Showing 1,441 - 1,460 results of 5,934 for search '(( whole optimize algorithm ) OR ( while optimize algorithm ))', query time: 0.28s Refine Results
  1. 1441

    Optimal Design of Low Sidelobe Sparse Linear Arrays by Li Wang, Fenggan Zhang, Banghuan Hou

    Published 2024-01-01
    “…The initial value of the algorithm is generated through the chaotic Piecewise map, while the scaling factor is adjusted dynamically in line with the iterations and fitness values. …”
    Get full text
    Article
  2. 1442

    Comparative Study of Sphere Decoding Algorithm and FCS-MPC for PMSMs in Aircraft Application by Joseph O. Akinwumi, Yuan Gao, Xin Yuan, Sergio Vazquez, Harold S. Ruiz

    Published 2025-05-01
    “…These findings underscore the importance of norm selection, sampling interval optimization, and weighting factor adjustments in balancing THD reduction and switching frequency. …”
    Get full text
    Article
  3. 1443

    Hybrid genetic algorithm and deep learning techniques for advanced side-channel attacks by Faisal Hameed, Hoda Alkhzaimi

    Published 2025-07-01
    “…These findings validate genetic algorithms as a robust alternative for optimizing side-channel attack models, offering both scalability and consistent performance across diverse attack scenarios while advancing the state of cryptographic security assessment.…”
    Get full text
    Article
  4. 1444

    Performance of machine learning algorithms to evaluate the physico-mechanical properties of nanoparticle panels by Derrick Mirindi, James Hunter, David Sinkhonde, Tajebe Bezabih, Frederic Mirindi

    Published 2025-10-01
    “…The Pearson correlation analysis reveals a strong relationship between board properties (R = 0.94 for WA–TS; R = 0.93 for MOR–MOE), confirming that nanoparticle treatments enhance performance while maintaining inherent material behavior. Hierarchical clustering grouped nanoparticles by performance: zinc oxide and chitosan+UF+epoxy formed a cluster with the lowest WA and TS, indicating optimal dimensional stability, while GO, rGO, and chitosan-based composites clustered with moderate values. …”
    Get full text
    Article
  5. 1445

    Leveraging AI to Drive Timely Improvements in Patient Experience Feedback: Algorithm Validation by Mustafa Khanbhai, Catalina Carenzo, Sarindi Aryasinghe, David Manton, Erik Mayer

    Published 2025-07-01
    “…Technical infrastructure, including coding environments and packages for algorithm testing and deployment, was optimized. The algorithm was iteratively trained using bag of words from anonymized data, tailored to accommodate contextual variations, and tested for change in algorithm performance while simultaneously rectifying issues identified. …”
    Get full text
    Article
  6. 1446

    Unmanned aerial vehicle path planning with hybrid motion algorithm for obstacle avoidance by Venkatasivarambabu Pamarthi, Richa Agrawal

    Published 2024-12-01
    “…To enhance trajectory optimization, the optimized motion planner enhances the Rapidly-exploring Random Tree (RRTX) method with a Covariant Hamiltonian Optimization for Motion Planning (CHOMP) algorithm-based optimizer. …”
    Get full text
    Article
  7. 1447

    A Heuristic Motion Planning Algorithm for a Mobile Robot With Nonholonomic Constraints by Duc Thien Tran, Duc Huy Pham, Quang Chien Nguyen

    Published 2024-01-01
    “…This paper proposes a heuristic motion planning algorithm to enhance optimal path determination and tracking for a differential drive mobile robot within a global environment. …”
    Get full text
    Article
  8. 1448

    Adaptive Exploration Artificial Bee Colony for Mathematical Optimization by Shaymaa Alsamia, Edina Koch, Hazim Albedran, Richard Ray

    Published 2024-11-01
    “…By addressing the shortcomings of the traditional ABC algorithm, AEABC significantly advances mathematical optimization, especially in engineering applications. …”
    Get full text
    Article
  9. 1449

    Comprehensive Analysis of Lightweight Cryptographic Algorithms for Battery-Limited Internet of Things Devices by Nahom Gebeyehu Zinabu, Yihenew Wondie Marye, Kula Kekeba Tune, Samuel Asferaw Demilew

    Published 2025-01-01
    “…Among the main trends that were covered were the trade-offs between resource limitations and security strength, hardware–software co-optimization, block and stream cipher optimization, and hybrid encryption techniques. …”
    Get full text
    Article
  10. 1450

    Evolution of Cleft Lip and Palate Surgery and the Pursuit for Consensus on Standardized Algorithms of Care by Priyanka Naidu, MBChB, MS, Alexander T. Plonkowski, MBBS, MRes, Caroline A. Yao, MD, MS, William P. Magee, III, MD, DDS

    Published 2025-03-01
    “…Cleft lip and palate (CLP) surgery has evolved over centuries in an attempt to achieve anatomical closure while optimizing speech and limiting fistulas and midface hypoplasia. …”
    Get full text
    Article
  11. 1451

    An Automated Structural Optimisation Methodology for Scissor Structures Using a Genetic Algorithm by Aushim Koumar, Tine Tysmans, Rajan Filomeno Coelho, Niels De Temmerman

    Published 2017-01-01
    “…We developed a fully automated multiobjective optimisation framework using genetic algorithms to generate a range of optimal barrel vault scissor structures. …”
    Get full text
    Article
  12. 1452

    A fast video coding algorithm using data mining for video surveillance by Bingyue Xie

    Published 2025-08-01
    “…To address this challenge, we propose a novel fast coding algorithm optimized for video surveillance applications. …”
    Get full text
    Article
  13. 1453

    Adaptive Control Algorithm for Trajectory Tracking of Underactuated Unmanned Surface Vehicle (UUSV) by Chandanlal Karnani, Syed Akhter Raza, Muhammad Asif, Muhammad Ilyas

    Published 2023-01-01
    “…In this research, the designed algorithm defines the path and minimizes the disturbances to zero. …”
    Get full text
    Article
  14. 1454

    Minimising latency of pitch detection algorithms for live vocals on low-cost hardware

    Published 2016-01-01
    “…Thorough testing was undertaken in order to determine the best-performing algorithm and optimal parameter combination. Software modifications were implemented to facilitate accurate, repeatable, automated testing in order to build a comprehensive set of results encompassing a wide range of test conditions. …”
    Get full text
    Article
  15. 1455

    A New Multiobjective A∗ Algorithm With Time Window Applied to Large Airports by Bosheng Ba, Ye Yu, Ruixin Wang, Jean-Baptiste Gotteland, Yunqi Gao

    Published 2024-01-01
    “…It also optimizes multiple objectives such as fuel consumption and operates at a solving speed approximately three orders of magnitude faster than the optimal solution algorithm, enabling real-time calculation of aircraft taxiing paths. …”
    Get full text
    Article
  16. 1456
  17. 1457

    Dynamic and adaptive multi-path routing algorithm based on software-defined network by Wu Jiawei, Qiao Xiuquan, Nan Guoshun

    Published 2018-10-01
    “…Moreover, our proposed algorithm can significantly reduce the computational overhead of the controller while completing a fine-grained flow balance. …”
    Get full text
    Article
  18. 1458

    A Federated Learning Algorithm That Combines DCScaffold and Differential Privacy for Load Prediction by Yong Xiao, Xin Jin, Tingzhe Pan, Zhenwei Yu, Li Ding

    Published 2025-03-01
    “…Experimental results demonstrate that the proposed algorithm enables federated training without the need for sharing raw load data, facilitating load scheduling and energy management operations in smart grids while safeguarding user privacy. …”
    Get full text
    Article
  19. 1459

    Evaluation of the Performance of Unsupervised Learning Algorithms for Intrusion Detection in Unbalanced Data Environments by Gutierrez-Portela Fernando, Almenares Mendoza Florina, Calderon-Benavides Liliana

    Published 2024-01-01
    “…Results showed that K-means++ achieved 95% purity with 95% and 99% prediction accuracies for normal and abnormal data, respectively, while I-forest delivered similar results and excelled in computational efficiency, consuming only 10% of CPU resources compared to 16% for other algorithms. …”
    Get full text
    Article
  20. 1460

    Intrusion detection algorithm of wireless network based on network traffic anomaly analysis by Xiangqian Nie, Jiao Xing, Qimeng Li, Fan Xiao

    Published 2025-06-01
    “…To promptly identify and mitigate abnormal behaviors while ensuring normal operation and security, this paper proposes an algorithm for detecting compromised nodes in wireless networks based on network traffic anomaly analysis. …”
    Get full text
    Article