Showing 3,841 - 3,860 results of 6,222 for search '((whale OR whole) OR while) (optimizer OR optimize) algorithm', query time: 0.26s Refine Results
  1. 3841

    Performance analysis of secrecy rate for SWIPT in massive antenna by Hui BAO, Minmin ZHANG, Yaqing YAO, Hui WANG

    Published 2017-09-01
    “…In the multi-drop broadcast system,the existing research is to optimize the single-user security rate in the complete channel state information.In fact,it’s impossible that there exists only one user in the system.The base station often receives incomplete channel state information.Aiming at this problem,a robust beamforming scheme was proposed.In the multi-user case,considering the influence of channel estimation error on the system security rate,the particle swarm optimization algorithm was used to optimize the emission beamforming vector,artificial noise covariance and power split ratio to ensure that the user collects a certain energy while maximizing the safe transmission rate.The simulation results show that the proposed scheme is slightly lower than the security rate in the ideal case,but it is meaningful to the actual system,taking into account the existence of eavesdropping users and the estimation error.…”
    Get full text
    Article
  2. 3842

    Discussing the Construction of a Budget Management System Combining Multimedia Technology and Financial Risk Management by Xiaoyi Jiang

    Published 2022-01-01
    “…From the whole process of data mining, a data mining system is designed, which is “data preprocessing standardization + genetic algorithm feature selection + training set pruning + support vector machine classifier discrimination optimization.” …”
    Get full text
    Article
  3. 3843

    Unsupervised fake news detection on social media using hybrid Gaussian Mixture Model. by Sajida Perveen, Muhammad Shahbaz, Sami S Albouq, Khlood Shinan, Hanan E Alhazmi, Fatmah Alanazi, M Usman Ashraf, Rehan Ashraf

    Published 2025-01-01
    “…In particular, it also proposes a novel hybrid method that leverages the Gaussian Mixture Model (GMM) in conjunction with the Group Counseling Optimizer (GCO), a metaheuristic optimization algorithm, to identify the optimal number of clusters for the detection of fake news. …”
    Get full text
    Article
  4. 3844

    UAV-Enabled Inspection System With No-Fly Zones: DRL-Based Joint Mobile Nest Scheduling and UAV Trajectory Design by Jin Dai, Yunfei Gao, Chao Cai, Wei Xiong, Manjia Liu

    Published 2025-01-01
    “…This paper investigates a UAV-enabled inspection system in an urban environment with no-fly zones (NFZs), where the UAV flies to inspection points to capture images while constrained by limited onboard energy. The aim of this paper is to minimize the whole inspection time via joint optimization of the mobile nest’s scheduling and UAV trajectory while satisfying constraints related to energy maximization and avoiding NFZs. …”
    Get full text
    Article
  5. 3845

    Inverse design of perimeter-controlled InAs-assisted metasurface for two-dimensional dynamic beam steering by Sabri Raana, Mosallaei Hossein

    Published 2022-09-01
    “…The multi-objective genetic algorithm (GA) for optimizing user-defined metrics toward shaping desired far-zone radiation pattern is implemented. …”
    Get full text
    Article
  6. 3846

    Research on Designing an Industrial Product-Service System with Uncertain Customer Demands by Fei Zhang, Liecheng Jia, Weizhen Han

    Published 2021-01-01
    “…Next, a QFD- and AD-integrated model is constructed to establish a mapping between the function domain and the structure domain and optimize the control scheme through the quality of its risk prediction. …”
    Get full text
    Article
  7. 3847

    Implementation of Machine Vision Methods for Cattle Detection and Activity Monitoring by Roman Bumbálek, Tomáš Zoubek, Jean de Dieu Marcel Ufitikirezi, Sandra Nicole Umurungi, Radim Stehlík, Zbyněk Havelka, Radim Kuneš, Petr Bartoš

    Published 2025-03-01
    “…The goal of this research was to implement machine vision algorithms in a cattle stable to detect cattle in stalls and determine their activities. …”
    Get full text
    Article
  8. 3848

    An Interpretable Data-Driven Dynamic Operating Envelope Calculation Method Based on an Improved Deep Learning Model by Yun Li, Tunan Chen, Jianzhao Liu, Zhaohua Hu, Yuchen Qi, Ye Guo

    Published 2025-05-01
    “…We train a CNN-LSTM-Attention neural network for voltage estimation, where we employ the whale optimization algorithm (WOA) to adjust hyperparameters automatically. …”
    Get full text
    Article
  9. 3849

    BS-SCRM: a novel approach to secure wireless sensor networks via blockchain and swarm intelligence techniques by Jing Xiao, Chaoqun Li, Zhigang Li, Jie Zhou

    Published 2024-04-01
    “…The proposed BS-SCRM method is structured in two phases: (1) an enhanced cluster head (CH) election utilizing an elite strategy-enhanced Whale Optimization Algorithm (WOA) that considers node energy and proximity to the base station, and (2) a secure data on-chain phase where blockchain comes into play, encrypting and validating cluster data to safeguard integrity and prevent tampering. …”
    Get full text
    Article
  10. 3850

    Auxiliary Stopping Area Layout Method for High-Speed Maglev considering Multiple Speed Profiles and Bidirectional Operation by Danyang Dong, Yi Yu, Huahua Zhao, Pengzi Chu, Hui Lin

    Published 2021-01-01
    “…Aiming at the layout of the ASA along the track, this article constructs an optimized model of ASA layout and proposes a solving algorithm based on the single target genetic algorithm by analyzing the influence factors of ASA layout. …”
    Get full text
    Article
  11. 3851

    Design of precoding matrices in MIMO full duplex two-way security communication system by Weijia LEI, Yang ZHOU, Xianzhong XIE, Hongjiang LEI

    Published 2020-10-01
    “…The design of precoding matrices was studied in the multiple input multiple output (MIMO) full-duplex two-way security communication system where legitimate nodes transmit the confidential information accompanied by the artificial noise while receiving information.For the scenario where the perfect channel state information (CSI) of legitimate channels and eavesdropping channels was available,the difference of concave/convex (DC) programming was used to optimize the precoding matrices of the information signal and the artificial noise for the maximization of the secrecy sum rate.For the scenario where the CSI was imperfect,the channels were modeled by using worst-case criterion and the weighted minimum mean square error algorithm was used to get the robust precoding matrices of the information signal and the artificial noise.The simulation results prove that the proposed algorithm can effectively promote the secrecy sum rate of the system.…”
    Get full text
    Article
  12. 3852

    Adaptive Multi-Robot Exploration for Unknown Environments Using Edge-Weighted Path Planning by Farhad Baghyari, Tyler Parsons, Jaho Seo, Byeongjin Kim, Mingeuk Kim, Hanmin Lee

    Published 2025-01-01
    “…This study presents a scalable and adaptive multi-robot exploration algorithm that adaptively updates edge weights based on visit counts, reservations, and obstacles to optimize path allocation and minimize redundant scanning. …”
    Get full text
    Article
  13. 3853

    Research on quality and safety risk identification of import and export toys based on the WOA-BP model by Qiong He, Pengzhao Li

    Published 2025-08-01
    “…LDA then clusters these words into structured risk factors (types, materials, defects) and five risk event categories, providing model inputs. The WOA-BP model, optimizing BP with the Whale Optimization Algorithm, achieves 95.71% accuracy—5.71% points higher than unoptimized BP and outperforming PSO-BP and GA-BP. …”
    Get full text
    Article
  14. 3854

    What Strategy Central Nervous System Uses to Perform a Movement Balanced? Biomechatronical Simulation of Human Lifting by Ali Leylavi Shoushtari

    Published 2013-01-01
    “…To solve the kinematic redundancy in previous studies it is hypothesize that CNS functions as an optimizer, such of that are the task-based algorithms which search to find optimal solution for each specific task. …”
    Get full text
    Article
  15. 3855

    Mapping Landslide Sensitivity Based on Machine Learning: A Case Study in Ankang City, Shaanxi Province, China by Baoxin Zhao, Jingzhong Zhu, Youbiao Hu, Qimeng Liu, Yu Liu

    Published 2022-01-01
    “…The main purpose of this research is to apply the logistic regression (LR) model, the support vector machine (SVM) model based on radial basis function, the random forest (RF) model, and the coupled model of the whale optimization algorithm (WOA) and genetic algorithm (GA) with RF, to make landslide susceptibility mapping for the Ankang City of Shaanxi Province, China. …”
    Get full text
    Article
  16. 3856

    Multi-Armed Bandit Approaches for Location Planning with Dynamic Relief Supplies Allocation Under Disaster Uncertainty by Jun Liang, Zongjia Zhang, Yanpeng Zhi

    Published 2024-12-01
    “…We introduce a multi-armed bandit algorithm, named the Geometric Greedy algorithm, to optimize transfer station planning while accounting for subsequent dynamic relief supply distribution and allocation in a stochastic environment. …”
    Get full text
    Article
  17. 3857

    Mixed Balanced Truncation for Reducing the Complexity of Large-Scale Electrical and Electronic System Simulations by Huy-Du Dao, Thanh-Tung Nguyen, Ngoc-Kien Vu, Van-Ta Hoang, Hong-Quang Nguyen

    Published 2025-01-01
    “…This paper proposes the Mixed Balanced Truncation (MBT) algorithm, which combines the strengths of Balanced Truncation (BT) and Positive-Real Balanced Truncation (PRBT) while addressing their respective limitations. …”
    Get full text
    Article
  18. 3858

    Gaussian Process Regression with Soft Equality Constraints by Didem Kochan, Xiu Yang

    Published 2025-01-01
    “…Additionally, we introduce an adaptive learning algorithm to optimize the selection of constraint locations to further enhance the flexibility of the method. …”
    Get full text
    Article
  19. 3859

    An integrated model of threshold-based scaling and fractional admission controlling to improve resource utilization efficiency in 5G core networks. by Ly Cuong Hoa, Thanh Chuong Dang, Viet Minh Nhat Vo

    Published 2025-01-01
    “…One requirement is utilizing system resources effectively while ensuring stable system performance. Specifically, the need to optimize unused UPF instances to reduce system costs. …”
    Get full text
    Article
  20. 3860

    Flow shop scheduling of hybrid make-to-stock and make-to-order in a distributed precast concrete production system by Chen Chen, Jinchi Han, Ziwen Liu, Robert Lee Kong Tiong

    Published 2023-06-01
    “…Comparisons between the genetic algorithm and the whale optimization algorithm are made. …”
    Get full text
    Article