Showing 4,241 - 4,260 results of 6,222 for search '((whale OR whole) OR while) (optimizer OR optimize) algorithm', query time: 0.25s Refine Results
  1. 4241

    Improving the Integrity of a Voting Process with Biometric Authentication and Data Encryption by Walter M. Molina, Lino R. Mac Kay, Daniel Subauste

    Published 2023-04-01
    “…Throughout the years, the voting process has under-gone a digital transformation, aiming to achieve greater control and optimize time while ensuring the integrity of each vote. …”
    Get full text
    Article
  2. 4242

    Joint uplink and downlink resource allocation for D2D communication based on weighted bipartite graph matching and interference clustering by SHEN Bin, YUAN Wenjun, LI Xuan

    Published 2024-06-01
    “…Moreover, the transmit power of DUE was optimized to maximize the system sum rate while ensured that DUE did not cause serious interference to CUE. …”
    Get full text
    Article
  3. 4243

    Robust sparse smooth principal component analysis for face reconstruction and recognition. by Jing Wang, Xiao Xie, Li Zhang, Jian Li, Hao Cai, Yan Feng

    Published 2025-01-01
    “…Within the Minorization-Maximization (MM) framework, an iterative process is designed to solve the RSSPCA optimization problem, ensuring that a locally optimal solution is achieved. …”
    Get full text
    Article
  4. 4244

    Leveraging ultrasonic-derived phenotypes and estimated breeding value to improve abdominal fat weight prediction in chickens throughout the egg laying period by Penghao Li, Zhengda Li, Fan Ying, Dan Zhu, Dawei Liu, Xianyi Song, Jie Wen, Guiping Zhao, Bingxing An

    Published 2025-08-01
    “…Abdominal fat (AF) in hens impacts egg production and may reflect poor feed efficiency, meaning that dynamic monitor of AF changes facilitate to optimize feeding management and production efficiency. …”
    Get full text
    Article
  5. 4245

    Efficient dynamic task offloading and resource allocation in UAV-assisted MEC for large sport event by Chen Peng, Qiqi Wang, Desheng Zhang

    Published 2025-04-01
    “…Our goal is to minimize system energy consumption while satisfying system performance. We formulate the problem as a long-term stochastic optimization problem. …”
    Get full text
    Article
  6. 4246

    Accelerated Tensor Robust Principal Component Analysis via Factorized Tensor Norm Minimization by Geunseop Lee

    Published 2025-07-01
    “…Experimental results demonstrate that our algorithm achieves significantly faster performance than existing reference methods known for efficient computation while maintaining high accuracy in recovering low-rank tensors for applications such as color image recovery and background subtraction.…”
    Get full text
    Article
  7. 4247

    A Study on Multi-ship Avoidance System for Unmanned Surface Vehicles Using the Quaternion Ship Domain and Collision Risk Index by Dong-Hun Lee, Mu-Yeong Seo, Hyo-Geun Lee, Won-Jun Yoo, Sanghyun Kim, Kwang-Jun Paik

    Published 2025-02-01
    “…This paper proposes a multi-ship collision avoidance algorithm that integrates the quaternion ship domain (QSD) and collision risk index (CRI) to assess collision risk and generate optimal avoidance trajectories. …”
    Get full text
    Article
  8. 4248

    Research on filter-based adversarial feature selection against evasion attacks by Qimeng HUANG, Miaomiao WU, Yun LI

    Published 2023-07-01
    “…With the rapid development and widespread application of machine learning technology, its security has attracted increasing attention, leading to a growing interest in adversarial machine learning.In adversarial scenarios, machine learning techniques are threatened by attacks that manipulate a small number of samples to induce misclassification, resulting in serious consequences in various domains such as spam detection, traffic signal recognition, and network intrusion detection.An evaluation criterion for filter-based adversarial feature selection was proposed, based on the minimum redundancy and maximum relevance (mRMR) method, while considering security metrics against evasion attacks.Additionally, a robust adversarial feature selection algorithm was introduced, named SDPOSS, which was based on the decomposition-based Pareto optimization for subset selection (DPOSS) algorithm.SDPOSS didn’t depend on subsequent models and effectively handles large-scale high-dimensional feature spaces.Experimental results demonstrate that as the number of decompositions increases, the runtime of SDPOSS decreases linearly, while achieving excellent classification performance.Moreover, SDPOSS exhibits strong robustness against evasion attacks, providing new insights for adversarial machine learning.…”
    Get full text
    Article
  9. 4249

    Three-Dimensional Extended Target Tracking and Shape Learning Based on Double Fourier Series and Expectation Maximization by Hongge Mao, Xiaojun Yang

    Published 2025-07-01
    “…Specifically, the 3D shape is modeled using a radial function estimated via double Fourier series (DFS) expansion, and orientation is represented using the compact, singularity-free axis-angle method. The ECM algorithm facilitates this joint estimation: an Unscented Kalman Smoother infers kinematics in the E-step, while the M-step estimates DFS shape parameters and rotation angles by minimizing regularized cost functions, promoting robustness and smoothness. …”
    Get full text
    Article
  10. 4250

    Analysis of Two-Grid Characteristic Finite Element Methods for Convection-Diffusion Equations by Keyan Wang, Boxia Hu

    Published 2023-01-01
    “…We present an optimal error estimate in Lp-norm for the characteristic finite element method unconditionally, while all previous works require certain time-step restrictions. …”
    Get full text
    Article
  11. 4251

    Photovoltaic Farm Power Generation Forecast Using Photovoltaic Battery Model with Machine Learning Capabilities by Agboola Benjamin Alao, Olatunji Matthew Adeyanju, Manohar Chamana, Stephen Bayne, Argenis Bilbao

    Published 2025-06-01
    “…The model further uses ANFIS outputs to estimate PV generation and optimize battery state of charge (SoC), achieving a consistent minimal SoC reduction of about 0.88% (from 80% to 79.12%) over four different battery types over a seven-day charge–discharge cycle, providing up to 11 h of battery autonomy under specified load conditions. …”
    Get full text
    Article
  12. 4252

    Variable-Rate Nitrogen Application in Wheat Based on UAV-Derived Fertilizer Maps and Precision Agriculture Technologies by Alexandros Tsitouras, Christos Noulas, Vasilios Liakos, Stamatis Stamatiadis, Miltiadis Tziouvalekas, Ruijun Qin, Eleftherios Evangelou

    Published 2025-07-01
    “…Variable-rate nitrogen (VR-N) application allows farmers to optimize nitrogen (N) input site-specifically within field boundaries, enhancing both economic efficiency and environmental sustainability. …”
    Get full text
    Article
  13. 4253

    Outcomes among children and adults at risk of severe dengue in Sri Lanka: Opportunity for outpatient case management in countries with high disease burden. by Champica K Bodinayake, Ajith DeS Nagahawatte, Vasantha Devasiri, Niroshana J Dahanayake, Gaya B Wijayaratne, Nayani P Weerasinghe, Madureka Premamali, Tianchen Sheng, Bradly P Nicholson, Harshanie A Ubeysekera, Ruvini Mp Kurukulasooriya, Aruna D de Silva, Truls Østbye, Christopher W Woods, L Gayani Tillekeratne

    Published 2021-12-01
    “…<h4>Conclusions</h4>One-half of patients hospitalized with acute dengue progressed to develop DHF and a very small number developed DSS or severe dengue. Developing an algorithm for triaging patients to ambulatory versus inpatient management should be the future goal to optimize utilization of healthcare resources in dengue-endemic countries.…”
    Get full text
    Article
  14. 4254

    Fast Processing of Massive Hyperspectral Image Anomaly Detection Based on Cloud-Edge Collaboration by Yunchang Wang, Jin Sun, Yang Xu, Zhihui Wei, Shangdong Zheng, Zebin Wu

    Published 2025-01-01
    “…With the improvement of hyperspectral image resolution, existing anomaly detection algorithms find it challenging to quickly process large volumes of hyperspectral data while fully exploiting spectral information. …”
    Get full text
    Article
  15. 4255

    A grid-based sectoring for energy-efficient wireless sensor networks by Nubunga Ishaya, Mustapha Aminu Bagiwa

    Published 2025-04-01
    “…This research improves CH selection by organizing sensor nodes into square grid clusters and employing a routing algorithm for randomized CH selection. Game theory (GT) and Ad hoc on Demand Vectors (AODV) were used to choose the optimal routing path, while Grey Wolf Optimization (GWO) was used to determine the optimal CHs. …”
    Get full text
    Article
  16. 4256

    Research on GNNs with stable learning by Wenbin Li, Wenxuan Wei, Peiyang Wang, Li Pan, Bo Yang, Yanling Xu

    Published 2025-08-01
    “…The aim is to extract genuine causal features while eliminating spurious causal features. By introducing a feature sample weighting decorrelation technique in the random Fourier transform space and combining it with a baseline GNN model, a Stable-GNN model and a constrained sampling weight gradient update algorithm are designed. …”
    Get full text
    Article
  17. 4257

    Generalized Singular Value Decomposition-Based Secure Beam Hybrid Precoding for Millimeter Wave Massive Multiple-Input Multiple-Output Systems by Boqing Chen, Lijun Yang, Meng Wu

    Published 2025-04-01
    “…In a hybrid precoding system, the low-complexity GSVD-Sparsity algorithm can achieve a spectral efficiency close to that of the GSVD-based scheme in a fully digital system while maintaining anti-eavesdropping capabilities.…”
    Get full text
    Article
  18. 4258

    IoT intrusion detection method for unbalanced samples by ANTONG P, Wen CHEN, Lifa WU

    Published 2023-02-01
    “…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
    Get full text
    Article
  19. 4259

    The Impact of AI Software on Financial Transactions by Li Boyang

    Published 2025-01-01
    “…The rapid advancement of artificial intelligence (AI) has profoundly transformed financial trading, enhanced efficiency, accuracy, and customer service while introducing new challenges. This paper explores AI’s applications in quantitative trading, risk forecasting, and intelligent customer interactions, demonstrating its ability to optimize decision-making and reduce operational costs. …”
    Get full text
    Article
  20. 4260

    Application of RNA-seq for single nucleotide variation identification in a cohort of patients with hypertrophic cardiomyopathy by Anastasia Chumakova, Ivan Vlasov, Elena Filatova, Anna Klass, Andrey Lysenko, Gennady Salagaev, Maria Shadrina, Petr Slominsky

    Published 2025-05-01
    “…The algorithm was evaluated and the optimal quality threshold was determined based on allelic discrimination for the rs397516037 mutation (MYBPC3 c.3697 C > T) among patients. …”
    Get full text
    Article