Showing 3,681 - 3,700 results of 5,934 for search '(( whole optimizer algorithm ) OR ((( whole optimize algorithm ) OR ( while optimize algorithm ))))', query time: 0.30s Refine Results
  1. 3681

    A Full-Life-Cycle Modeling Framework for Cropland Abandonment Detection Based on Dense Time Series of Landsat-Derived Vegetation and Soil Fractions by Qiangqiang Sun, Zhijun You, Ping Zhang, Hao Wu, Zhonghai Yu, Lu Wang

    Published 2025-06-01
    “…Compared to the traditional yearly land cover-based approach (with an overall accuracy of 77.39%), this algorithm can overcome the propagation of classification errors (with product accuracy from 74.47% to 85.11%), especially in terms of improving the ability to capture changes at finer spatial scales. …”
    Get full text
    Article
  2. 3682

    Mapping the air temperature in China from time-normalized MODIS land surface temperature data via zone-based stacking ensemble models by Yan Xin, Yongming Xu, Xudong Tong, Yaping Mo, Yonghong Liu, Shanyou Zhu

    Published 2025-07-01
    “…First, Terra/MODIS LST was temporally normalized using ERA5 reanalysis data to eliminate the uncertainty caused by differences in observation times. Then, the whole study area was divided into subzones, and nine base models were developed in each zone using machine learning (ML) methods to estimate Ta. …”
    Get full text
    Article
  3. 3683

    A new internal clustering validation index for categorical data based on concentration of attribute values by FU Li-wei, WU Sen

    Published 2019-05-01
    “…For data with a clustering structure, different results obtained under different algorithms and parameters also need to be further optimized by clustering validation. …”
    Get full text
    Article
  4. 3684

    Improving energy efficiency and network performance in IaaS cloud with virtual machine placement by Jian-kang DONG, Hong-bo WANG, Yang-yang LI, Shi-duan CHENG

    Published 2014-01-01
    “…The existing virtual machine(VM) placement schemes mostly reduce energy consumption by optimizing utilization of physical server or network element.However,the aggressive consolidation of these resources may lead to network performance degradation.In view of this,a VM placement scheme was proposed to achieve two objectives.One is to minimize the number of activating physical machines and network elements to reduce the energy consumption,and the other is to minimize the maximum link utilization to improve the network performance.This scheme is able to reduce the energy consumption caused by physical servers and network equipment while optimizing the network performance,making a trade off between energy efficiency and network performance.A novel two-stage heuristic algorithm for a solution was designed.Firstly,the hierarchical clustering algorithm based on minimum cut and best fit algorithm was used to optimize energy efficiency,and then,local search algorithm was used to minimize the maximum link utilization.The simulations show that this solution achieves good results.…”
    Get full text
    Article
  5. 3685

    Faster quantum subroutine for matrix chain multiplication via Chebyshev approximation by Xinying Li, Pei-Lin Zheng, Chengkang Pan, Fei Wang, Chunfeng Cui, Xian Lu

    Published 2025-08-01
    “…The algorithm can be applied to any complex matrix. Furthermore, we discuss integrating our QMM algorithm as a subroutine in other matrix operations and propose strategies to optimize QMM for matrices with large condition numbers with numerical simulation.…”
    Get full text
    Article
  6. 3686

    Digital mapping of peat thickness and extent in Finland using remote sensing and machine learning by Jonne Pohjankukka, Timo A. Räsänen, Timo P. Pitkänen, Arttu Kivimäki, Ville Mäkinen, Tapio Väänänen, Jouni Lerssi, Aura Salmivaara, Maarit Middleton

    Published 2025-03-01
    “…In this study, we present a workflow for producing peat occurrence maps for the whole of Finland. For this, we used random forest classification to map areas with peat thicknesses of ≥ 10 cm, ≥30 cm, ≥40 cm, and > 60 cm. …”
    Get full text
    Article
  7. 3687

    Performance analysis of secrecy rate for SWIPT in massive antenna by Hui BAO, Minmin ZHANG, Yaqing YAO, Hui WANG

    Published 2017-09-01
    “…In the multi-drop broadcast system,the existing research is to optimize the single-user security rate in the complete channel state information.In fact,it’s impossible that there exists only one user in the system.The base station often receives incomplete channel state information.Aiming at this problem,a robust beamforming scheme was proposed.In the multi-user case,considering the influence of channel estimation error on the system security rate,the particle swarm optimization algorithm was used to optimize the emission beamforming vector,artificial noise covariance and power split ratio to ensure that the user collects a certain energy while maximizing the safe transmission rate.The simulation results show that the proposed scheme is slightly lower than the security rate in the ideal case,but it is meaningful to the actual system,taking into account the existence of eavesdropping users and the estimation error.…”
    Get full text
    Article
  8. 3688

    Adaptive Multi-Robot Exploration for Unknown Environments Using Edge-Weighted Path Planning by Farhad Baghyari, Tyler Parsons, Jaho Seo, Byeongjin Kim, Mingeuk Kim, Hanmin Lee

    Published 2025-01-01
    “…Experimental results demonstrate that the algorithm achieves improved exploration efficiency and adaptability compared to a real-time scheduling method while maintaining computational feasibility. …”
    Get full text
    Article
  9. 3689

    Design of precoding matrices in MIMO full duplex two-way security communication system by Weijia LEI, Yang ZHOU, Xianzhong XIE, Hongjiang LEI

    Published 2020-10-01
    “…The design of precoding matrices was studied in the multiple input multiple output (MIMO) full-duplex two-way security communication system where legitimate nodes transmit the confidential information accompanied by the artificial noise while receiving information.For the scenario where the perfect channel state information (CSI) of legitimate channels and eavesdropping channels was available,the difference of concave/convex (DC) programming was used to optimize the precoding matrices of the information signal and the artificial noise for the maximization of the secrecy sum rate.For the scenario where the CSI was imperfect,the channels were modeled by using worst-case criterion and the weighted minimum mean square error algorithm was used to get the robust precoding matrices of the information signal and the artificial noise.The simulation results prove that the proposed algorithm can effectively promote the secrecy sum rate of the system.…”
    Get full text
    Article
  10. 3690

    Auxiliary Stopping Area Layout Method for High-Speed Maglev considering Multiple Speed Profiles and Bidirectional Operation by Danyang Dong, Yi Yu, Huahua Zhao, Pengzi Chu, Hui Lin

    Published 2021-01-01
    “…Aiming at the layout of the ASA along the track, this article constructs an optimized model of ASA layout and proposes a solving algorithm based on the single target genetic algorithm by analyzing the influence factors of ASA layout. …”
    Get full text
    Article
  11. 3691

    Mixed Balanced Truncation for Reducing the Complexity of Large-Scale Electrical and Electronic System Simulations by Huy-Du Dao, Thanh-Tung Nguyen, Ngoc-Kien Vu, Van-Ta Hoang, Hong-Quang Nguyen

    Published 2025-01-01
    “…This paper proposes the Mixed Balanced Truncation (MBT) algorithm, which combines the strengths of Balanced Truncation (BT) and Positive-Real Balanced Truncation (PRBT) while addressing their respective limitations. …”
    Get full text
    Article
  12. 3692

    Gaussian Process Regression with Soft Equality Constraints by Didem Kochan, Xiu Yang

    Published 2025-01-01
    “…Additionally, we introduce an adaptive learning algorithm to optimize the selection of constraint locations to further enhance the flexibility of the method. …”
    Get full text
    Article
  13. 3693

    Multi-Armed Bandit Approaches for Location Planning with Dynamic Relief Supplies Allocation Under Disaster Uncertainty by Jun Liang, Zongjia Zhang, Yanpeng Zhi

    Published 2024-12-01
    “…We introduce a multi-armed bandit algorithm, named the Geometric Greedy algorithm, to optimize transfer station planning while accounting for subsequent dynamic relief supply distribution and allocation in a stochastic environment. …”
    Get full text
    Article
  14. 3694

    A global object-oriented dynamic network for low-altitude remote sensing object detection by Daoze Tang, Shuyun Tang, Yalin Wang, Shaoyun Guan, Yining Jin

    Published 2025-05-01
    “…This study introduces the Global Object-Oriented Dynamic Network (GOOD-Net) algorithm, comprising three fundamental components: an object-oriented, dynamically adaptive backbone network; a neck network designed to optimize the utilization of global information; and a task-specific processing head augmented for detailed feature refinement. …”
    Get full text
    Article
  15. 3695

    An integrated model of threshold-based scaling and fractional admission controlling to improve resource utilization efficiency in 5G core networks. by Ly Cuong Hoa, Thanh Chuong Dang, Viet Minh Nhat Vo

    Published 2025-01-01
    “…One requirement is utilizing system resources effectively while ensuring stable system performance. Specifically, the need to optimize unused UPF instances to reduce system costs. …”
    Get full text
    Article
  16. 3696

    Energy management in a microgrid equipped with an electric vehicle based on the internet of things considering responsive load by Mohamad Mahdi Erfani Majd, Reza Davarzani, Mahmoud Samiei Moghaddam, Ali Asghar Shojaei, Mojtaba Vahedi

    Published 2025-02-01
    “…A novel Energy-Trading Management Algorithm (ETMA), based on the Meerkat Optimization Algorithm (MOA), is proposed to tackle the complexities of this system. …”
    Get full text
    Article
  17. 3697

    Key Nodes Identification Method in Scale-Free Network Based on Structural Holes by Weiyan Liu

    Published 2025-01-01
    “…The proposed algorithm achieves higher accuracy in structural hole-aware ranking compared to benchmarks while maintaining <inline-formula> <tex-math notation="LaTeX">${ O}\left ({{ m+n.logn }}\right)$ </tex-math></inline-formula> complexity. …”
    Get full text
    Article
  18. 3698

    A Lightweight, Intelligent Autonomous Exploration System for Indoor Robots Using Improved Random Walk With Back-Off Strategies by Blesson Mathews Luke, S. Abraham Sampson

    Published 2025-01-01
    “…The algorithm maintained a reliable average localization error of 0.005 m while exhibiting memory efficiency by the reduced memory usage by up to 13.7% relative to TB3. …”
    Get full text
    Article
  19. 3699

    Intelligent Energy Management in an Isolated DC Microgrid using Fuzzy Logic by Youssfi Abdelaziz, El Kadi Youssef Ait

    Published 2025-01-01
    “…The PV system is controlled by a MPPT method implementing the INC algorithm, while the storage system is managed by a PI controller to control battery charging and discharging. …”
    Get full text
    Article
  20. 3700

    MAB-RSP: Data pricing based on Stackelberg game in MCS by Yongjiao Sun, Xueyan Ma, Anrui Han

    Published 2025-07-01
    “…Experiments demonstrate that the algorithm improves revenue while ensuring balanced benefits for all participants.…”
    Get full text
    Article