Showing 5,721 - 5,740 results of 6,222 for search '((whale OR whole) OR while) (optimizer OR optimize) algorithm', query time: 0.41s Refine Results
  1. 5721

    Research on Functional Modularity and Health Monitoring Design of Home Fitness Equipment by Xinyue Song, Cuiyu Li

    Published 2025-05-01
    “…This study proposes an innovative integrated design framework for multifunctional home fitness equipment, combining modular design, space optimization, and intelligent health monitoring. The design integrates an exercise bike, rowing machine, and spring tensioner into a single unit, reducing equipment footprint by 30% while enabling seamless transitions between exercise modes. …”
    Get full text
    Article
  2. 5722

    Intelligent Modeling; Single (Multi-layer perceptron) and Hybrid (Neuro-Fuzzy Network) Method in Forest Degradation (Case Study: Sari County) by somayeh mehrabadi

    Published 2021-03-01
    “…The mean squared error (MSE) was used to evaluate the performance of models, which was 0.0535, 0.0704, and 0.0908 for the perceptron neural network in the Levenberg-Marquardt, Bayesian regularization, and scaled conjugate gradient algorithms, respectively. Also, the MSE value for the neuro-fuzzy model in the optimization and hybrid algorithms was 0.0190 and 0.0102, respectively. …”
    Get full text
    Article
  3. 5723

    AI‐Driven TENGs for Self‐Powered Smart Sensors and Intelligent Devices by Aiswarya Baburaj, Syamini Jayadevan, Akshaya Kumar Aliyana, Naveen Kumar SK, George K Stylios

    Published 2025-05-01
    “…This review explores the synergistic potential of AI‐driven TENG systems, from optimizing materials and fabrication to embedding machine learning and deep learning algorithms for intelligent real‐time sensing. …”
    Get full text
    Article
  4. 5724

    Research on the effectiveness of data compression methods in relational and NoSQL DBMS by V. A. Egunov, V. S. Surin, P. S. Stupnitskiy, R. D. Akhmetova

    Published 2024-04-01
    “…Data compression in OpenSearch is more efficient than in MySQL when using standard algorithms. OpenSearch is an excellent choice if youneed to conserve storage resources while making optimal use of the processor, otherwise both systems will do the job well.…”
    Get full text
    Article
  5. 5725

    Research Progress on Selective Depolymerization of Waste Plastics to High-Quality Liquid Fuels by Xinze LI, Zhicheng LUO, Rui XIAO

    Published 2025-06-01
    “…Hierarchical ZSM-5 further enhanced low-density polyethylene (LDPE) conversion (>95%) by mitigating overcracking through optimized pore architecture. The microwave pyrolysis demonstrated rapid heating kinetics, yielding a 98.78% aromatic-rich liquid fuel from polystyrene (PS) at 600 W with 60 g SiC absorbent. …”
    Get full text
    Article
  6. 5726

    A multi-functional simulation platform for on-demand ride service operations by Siyuan Feng, Taijie Chen, Yuhao Zhang, Jintao Ke, Zhengfei Zheng, Hai Yang

    Published 2024-12-01
    “…However, due to cost and reliability issues, it is commonly infeasible to validate these models and train/test these optimization algorithms within real-world ride-sourcing platforms. …”
    Get full text
    Article
  7. 5727

    ON TRAVERSABILITY COST EVALUATION FROM PROPRIOCEPTIVE SENSING FOR A CRAWLING ROBOT by Jakub Mrva, Martin Stejskal, Jan Faigl

    Published 2015-12-01
    “…This paper addresses the problem of traversability cost evaluation based on proprioceptive sensing for a hexapod walking robot while optimizing different criteria. We present several methods of evaluating the robot-terrain interaction that can be used as a cost function for an assessment of the robot motion that can be utilized in high-level path-planning algorithms.…”
    Get full text
    Article
  8. 5728

    Advanced parameter tuning scheme for double CFO based fractional order composite controller synthesis method by Siyi Chen, Yang Shu, Haiyang Kuang, Dongqi Cheng, Ying Luo

    Published 2025-12-01
    “…This method sequentially employs D-decomposition and optimization algorithms to address these challenges. …”
    Get full text
    Article
  9. 5729

    Convolutional neural network model over encrypted data based on functional encryption by Chen WANG, Jiarun LI, Jian XU

    Published 2024-03-01
    “…Currently, homomorphic encryption, secure multi-party computation, and other encryption schemes are used to protect the privacy of sensitive data in outsourced convolutional neural network (CNN) models.However, the computational and communication overhead caused by the above schemes would reduce system efficiency.Based on the low cost of functional encryption, a new convolutional neural network model over encrypted data was constructed using functional encryption.Firstly, two algorithms based on functional encryption were designed, including inner product functional encryption and basic operation functional encryption algorithms to implement basic operations such as inner product, multiplication, and subtraction over encrypted data, reducing computational and communication costs.Secondly, a secure convolutional computation protocol and a secure loss optimization protocol were designed for each of these basic operations, which achieved ciphertext forward propagation in the convolutional layer and ciphertext backward propagation in the output layer.Finally, a secure training and classification method for the model was provided by the above secure protocols in a module-composable way, which could simultaneously protect the confidentiality of user data as well as data labels.Theoretical analysis and experimental results indicate that the proposed model can achieve CNN training and classification over encrypted data while ensuring accuracy and security.…”
    Get full text
    Article
  10. 5730

    Addressing grading bias in rock climbing: machine and deep learning approaches by B. O’Mara, M. S. Mahmud

    Published 2025-01-01
    “…The primary three approaches were from a route-centric, climber-centric, or path finding and path generation context. Of these, the most optimal methods used natural language processing or recurrent neural network algorithms. …”
    Get full text
    Article
  11. 5731

    Design of Gain-Scheduled Lateral Controllers for Autonomous Vehicles by Ákos Bokor, Ádám Szabó, Szilárd Aradi, László Palkovics

    Published 2024-11-01
    “…The results show that while traditional controllers, such as Pure Pursuit, perform adequately under constant speed conditions, adaptive model-based algorithms significantly enhance the performance, especially in dynamic driving situations involving speed variations.…”
    Get full text
    Article
  12. 5732

    STUDY OF ROBUST TOA DISCRIMINATORS FOR SPACE-BASED RADAR ALTIMETER by D. S. Borovitsky, A. E. Zhesterev, V. P. Ipatov, R. M. Mamchur

    Published 2018-08-01
    “…In the  robust  algorithms TOA-measuring  is performed without  using  any  echo  physical  model.  …”
    Get full text
    Article
  13. 5733

    Stroke Risk Classification Using the Ensemble Learning Method of XGBoost and Random Forest by Gullam Almuzadid, Egia Rosi Subhiyakto

    Published 2025-06-01
    “…The dataset was split into 80% training and 20% testing data (hold-out test) to ensure objective evaluation. Hyperparameter optimization was performed using Bayesian optimization, while model evaluation employed stratified K-fold cross-validation to prevent overfitting. …”
    Get full text
    Article
  14. 5734

    Research on the Stability of Express Delivery Supply Chain Based on Risk Propagation Model ------ Case Studies of SF Express and JD Logistics by Fan Yunhui

    Published 2025-01-01
    “…Based on the research results, optimization strategies such as dynamic path optimization algorithms and blockchain-based information isolation mechanisms are proposed, providing theoretical tools and practical references for risk prevention and control in the express delivery industry.…”
    Get full text
    Article
  15. 5735

    Artificial Intelligence Applications in Pediatric Craniofacial Surgery by Lucas M. Harrison, Ragan L. Edison, Rami R. Hallac

    Published 2025-03-01
    “…Artificial intelligence is rapidly transforming pediatric craniofacial surgery by enhancing diagnostic accuracy, improving surgical precision, and optimizing postoperative care. Machine learning and deep learning models are increasingly used to analyze complex craniofacial imaging, enabling early detection of congenital anomalies such as craniosynostosis, and cleft lip and palate. …”
    Get full text
    Article
  16. 5736

    Advances in Numerical Modeling for Heat Transfer and Thermal Management: A Review of Computational Approaches and Environmental Impacts by Łukasz Łach, Dmytro Svyetlichnyy

    Published 2025-03-01
    “…Additionally, the increasing energy consumption in numerical modeling highlights the need for optimization strategies to mitigate environmental impact. …”
    Get full text
    Article
  17. 5737

    Design, Fabrication, and Application of Large-Area Flexible Pressure and Strain Sensor Arrays: A Review by Xikuan Zhang, Jin Chai, Yongfu Zhan, Danfeng Cui, Xin Wang, Libo Gao

    Published 2025-03-01
    “…Real-time data processing requires innovative solutions such as edge computing and machine learning algorithms, ensuring low-latency, high-accuracy data interpretation while preserving the flexibility of sensor arrays. …”
    Get full text
    Article
  18. 5738

    Intelligent collaborative management and control platform for continuous mining equipment in open-pit mines by Zhiyong LEI, Xiaolong MA, Shujun ZHAO, Shiming ZHANG, Bin YAN

    Published 2025-04-01
    “…The platform integrates advanced technologies, including dual-ring network transmission, network security protocols, multi-machine cooperative control, digital twin modeling, and big data analytics, facilitating effective coordination among coal miners, transfer machines, unloaders, and conveyors for seamless continuous mining operations.Three critical technical challenges are addressed: ① The implementation of dual-ring network transmission technology reduces data transmission latency and enhances network stability. ② A secure network transmission framework has been developed to safeguard data confidentiality and integrity. ③ The multi-machine cooperative control system incorporates data acquisition, process control, and 3D visualization modules, employing real-time monitoring and optimized control algorithms to boost mining and transportation efficiency while ensuring the continuity of multi-machine operations. …”
    Get full text
    Article
  19. 5739

    Hemorrhage risk associated with triple antithrombotic therapy: a focused real-world pharmacovigilance disproportional analysis study by Kannan Sridharan, Gowri Sivaramakrishnan

    Published 2025-03-01
    “…These findings underscore the need for cautious monitoring of bleeding outcomes with anticoagulant regimens, particularly rivaroxaban combinations for optimizing patient outcomes. However, the signals obtained in this study need to be validated in future trials.…”
    Get full text
    Article
  20. 5740

    New Challenging Systemic Therapies for Juvenile Scleroderma: A Comprehensive Review by Chiara Sassetti, Claudia Borrelli, Martha Mazuy, Cristina Guerriero, Donato Rigante, Susanna Esposito

    Published 2025-04-01
    “…Large, multicenter, long-term trials are urgently needed to establish safety, efficacy, and optimal treatment algorithms that are tailored to the pediatric population.…”
    Get full text
    Article