Showing 3,821 - 3,840 results of 6,222 for search '((whale OR whole) OR while) optimize algorithm', query time: 0.23s Refine Results
  1. 3821

    Frequency Response Function-Based Finite Element Model Updating Using Extreme Learning Machine Model by Yu Zhao, Zhenrui Peng

    Published 2020-01-01
    “…To further improve the generalization ability, the input weights and biases of ELM are optimized by Lévy flight trajectory-based whale optimization algorithm (LWOA). …”
    Get full text
    Article
  2. 3822

    Faster quantum subroutine for matrix chain multiplication via Chebyshev approximation by Xinying Li, Pei-Lin Zheng, Chengkang Pan, Fei Wang, Chunfeng Cui, Xian Lu

    Published 2025-08-01
    “…The algorithm can be applied to any complex matrix. Furthermore, we discuss integrating our QMM algorithm as a subroutine in other matrix operations and propose strategies to optimize QMM for matrices with large condition numbers with numerical simulation.…”
    Get full text
    Article
  3. 3823

    A Developed Mathematical Model for Designing a Multilevel Sustainable Supply Chain Network Taking into Account Environmental Decisions by Mehrab Paydarfard, Roya Pirzadeh, Ali Ahmadi, Masoud Zohrabi, Farkhondeh Mortaz Hejri, Malek Hasan

    Published 2022-01-01
    “…In addition, the proposed model was optimized by the whale optimization algorithm (WOA) to find the best solution in large-scale instances in a short and reasonable time. …”
    Get full text
    Article
  4. 3824

    Weak Connection Regulation Technology for Source-Storage-Load Collaborative Microgrids Based on Direct Power Control by Peng REN, Zhigang ZHAO, Hongchao GAO, Wu WEN, Yingyi JIANG

    Published 2025-05-01
    “…The paper also studied the regional DC power supply and flexible regulation technology, analyzed the flexible characteristics of air conditioners, energy storage, photovoltaic, etc., and verified the power direct-control flexible regulation algorithm and evaluation indexes. From the effect of testing and verification, the whole system enables real-time response and rapid adjustment, thus improving the energy utilization efficiency, reducing the grid-side quota and realizing the local consumption of PV.…”
    Get full text
    Article
  5. 3825

    Tennis Timing Assessment by a Machine Learning-Based Acoustic Detection System: A Pilot Study by Lucio Caprioli, Amani Najlaoui, Francesca Campoli, Aatheethyaa Dhanasekaran, Saeid Edriss, Cristian Romagnoli, Andrea Zanela, Elvira Padua, Vincenzo Bonaiuto, Giuseppe Annino

    Published 2025-01-01
    “…<b>Results:</b> The ML algorithm showed a detection accuracy higher than 95%, while the average accuracy of the whole system that was applied on-court was 85%. …”
    Get full text
    Article
  6. 3826

    Precision Dosing in Presence of Multiobjective Therapies by Integrating Reinforcement Learning and PK‐PD Models: Application to Givinostat Treatment of Polycythemia Vera by Alessandro De Carlo, Elena Maria Tosca, Paolo Magni

    Published 2025-06-01
    “…The therapeutic goal is to simultaneously normalize the levels of these efficacy/safety biomarkers, thus inducing a complete hematological response (CHR). An RL algorithm, Q‐Learning (QL), was integrated with a PK‐PD model describing the givinostat effect on PLT, WBC, and HCT to derive both an adaptive dosing protocol (QLpop‐agent) for the whole population and personalized dosing strategies by coupling a specific QL‐agent to each patient (QLind‐agents). …”
    Get full text
    Article
  7. 3827

    Discussing the Construction of a Budget Management System Combining Multimedia Technology and Financial Risk Management by Xiaoyi Jiang

    Published 2022-01-01
    “…From the whole process of data mining, a data mining system is designed, which is “data preprocessing standardization + genetic algorithm feature selection + training set pruning + support vector machine classifier discrimination optimization.” …”
    Get full text
    Article
  8. 3828

    Research on Designing an Industrial Product-Service System with Uncertain Customer Demands by Fei Zhang, Liecheng Jia, Weizhen Han

    Published 2021-01-01
    “…This paper presents a design model that integrates an improved affinity propagation (AP) clustering algorithm, quality function development (QFD), and axiomatic design (AD). …”
    Get full text
    Article
  9. 3829

    Performance analysis of secrecy rate for SWIPT in massive antenna by Hui BAO, Minmin ZHANG, Yaqing YAO, Hui WANG

    Published 2017-09-01
    “…In the multi-drop broadcast system,the existing research is to optimize the single-user security rate in the complete channel state information.In fact,it’s impossible that there exists only one user in the system.The base station often receives incomplete channel state information.Aiming at this problem,a robust beamforming scheme was proposed.In the multi-user case,considering the influence of channel estimation error on the system security rate,the particle swarm optimization algorithm was used to optimize the emission beamforming vector,artificial noise covariance and power split ratio to ensure that the user collects a certain energy while maximizing the safe transmission rate.The simulation results show that the proposed scheme is slightly lower than the security rate in the ideal case,but it is meaningful to the actual system,taking into account the existence of eavesdropping users and the estimation error.…”
    Get full text
    Article
  10. 3830

    UAV-Enabled Inspection System With No-Fly Zones: DRL-Based Joint Mobile Nest Scheduling and UAV Trajectory Design by Jin Dai, Yunfei Gao, Chao Cai, Wei Xiong, Manjia Liu

    Published 2025-01-01
    “…This paper investigates a UAV-enabled inspection system in an urban environment with no-fly zones (NFZs), where the UAV flies to inspection points to capture images while constrained by limited onboard energy. The aim of this paper is to minimize the whole inspection time via joint optimization of the mobile nest&#x2019;s scheduling and UAV trajectory while satisfying constraints related to energy maximization and avoiding NFZs. …”
    Get full text
    Article
  11. 3831

    An Interpretable Data-Driven Dynamic Operating Envelope Calculation Method Based on an Improved Deep Learning Model by Yun Li, Tunan Chen, Jianzhao Liu, Zhaohua Hu, Yuchen Qi, Ye Guo

    Published 2025-05-01
    “…We train a CNN-LSTM-Attention neural network for voltage estimation, where we employ the whale optimization algorithm (WOA) to adjust hyperparameters automatically. …”
    Get full text
    Article
  12. 3832

    BS-SCRM: a novel approach to secure wireless sensor networks via blockchain and swarm intelligence techniques by Jing Xiao, Chaoqun Li, Zhigang Li, Jie Zhou

    Published 2024-04-01
    “…The proposed BS-SCRM method is structured in two phases: (1) an enhanced cluster head (CH) election utilizing an elite strategy-enhanced Whale Optimization Algorithm (WOA) that considers node energy and proximity to the base station, and (2) a secure data on-chain phase where blockchain comes into play, encrypting and validating cluster data to safeguard integrity and prevent tampering. …”
    Get full text
    Article
  13. 3833

    Adaptive Multi-Robot Exploration for Unknown Environments Using Edge-Weighted Path Planning by Farhad Baghyari, Tyler Parsons, Jaho Seo, Byeongjin Kim, Mingeuk Kim, Hanmin Lee

    Published 2025-01-01
    “…Experimental results demonstrate that the algorithm achieves improved exploration efficiency and adaptability compared to a real-time scheduling method while maintaining computational feasibility. …”
    Get full text
    Article
  14. 3834

    Design of precoding matrices in MIMO full duplex two-way security communication system by Weijia LEI, Yang ZHOU, Xianzhong XIE, Hongjiang LEI

    Published 2020-10-01
    “…The design of precoding matrices was studied in the multiple input multiple output (MIMO) full-duplex two-way security communication system where legitimate nodes transmit the confidential information accompanied by the artificial noise while receiving information.For the scenario where the perfect channel state information (CSI) of legitimate channels and eavesdropping channels was available,the difference of concave/convex (DC) programming was used to optimize the precoding matrices of the information signal and the artificial noise for the maximization of the secrecy sum rate.For the scenario where the CSI was imperfect,the channels were modeled by using worst-case criterion and the weighted minimum mean square error algorithm was used to get the robust precoding matrices of the information signal and the artificial noise.The simulation results prove that the proposed algorithm can effectively promote the secrecy sum rate of the system.…”
    Get full text
    Article
  15. 3835

    Auxiliary Stopping Area Layout Method for High-Speed Maglev considering Multiple Speed Profiles and Bidirectional Operation by Danyang Dong, Yi Yu, Huahua Zhao, Pengzi Chu, Hui Lin

    Published 2021-01-01
    “…Aiming at the layout of the ASA along the track, this article constructs an optimized model of ASA layout and proposes a solving algorithm based on the single target genetic algorithm by analyzing the influence factors of ASA layout. …”
    Get full text
    Article
  16. 3836

    Mapping Landslide Sensitivity Based on Machine Learning: A Case Study in Ankang City, Shaanxi Province, China by Baoxin Zhao, Jingzhong Zhu, Youbiao Hu, Qimeng Liu, Yu Liu

    Published 2022-01-01
    “…The main purpose of this research is to apply the logistic regression (LR) model, the support vector machine (SVM) model based on radial basis function, the random forest (RF) model, and the coupled model of the whale optimization algorithm (WOA) and genetic algorithm (GA) with RF, to make landslide susceptibility mapping for the Ankang City of Shaanxi Province, China. …”
    Get full text
    Article
  17. 3837

    Research on quality and safety risk identification of import and export toys based on the WOA-BP model by Qiong He, Pengzhao Li

    Published 2025-08-01
    “…LDA then clusters these words into structured risk factors (types, materials, defects) and five risk event categories, providing model inputs. The WOA-BP model, optimizing BP with the Whale Optimization Algorithm, achieves 95.71% accuracy—5.71% points higher than unoptimized BP and outperforming PSO-BP and GA-BP. …”
    Get full text
    Article
  18. 3838

    Mixed Balanced Truncation for Reducing the Complexity of Large-Scale Electrical and Electronic System Simulations by Huy-Du Dao, Thanh-Tung Nguyen, Ngoc-Kien Vu, Van-Ta Hoang, Hong-Quang Nguyen

    Published 2025-01-01
    “…This paper proposes the Mixed Balanced Truncation (MBT) algorithm, which combines the strengths of Balanced Truncation (BT) and Positive-Real Balanced Truncation (PRBT) while addressing their respective limitations. …”
    Get full text
    Article
  19. 3839

    Gaussian Process Regression with Soft Equality Constraints by Didem Kochan, Xiu Yang

    Published 2025-01-01
    “…Additionally, we introduce an adaptive learning algorithm to optimize the selection of constraint locations to further enhance the flexibility of the method. …”
    Get full text
    Article
  20. 3840

    Multi-Armed Bandit Approaches for Location Planning with Dynamic Relief Supplies Allocation Under Disaster Uncertainty by Jun Liang, Zongjia Zhang, Yanpeng Zhi

    Published 2024-12-01
    “…We introduce a multi-armed bandit algorithm, named the Geometric Greedy algorithm, to optimize transfer station planning while accounting for subsequent dynamic relief supply distribution and allocation in a stochastic environment. …”
    Get full text
    Article