Search alternatives:
optimizer » optimize (Expand Search)
Showing 4,561 - 4,580 results of 6,222 for search '((whale OR whole) OR while) optimizer algorithm', query time: 0.24s Refine Results
  1. 4561

    Subsystem-Based Fault Detection in Robotics via <italic>L2</italic> Norm and Random Forest Models by Elham Abdullah Alamoudi

    Published 2024-01-01
    “…This single-signal approach allows the algorithm to accurately classify data without being distracted by different types of signals, in addition to eliminating the curse of dimensionality. …”
    Get full text
    Article
  2. 4562

    Enhancing Lifetime and Reliability in WSNs: Complementary of Dual-Battery Systems Energy Management Strategy by Mehrshad Eskandarpour, Hossein Soleimani

    Published 2025-01-01
    “…Unlike previous approaches, this system enables simultaneous charging and load powering and is specifically optimized for energy-harvesting WSN environments. Simulation results in MATLAB/Simulink demonstrate that the system improves battery lifespan by up to 25% compared to conventional single-battery configurations, while ensuring stable voltage regulation and improved reliability under variable loads. …”
    Get full text
    Article
  3. 4563

    Linear adaptive filtering of random sequences on basis of deterministic approach by V. A. Artemiev, A. O. Naumov, L. L. Kokhan

    Published 2018-09-01
    “…The optimal current estimate is based on both measurement results and extrapolated values. …”
    Get full text
    Article
  4. 4564

    An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs by Jing Wang, Xue Yuan, Yingjie Xu, Yudi Zhang

    Published 2024-01-01
    “…When compared with some related schemes, this optimization speeds up both the key generation and signing phases with constant rounds while maintaining security against malicious adversaries.…”
    Get full text
    Article
  5. 4565

    Energy-Efficient Adaptive Routing and Context-Aware Lifetime Maximization in Wireless Sensor Networks by Shaohua Wan

    Published 2014-11-01
    “…We design and implement a Bezier-based multipath routing algorithm that allows a given source node to send samples of data to a given sink node in large scale sensor networks. …”
    Get full text
    Article
  6. 4566

    Hydrofoil Installation and Performance Optimisation for Ship Resistance Reduction in Trimaran Through Particle Swarm Optimisation Method by Ghadimi Aliakbar, Ghadimi Parviz, Ghassemi Hassan

    Published 2025-03-01
    “…The primary aim of this hydrofoil is to reduce the overall resistance while the ship is moving. This study focuses on minimising the ship’s total resistance. …”
    Get full text
    Article
  7. 4567

    CBID: A Scalable Method for Distributed Data Aggregation in WSNs by Aristides Mpitziopoulos, Damianos Gavalas, Charalampos Konstantopoulos, Grammati Pantziou

    Published 2010-07-01
    “…Herein we present CBID, a novel algorithm that calculates near-optimal routes for MAs that incrementally fuse the data as they visit the Sensor Nodes (SNs) while also enabling fast updates on the designed itineraries upon changes of network topology. …”
    Get full text
    Article
  8. 4568

    Intelligent resource scheduling scheme for UAV swarm collaborative sensing by ZHAO Pengcheng, LI Tianyang, LENG Supeng, XIONG Kai

    Published 2025-03-01
    “…Furthermore, a multi-agent reinforcement learning (MARL) algorithm with an attention mechanism was employed to solve the optimization problem, enabling agents to extract critical environmental features more effectively. …”
    Get full text
    Article
  9. 4569

    Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage by ZHANG Kejun, WANG Wenbin, XU Shaofei, YU Xinying, WANG Jun, LI Pengcheng, QIAN Rong

    Published 2024-09-01
    “…A blockchain-based verification algorithm was designed to detect tampering of third-party data. …”
    Get full text
    Article
  10. 4570

    Automated Detection of Tailing Impoundments in Multi-Sensor High-Resolution Satellite Images Through Advanced Deep Learning Architectures by Lin Qin, Wenyue Song

    Published 2025-07-01
    “…Accurate spatial mapping of Tailing Impoundments (TIs) is vital for environmental sustainability in mining ecosystems. While remote sensing enables large-scale monitoring, conventional methods relying on single-sensor data and traditional machine learning-based algorithm suffer from reduced accuracy in cluttered environments. …”
    Get full text
    Article
  11. 4571

    Variational Quantum Simulation: A Case Study for Understanding Warm Starts by Ricard Puig, Marc Drudis, Supanut Thanasilp, Zoë Holmes

    Published 2025-01-01
    “…While our main focus is on this case study of variational quantum simulation, we end by discussing how our results work in other iterative settings.…”
    Get full text
    Article
  12. 4572

    A grid-based reliable multi-hop routing protocol for energy-efficient wireless sensor networks by Zhansheng Chen, Hong Shen

    Published 2018-03-01
    “…In order to minimize and balance the energy consumption, our proposed protocol, grid-based reliable multi-hop routing protocol, optimizes the cluster head election process by combining individual ability which consists of node’s residual energy and node’s location, and local cognition which can balance energy consumption among clusters via a consultative mechanism based on cluster head’s lifetime expectancy, while considering data forwarding delay and reliable transmission of data. …”
    Get full text
    Article
  13. 4573

    Real-time motion detection using dynamic mode decomposition by Marco Mignacca, Simone Brugiapaglia, Jason J. Bramburger

    Published 2025-05-01
    “…Effectiveness is analyzed using receiver operating characteristic curves, while we use cross-validation to optimize the threshold parameter that identifies movement.…”
    Get full text
    Article
  14. 4574

    Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage by ZHANG Kejun, WANG Wenbin, XU Shaofei, YU Xinying, WANG Jun, LI Pengcheng, QIAN Rong

    Published 2024-09-01
    “…A blockchain-based verification algorithm was designed to detect tampering of third-party data. …”
    Get full text
    Article
  15. 4575

    Physical Activity Recognition Utilizing the Built-In Kinematic Sensors of a Smartphone by Yi He, Ye Li

    Published 2013-04-01
    “…The results indicated that the accelerometer was significant to PA recognition, while gyroscope and orientation sensor were effective to recognize the change of body posture and detect falls, respectively. …”
    Get full text
    Article
  16. 4576

    A Gaussian process approach for contextual bandit-based battery replacement by Zhou Tianshi

    Published 2025-01-01
    “…This research aims to assist electric vehicle providers in optimizing battery replacement schedules, with the objective of minimizing operating losses while meeting evening peak demand. …”
    Get full text
    Article
  17. 4577
  18. 4578

    DS-AdaptNet: An Efficient Retinal Vessel Segmentation Framework With Adaptive Enhancement and Depthwise Separable Convolutions by Shuting Chen, Chengxi Hong, Hong Jia

    Published 2025-01-01
    “…Second, we develop a Context-Aware Adaptive Threshold Optimization (CA-ATO) algorithm that dynamically determines optimal thresholds by integrating multi-scale contextual information and uncertainty estimates, substantially improving boundary delineation accuracy and fine structure preservation. …”
    Get full text
    Article
  19. 4579

    MUFFNet: lightweight dynamic underwater image enhancement network based on multi-scale frequency by Dechuan Kong, Dechuan Kong, Yandi Zhang, Xiaohu Zhao, Yanqiang Wang, Lei Cai

    Published 2025-02-01
    “…A Multi-Scale Enhancement Prior algorithm enhances high-frequency and low-frequency features while the Information Flow Interaction module mitigates information stratification and blockage. …”
    Get full text
    Article
  20. 4580

    Open phase fault-tolerant support vector machine predictive power control for six-phase induction generator WECS by Yanis Hamoudi, Maher G.M. Abdolrasol, Hocine Amimeur, Faycal Hassaini, Pin Jern Ker, Taha Selim Ustun

    Published 2025-03-01
    “…Importantly, this approach does not require reconfiguring the control algorithm while preserving the system’s effective performance. …”
    Get full text
    Article