Search alternatives:
optimizer » optimize (Expand Search)
Showing 4,041 - 4,060 results of 6,222 for search '((whale OR whole) OR while) optimizer algorithm', query time: 0.28s Refine Results
  1. 4041

    Analysis of Two-Grid Characteristic Finite Element Methods for Convection-Diffusion Equations by Keyan Wang, Boxia Hu

    Published 2023-01-01
    “…We present an optimal error estimate in Lp-norm for the characteristic finite element method unconditionally, while all previous works require certain time-step restrictions. …”
    Get full text
    Article
  2. 4042

    A Novel Artificial Bee Colony Approach of Live Virtual Machine Migration Policy Using Bayes Theorem by Gaochao Xu, Yan Ding, Jia Zhao, Liang Hu, Xiaodong Fu

    Published 2013-01-01
    “…As a result, the whole approach achieves a longer-term efficient optimization for power saving. …”
    Get full text
    Article
  3. 4043

    Efficient dynamic task offloading and resource allocation in UAV-assisted MEC for large sport event by Chen Peng, Qiqi Wang, Desheng Zhang

    Published 2025-04-01
    “…Experiments shows that the EDRA algorithm can reduce energy consumption by 32.4% compared to advanced algorithms while ensuring stronger system performance.…”
    Get full text
    Article
  4. 4044

    Turning Energy-Aware Route Planning With an Extended TSP and Double-Layer State Graph: Experimental Evaluation With a Crawler Mobile Robot by Namihei Adachi, Hisashi Date

    Published 2025-01-01
    “…The routes that minimized energy consumption showed an average 17 % reduction in energy consumption, while the routes that minimized travel time achieved an average 5 % reduction in travel time compared to the standard TSP algorithm.…”
    Get full text
    Article
  5. 4045

    Federated deep reinforcement learning-based edge collaborative caching strategy in space-air-ground integrated network by LIU Liang, JING Tengxiang, DUAN Jie, MAO Wuping, YAN Hongcheng, MA Wenjie

    Published 2025-01-01
    “…Simulation results show that compared with other algorithm, the proposed algorithm can improve the cache hit rate of user requests by 18% and reduce the access latency of content by 25% while protecting user privacy.…”
    Get full text
    Article
  6. 4046

    Research on Unmanned Aerial Vehicle Path Planning for Carbon Emission Monitoring of Land-Side Heavy Vehicles in Ports by Xincong Wu, Zhanzhu Li, Xiaohua Cao

    Published 2025-03-01
    “…In the simulation experiment results, the proposed algorithm outperforms A*, ACO, and IEA algorithms in optimizing path length, reducing collision points to ensure path safety, and robustness. …”
    Get full text
    Article
  7. 4047

    Differentiable architecture search-based automatic modulation recognition for multi-carrier signals by LI Jie, LI Jing, LYU Lu, GONG Fengkui

    Published 2024-09-01
    “…Simulation results demonstrate that the proposed algorithm improves accuracy in urban multipath channels, especially at low SNR, while simultaneously providing better robustness to modulation parameter variations and small-sample scenarios.…”
    Get full text
    Article
  8. 4048

    A grid-based sectoring for energy-efficient wireless sensor networks by Nubunga Ishaya, Mustapha Aminu Bagiwa

    Published 2025-04-01
    “…This research improves CH selection by organizing sensor nodes into square grid clusters and employing a routing algorithm for randomized CH selection. Game theory (GT) and Ad hoc on Demand Vectors (AODV) were used to choose the optimal routing path, while Grey Wolf Optimization (GWO) was used to determine the optimal CHs. …”
    Get full text
    Article
  9. 4049

    Prediction of Grain Yield in Henan Province Based on Grey BP Neural Network Model by Bingjun Li, Yifan Zhang, Shuhua Zhang, Wenyan Li

    Published 2021-01-01
    “…BP neural network (BPNN) is widely used due to its good generalization and robustness, but the model has the defect that it cannot automatically optimize the input variables. In response to this problem, this study uses the grey relational analysis method to rank the importance of input variables, obtains the key variables and the best BPNN model structure through multiple training and learning for the BPNN models, and proposes a variable optimization selection algorithm combining grey relational analysis and BP neural network. …”
    Get full text
    Article
  10. 4050

    Secure Latency-Aware Task Offloading Using Federated Learning and Zero Trust in Edge Computing for IoMT by Waleed Almuseelem

    Published 2025-01-01
    “…Within FL, an improved on-policy temporal difference control algorithm is leveraged for local model training. Moreover, this algorithm determines the optimal offloading strategy based on the global model while considering trustworthiness, the heterogeneous nature of tasks, resource availability, and latency. …”
    Get full text
    Article
  11. 4051

    Energy management in a microgrid equipped with an electric vehicle based on the internet of things considering responsive load by Mohamad Mahdi Erfani Majd, Reza Davarzani, Mahmoud Samiei Moghaddam, Ali Asghar Shojaei, Mojtaba Vahedi

    Published 2025-02-01
    “…A novel Energy-Trading Management Algorithm (ETMA), based on the Meerkat Optimization Algorithm (MOA), is proposed to tackle the complexities of this system. …”
    Get full text
    Article
  12. 4052

    Design of key technologies for intranet dynamic gateway based on DPDK by Fucai CHEN, Weizhen HE, Guozhen CHENG, Shumin HUO, Dacheng ZHOU

    Published 2020-06-01
    “…Aiming at the problems of high packet processing delay and high overhead caused by IP hopping,active defense gateway system with multi-layer network deployment structure was designed and implemented based on the data plane development kit (DPDK).Firstly,based on the DPDK fast forwarding framework,forwarding and processing performance of the system were optimized.Secondly,for the dynamic random mapping gateway with three different types of IP addresses,an efficient IP address allocation algorithm and an unpredictable IP address conversion algorithm were designed.The experimental results show that the designed system can effectively reduce the rate of information acquisition of sniffing attack,while greatly improving the processing delay caused by dynamic hopping.…”
    Get full text
    Article
  13. 4053

    Coordinated beamforming for cognitive multi-cell networks with wiretap channels by Dong-hua CHEN, Xiu-xiu ZHANG, Wei-bo XIE

    Published 2014-11-01
    “…Owing to the coupling among the vectors to be optimized,the problem becomes non-convex and non-linear.Accordingly,a centralized coordinated beamforming design method was proposed by constraining the leakage interference and using the semi-definite relaxation,and on the base of it,a decentralized algorithm was also proposed by decomposing the centralized design problem into a group of sub-problems on each cell’s base by using dual decomposition.Simulation results show that the proposed schemes make effective reduction in power consumption while guarantee the legal users’ secrecy rate requirement and the cognitive interference constraint.Moreover,the proposed decentralized method not only reduces the computational complexity,but also has the same performance as the centralized algorithm.…”
    Get full text
    Article
  14. 4054

    Multi-Channel Sparse-Frequency-Scanning White-Light Interferometry with Adaptive Mode Locking for Pulse Wave Velocity Measurement by Yifei Xu, Laiben Gao, Cheng Qian, Yiping Wang, Wenyan Liu, Xiaoyan Cai, Qiang Liu

    Published 2025-03-01
    “…Compared to normal MLCC algorithm, the Fibonacci-optimized algorithm reduces the number of computational iterations by 57 times while maintaining sub-nanometer resolution under dynamic perturbations. …”
    Get full text
    Article
  15. 4055

    Research on Network Handover Based on User Movement Prediction in Visible Light Communication and Wi-Fi Heterogeneous Networks by Chenghu Ke, Mengfan Wang, Huanhuan Qin, Xizheng Ke

    Published 2025-02-01
    “…Extracting meaningful and important location points from massive trajectory data for clustering, an improved hidden Markov model is used to predict the user’s next location by analyzing the patterns of the user’s historical mobile trajectory data. The Q-learning algorithm is then used to determine the optimal network handover based on the current network state, while a seamless handover protocol is introduced to ensure successful network transition and uninterrupted data transmission. …”
    Get full text
    Article
  16. 4056

    Efficient and secure multi-party computation protocol supporting deep learning by Shancheng Zhang, Gang Qu, Zongyang Zhang, Minzhe Huang, Haochun Jin, Liqun Yang

    Published 2025-07-01
    “…For Softmax computation, we extend existing two-party protocols to a multi-party Shamir setting, developing the nQSMax algorithm. This algorithm achieves exceptional accuracy exceeding 99% within seconds, requiring only a few iterations.…”
    Get full text
    Article
  17. 4057

    Gaussian Process Regression with Soft Equality Constraints by Didem Kochan, Xiu Yang

    Published 2025-01-01
    “…Additionally, we introduce an adaptive learning algorithm to optimize the selection of constraint locations to further enhance the flexibility of the method. …”
    Get full text
    Article
  18. 4058

    Multi task detection method for operating status of belt conveyor based on DR-YOLOM by Yongan LI, Tengjie CHEN, Hongwei WANG, Zhihao ZHANG

    Published 2025-06-01
    “…Secondly, as the model requires target recognition and segmentation of different types of tasks, an efficient layer aggregation network (RepGFPN) with skip layer connection structure is adopted to optimize the feature fusion part, greatly improving the detection accuracy of the model for different detection tasks while controlling the number of model parameters and inference speed; Finally, to address the detection tasks of three different label shapes, the Inner CIOU loss function is introduced to compensate for the weak generalization ability of the CIoU loss function in different detection tasks. …”
    Get full text
    Article
  19. 4059

    A location semantic privacy protection model based on spatial influence by Linghong Kuang, Wenlong Shi, Xueqi Chen, Jing Zhang, Huaxiong Liao

    Published 2025-04-01
    “…Finally, the problem of synthesizing dummy trajectories is transformed into a matching problem for directed bipartite graphs and the optimal k-anonymity set is obtained using the Kuhn Munkres algorithm. …”
    Get full text
    Article
  20. 4060

    Smart IoT-driven precision agriculture: Land mapping, crop prediction, and irrigation system. by Gourab Saha, Fariha Shahrin, Farhan Hasin Khan, Mashook Mohammad Meshkat, Akm Abdul Malek Azad

    Published 2025-01-01
    “…The experimental results demonstrated that fuzzy logic has faster calibration rate of 66.23% and helps to save around 61% water in comparison to average logic algorithm. The implementation of a fuzzy logic algorithm significantly optimized water usage compared to traditional manual irrigation methods. …”
    Get full text
    Article