Showing 4,021 - 4,040 results of 5,934 for search '(( whole optimizer algorithm ) OR ((( whole optimize algorithm ) OR ( while optimize algorithm ))))', query time: 0.32s Refine Results
  1. 4021

    Distributed Formation Control with Obstacle and Collision Avoidance for Hypersonic Gliding Vehicles Subject to Multiple Constraints by Zhen Zhang, Yifan Luo, Yaohong Qu

    Published 2023-01-01
    “…The actual control input solver adopts a feasible solution process to calculate the actual control signals while dealing with constraints. Finally, extensive numerical simulations are implemented to unveil the proposed algorithm’s performance and superiority.…”
    Get full text
    Article
  2. 4022

    Robust sparse smooth principal component analysis for face reconstruction and recognition. by Jing Wang, Xiao Xie, Li Zhang, Jian Li, Hao Cai, Yan Feng

    Published 2025-01-01
    “…Consequently, the proposed RSSPCA algorithm generally outperforms existing algorithms in face reconstruction and recognition. …”
    Get full text
    Article
  3. 4023

    IoT intrusion detection method for unbalanced samples by ANTONG P, Wen CHEN, Lifa WU

    Published 2023-02-01
    “…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
    Get full text
    Article
  4. 4024

    Efficient multiplication for finite fields of p characteristic by LI Yin 1, CHEN Gong-liang1, LI Jian-hua1

    Published 2009-01-01
    “…Based on residue arithmetic,a new form of polynomial named PAPB in Fp[x] had been constructed.The amount and distribution of such irreducible polynomials had also been investigated.Then,an efficient algorithm for multiplication modulo PAPB had been proposed using residue arithmetic and Chinese remainder theorem.In the end,the result analysis was given.The theoretic analysis and simulation experiment show that for some finite field of medium prime characteristic,the given algorithm only costs O(k1.5) operations in Fp while the multiplication modulo irreducible binomial cost O(k2) operations,which shows a better performance.As a result,the work presents an interesting perspective for optimal extension field and elliptic curve cryptography.…”
    Get full text
    Article
  5. 4025

    Analysis of Two-Grid Characteristic Finite Element Methods for Convection-Diffusion Equations by Keyan Wang, Boxia Hu

    Published 2023-01-01
    “…We present an optimal error estimate in Lp-norm for the characteristic finite element method unconditionally, while all previous works require certain time-step restrictions. …”
    Get full text
    Article
  6. 4026

    Efficient dynamic task offloading and resource allocation in UAV-assisted MEC for large sport event by Chen Peng, Qiqi Wang, Desheng Zhang

    Published 2025-04-01
    “…Experiments shows that the EDRA algorithm can reduce energy consumption by 32.4% compared to advanced algorithms while ensuring stronger system performance.…”
    Get full text
    Article
  7. 4027

    Turning Energy-Aware Route Planning With an Extended TSP and Double-Layer State Graph: Experimental Evaluation With a Crawler Mobile Robot by Namihei Adachi, Hisashi Date

    Published 2025-01-01
    “…The routes that minimized energy consumption showed an average 17 % reduction in energy consumption, while the routes that minimized travel time achieved an average 5 % reduction in travel time compared to the standard TSP algorithm.…”
    Get full text
    Article
  8. 4028

    Federated deep reinforcement learning-based edge collaborative caching strategy in space-air-ground integrated network by LIU Liang, JING Tengxiang, DUAN Jie, MAO Wuping, YAN Hongcheng, MA Wenjie

    Published 2025-01-01
    “…Simulation results show that compared with other algorithm, the proposed algorithm can improve the cache hit rate of user requests by 18% and reduce the access latency of content by 25% while protecting user privacy.…”
    Get full text
    Article
  9. 4029

    Differentiable architecture search-based automatic modulation recognition for multi-carrier signals by LI Jie, LI Jing, LYU Lu, GONG Fengkui

    Published 2024-09-01
    “…Simulation results demonstrate that the proposed algorithm improves accuracy in urban multipath channels, especially at low SNR, while simultaneously providing better robustness to modulation parameter variations and small-sample scenarios.…”
    Get full text
    Article
  10. 4030

    A grid-based sectoring for energy-efficient wireless sensor networks by Nubunga Ishaya, Mustapha Aminu Bagiwa

    Published 2025-04-01
    “…This research improves CH selection by organizing sensor nodes into square grid clusters and employing a routing algorithm for randomized CH selection. Game theory (GT) and Ad hoc on Demand Vectors (AODV) were used to choose the optimal routing path, while Grey Wolf Optimization (GWO) was used to determine the optimal CHs. …”
    Get full text
    Article
  11. 4031

    Energy-Efficient Node Selection for Target Tracking in Wireless Sensor Networks by Yong Wang, Dianhong Wang

    Published 2013-01-01
    “…With this understanding, a dynamic node selection scheme based on genetic algorithms is proposed, which can optimize the tradeoff between the accuracy of tracking and the energy cost of nodes. …”
    Get full text
    Article
  12. 4032

    Secure Latency-Aware Task Offloading Using Federated Learning and Zero Trust in Edge Computing for IoMT by Waleed Almuseelem

    Published 2025-01-01
    “…Within FL, an improved on-policy temporal difference control algorithm is leveraged for local model training. Moreover, this algorithm determines the optimal offloading strategy based on the global model while considering trustworthiness, the heterogeneous nature of tasks, resource availability, and latency. …”
    Get full text
    Article
  13. 4033

    Design of key technologies for intranet dynamic gateway based on DPDK by Fucai CHEN, Weizhen HE, Guozhen CHENG, Shumin HUO, Dacheng ZHOU

    Published 2020-06-01
    “…Aiming at the problems of high packet processing delay and high overhead caused by IP hopping,active defense gateway system with multi-layer network deployment structure was designed and implemented based on the data plane development kit (DPDK).Firstly,based on the DPDK fast forwarding framework,forwarding and processing performance of the system were optimized.Secondly,for the dynamic random mapping gateway with three different types of IP addresses,an efficient IP address allocation algorithm and an unpredictable IP address conversion algorithm were designed.The experimental results show that the designed system can effectively reduce the rate of information acquisition of sniffing attack,while greatly improving the processing delay caused by dynamic hopping.…”
    Get full text
    Article
  14. 4034

    Coordinated beamforming for cognitive multi-cell networks with wiretap channels by Dong-hua CHEN, Xiu-xiu ZHANG, Wei-bo XIE

    Published 2014-11-01
    “…Owing to the coupling among the vectors to be optimized,the problem becomes non-convex and non-linear.Accordingly,a centralized coordinated beamforming design method was proposed by constraining the leakage interference and using the semi-definite relaxation,and on the base of it,a decentralized algorithm was also proposed by decomposing the centralized design problem into a group of sub-problems on each cell’s base by using dual decomposition.Simulation results show that the proposed schemes make effective reduction in power consumption while guarantee the legal users’ secrecy rate requirement and the cognitive interference constraint.Moreover,the proposed decentralized method not only reduces the computational complexity,but also has the same performance as the centralized algorithm.…”
    Get full text
    Article
  15. 4035

    Multi-Channel Sparse-Frequency-Scanning White-Light Interferometry with Adaptive Mode Locking for Pulse Wave Velocity Measurement by Yifei Xu, Laiben Gao, Cheng Qian, Yiping Wang, Wenyan Liu, Xiaoyan Cai, Qiang Liu

    Published 2025-03-01
    “…Compared to normal MLCC algorithm, the Fibonacci-optimized algorithm reduces the number of computational iterations by 57 times while maintaining sub-nanometer resolution under dynamic perturbations. …”
    Get full text
    Article
  16. 4036

    Integrating artificial intelligence in nanomembrane systems for advanced water desalination by Anbarasu Krishnan, Thanigaivel Sundaram, Beemkumar Nagappan, Yuvarajan Devarajan, Bhumika

    Published 2024-12-01
    “…The increasing global demand for clean drinking water calls for innovative approaches to optimize desalination processes, making them more sustainable and efficient. …”
    Get full text
    Article
  17. 4037

    Research on Network Handover Based on User Movement Prediction in Visible Light Communication and Wi-Fi Heterogeneous Networks by Chenghu Ke, Mengfan Wang, Huanhuan Qin, Xizheng Ke

    Published 2025-02-01
    “…Extracting meaningful and important location points from massive trajectory data for clustering, an improved hidden Markov model is used to predict the user’s next location by analyzing the patterns of the user’s historical mobile trajectory data. The Q-learning algorithm is then used to determine the optimal network handover based on the current network state, while a seamless handover protocol is introduced to ensure successful network transition and uninterrupted data transmission. …”
    Get full text
    Article
  18. 4038

    Efficient and secure multi-party computation protocol supporting deep learning by Shancheng Zhang, Gang Qu, Zongyang Zhang, Minzhe Huang, Haochun Jin, Liqun Yang

    Published 2025-07-01
    “…For Softmax computation, we extend existing two-party protocols to a multi-party Shamir setting, developing the nQSMax algorithm. This algorithm achieves exceptional accuracy exceeding 99% within seconds, requiring only a few iterations.…”
    Get full text
    Article
  19. 4039

    Coordinated Scheduling for Zero-Wait RGV/ASR Warehousing Systems with Finite Buffers by Wenbin Gu, Na Tang, Lei Wang, Zhenyang Guo, Yushang Cao, Minghai Yuan

    Published 2025-06-01
    “…Additionally, in 15 randomized test scenarios, AMHS demonstrated superior performance over three benchmark algorithms—Genetic Algorithm (GA), Discrete Imperialist Competitive Algorithm (DICA), and Improved Whale Optimization Algorithm (IWOA)—achieving an average makespan reduction of 12.6% relative to GA.…”
    Get full text
    Article
  20. 4040

    A location semantic privacy protection model based on spatial influence by Linghong Kuang, Wenlong Shi, Xueqi Chen, Jing Zhang, Huaxiong Liao

    Published 2025-04-01
    “…Finally, the problem of synthesizing dummy trajectories is transformed into a matching problem for directed bipartite graphs and the optimal k-anonymity set is obtained using the Kuhn Munkres algorithm. …”
    Get full text
    Article