Colored Traveling Salesman Problem with Varying City Colors by Xianghu Meng, Jun Li, MengChu Zhou

    Published 2021-01-01
    “…A colored traveling salesman problem (CTSP) is a path optimization problem in which colors are used to characterize diverse matching relationship between cities and salesmen. …”
    Get full text
    Article
  4. 4644

    Building Equi-Width Histograms on Homomorphically Encrypted Data by Dragoș Lazea, Anca Hangan, Tudor Cioara

    Published 2025-06-01
    “…To overcome the challenges posed by homomorphic encryption, we redesign the traditional histogram construction algorithm, optimizing it for secure computation by addressing constraints related to nested loops and conditional statements. …”
    Get full text
    Article
  5. 4645

    Predictive analysis of solubility data with pressure and temperature in assessing nanomedicine preparation via supercritical carbon dioxide by Hashem O. Alsaab, Yusuf S. Althobaiti

    Published 2025-08-01
    “…The ADABOOST ensemble technique was applied to strengthen the predictive capabilities of the models, while hyperparameter tuning was conducted using the Jellyfish Optimization (JO) algorithm. …”
    Get full text
    Article
  6. 4646

    Intelligent Counterforce Allocation Method Using Multi-Agent Reinforcement Learning for Ground Operations by Kiwoong Park, Sangheun Shim

    Published 2025-01-01
    “…Modern military operations require commanders to make complex tactical decisions involving the effective allocation of multiple friendly forces to counter enemy threats while managing diverse streams of battlefield information. …”
    Get full text
    Article
  7. 4647

    Regenerative Braking in PV-Mounted Electric Vehicle With Reduced Switch VSI-Driven BLDC Motor and HAP-FUP Controller by Ron Carter S. B., Thangavel S.

    Published 2024-01-01
    “…Maximum energy is extracted from the PV module via employment of a particle swarm optimization (PSO)-based maximum power point tracking (MPPT) algorithm, while propulsion is provided through utilization of a brushless direct current (BLDC) motor driven by reduced switch voltage source inverter (VSI). …”
    Get full text
    Article
  8. 4648

    Block encoding bosons by signal processing by Christopher F. Kane, Siddharth Hariprakash, Neel S. Modi, Michael Kreshchuk, Christian W Bauer

    Published 2025-05-01
    “…Block Encoding (BE) is a crucial subroutine in many modern quantum algorithms, including those with near-optimal scaling for simulating quantum many-body systems, which often rely on Quantum Signal Processing (QSP). …”
    Get full text
    Article
  9. 4649

    Risk averse reproduction numbers improve resurgence detection. by Kris V Parag, Uri Obolski

    Published 2023-07-01
    “…We find that this weighting can cause delayed detection of outbreak resurgence and premature signalling of epidemic control because it underrepresents the risks from highly transmissible groups. Applying E-optimal experimental design theory, we develop a weighting algorithm to minimise these issues, yielding the risk averse reproduction number E. …”
    Get full text
    Article
  10. 4650

    Effect of crystal-to-detector distance shift on data processing in serial crystallography. by Ki Hyun Nam

    Published 2025-01-01
    “…Serial synchrotron crystallographic data of hen egg white lysozyme (HEWL) and glucose isomerase (GI) were processed at various CTDDs using three indexing algorithms. The CTDD that yielded the maximum number of indexed images differed from the optimized CTDD, and the resulting indexing trends varied depending on the algorithm used. …”
    Get full text
    Article
  11. 4651

    Design and Simulation of a Four-Legged Mobile Robot for Autonomous Navigation on a Spacecraft Hull by Motaz Hassan, Kayla Dremann, Ashton Orosa, Emily Metzger, Nathan Doty, Julia Patek, Siamak Farhad, Ajay Mahajan

    Published 2025-01-01
    “…The robot demonstrated the ability to follow the computed optimal path with a positional deviation of less than 0.5% by the third trial. …”
    Get full text
    Article
  12. 4652

    Building construction crack detection with BCCD YOLO enhanced feature fusion and attention mechanisms by Wenhao Ren, Zuowei Zhong

    Published 2025-07-01
    “…Abstract An effective algorithm for detecting cracks in bare concrete structures in building construction, capable of identifying small targets, is essential for safeguarding buildings. …”
    Get full text
    Article
  13. 4653

    Improving classifier decision boundaries and interpretability using nearest neighbors by Johannes Schneider, Arianna Casanova

    Published 2025-07-01
    “…Unlike prior methods, our approach achieves improvements without introducing trade-offs or necessitating architectural adaptations, while providing actionable insights and theoretical analysis to support its efficacy.…”
    Get full text
    Article
  14. 4654

    Acoustic Source Localization Based on the Two-Level Data Aggregation Technology in a Wireless Sensor Network by Yuwu Feng, Guohua Hu, Lei Hong

    Published 2025-04-01
    “…The inherent energy constraints of sensor nodes render energy efficiency optimization a critical challenge in wireless sensor network deployments. …”
    Get full text
    Article
  15. 4655

    Dynamic Large-Scale Server Scheduling for IVF Queuing Network in Cloud Healthcare System by Yafei Li, Hongfeng Wang, Li Li, Yaping Fu

    Published 2021-01-01
    “…The experimental results show that the optimal service rule of each server’s queue obtained by the RL method is significantly superior to the traditional service rule.…”
    Get full text
    Article
  16. 4656

    Hybrid Damping Mode MR Damper: Development and Experimental Validation with Semi-Active Control by Jeongwoo Lee, Kwangseok Oh

    Published 2025-05-01
    “…This configuration supports four damping modes—Soft/Soft, Hard/Soft, Soft/Hard, and Hard/Hard—allowing adaptability to varying driving conditions. Magnetic circuit optimization ensures rapid damping force adjustments (≈10 ms), while a semi-active control algorithm incorporating skyhook logic, roll, dive, and squat control strategies was implemented. …”
    Get full text
    Article
  17. 4657

    Large-Scale Transmission Expansion Planning with Network Synthesis Methods for Renewable-Heavy Synthetic Grids by Adam B. Birchfield, Jong-oh Baek, Joshua Xia

    Published 2025-07-01
    “…The transmission expansion planning (TEP) problem is particularly challenging because of the combinatorial, integer optimization nature of the problem and the complexity of engineering analysis for any one possible solution. …”
    Get full text
    Article
  18. 4658

    Post-Quantum Cryptographic Frameworks for Internet of Things (IoT) and Internet of Medical Things (IoMT) Authentication Systems by Thomas L Barna, Samson Isaac, Christopher Habu, Saratu Habu, Abimbola A Joseph

    Published 2025-06-01
    “…The framework incorporates three innovations: (1) an NTRU-based key establishment protocol, leveraging the Shortest Vector Problem in polynomial lattices, (2) a hash-based authentication mechanism with zero-knowledge proof verification, and (3) a genetic algorithm that dynamically optimizes cryptographic parameters in real-time, based on device capabilities and network conditions. …”
    Get full text
    Article
  19. 4659

    Unsupervised fake news detection on social media using hybrid Gaussian Mixture Model. by Sajida Perveen, Muhammad Shahbaz, Sami S Albouq, Khlood Shinan, Hanan E Alhazmi, Fatmah Alanazi, M Usman Ashraf, Rehan Ashraf

    Published 2025-01-01
    “…In particular, it also proposes a novel hybrid method that leverages the Gaussian Mixture Model (GMM) in conjunction with the Group Counseling Optimizer (GCO), a metaheuristic optimization algorithm, to identify the optimal number of clusters for the detection of fake news. …”
    Get full text
    Article
  20. 4660

    Enhancing Latent Defect Detection in Built-In Spindle Assembly Lines Through Vibration Data Analysis by Kuo-Hao Li, Chao-Nan Wang, Yao-Chi Tang

    Published 2025-01-01
    “…The integration of these advanced algorithms accurately identified defects and categorized them, thus optimizing manufacturing processes. …”
    Get full text
    Article