Search alternatives:
optimizer » optimize (Expand Search)
Showing 5,601 - 5,620 results of 6,222 for search '((whale OR whole) OR while) optimizer algorithm', query time: 0.24s Refine Results
  1. 5601

    New Challenging Systemic Therapies for Juvenile Scleroderma: A Comprehensive Review by Chiara Sassetti, Claudia Borrelli, Martha Mazuy, Cristina Guerriero, Donato Rigante, Susanna Esposito

    Published 2025-04-01
    “…Large, multicenter, long-term trials are urgently needed to establish safety, efficacy, and optimal treatment algorithms that are tailored to the pediatric population.…”
    Get full text
    Article
  2. 5602

    Applicability Evaluation of Provincial Precipitation Real-time Analysis Product in Beijing by Zhao Wenfang, Wang Huiying, Meng Huifang, Miao Yupeng, Huang Mingming, Fan Min, Tang Wei

    Published 2024-05-01
    “…The intensity of light rain exceeds the observation, while the spatial distribution difference of bias is evident. …”
    Get full text
    Article
  3. 5603

    Research Progress on Selective Depolymerization of Waste Plastics to High-Quality Liquid Fuels by Xinze LI, Zhicheng LUO, Rui XIAO

    Published 2025-06-01
    “…Catalytic pyrolysis faces the challenge of rapid catalyst deactivation (resulting in a 30% activity loss after 5 cycles), while microwave systems incur high capital costs. …”
    Get full text
    Article
  4. 5604

    Soft Sensor Modeling of Key Effluent Parameters in Wastewater Treatment Process Based on SAE-NN by Yousuf Babiker M. Osman, Wei Li

    Published 2020-01-01
    “…Moreover, stochastic gradient descent (SGD) is used to train each layer of SAE to optimize weight parameters, while a strategy of genetic algorithms to identify the number of neurons in each hidden layer is developed. …”
    Get full text
    Article
  5. 5605

    Essay Answer Detection System Uses Cosine Similarity and Similarity Scoring in Sentences by Siti Yuliyanti, Diah Hidayatul Ula

    Published 2024-12-01
    “…To improve accuracy and usability, future developments could use sophisticated text scoring algorithms and provide more features. This study highlights the importance of automated grading systems for optimizing essay scoring in educational settings while maintaining scalability and reliability. …”
    Get full text
    Article
  6. 5606

    The State Preparation of Multivariate Normal Distributions using Tree Tensor Network by Hidetaka Manabe, Yuichi Sano

    Published 2025-05-01
    “…The numerical results suggest that our method can dramatically reduce the circuit depth and CNOT count while maintaining fidelity compared to existing approaches.…”
    Get full text
    Article
  7. 5607

    Research on Functional Modularity and Health Monitoring Design of Home Fitness Equipment by Xinyue Song, Cuiyu Li

    Published 2025-05-01
    “…This study proposes an innovative integrated design framework for multifunctional home fitness equipment, combining modular design, space optimization, and intelligent health monitoring. The design integrates an exercise bike, rowing machine, and spring tensioner into a single unit, reducing equipment footprint by 30% while enabling seamless transitions between exercise modes. …”
    Get full text
    Article
  8. 5608

    A Review of Environmental Control Strategies and Models for Modern Agricultural Greenhouses by Shuailiang Chen, Aolong Liu, Fei Tang, Pei Hou, Yanli Lu, Pei Yuan

    Published 2025-02-01
    “…Greenhouse control involves regulating environmental parameters such as temperature, humidity, light, and CO<sub>2</sub> concentration to ensure an optimal growth environment for crops while conserving energy. …”
    Get full text
    Article
  9. 5609

    A Comprehensive Survey on AI in Counter-Terrorism and Cybersecurity: Challenges and Ethical Dimensions by Ioannis Syllaidopoulos, Klimis S. Ntalianis, Ioannis Salmon

    Published 2025-01-01
    “…This paper provides a comprehensive overview of AI methodologies, such as predictive analytics, Natural Language Processing (NLP), and machine learning architectures (e.g., Support Vector Machines &#x2013; SVM and Long Short-Term Memory &#x2013; LSTM), and optimization algorithms (e.g., Particle Swarm Optimization &#x2013; PSO), assessing their effectiveness in security applications. …”
    Get full text
    Article
  10. 5610

    Leveraging Spectral Neighborhood Information for Corn Yield Prediction with Spatial-Lagged Machine Learning Modeling: Can Neighborhood Information Outperform Vegetation Indices? by Efrain Noa-Yarasca, Javier M. Osorio Leyton, Chad B. Hajda, Kabindra Adhikari, Douglas R. Smith

    Published 2025-03-01
    “…Accurate and reliable crop yield prediction is essential for optimizing agricultural management, resource allocation, and decision-making, while also supporting farmers and stakeholders in adapting to climate change and increasing global demand. …”
    Get full text
    Article
  11. 5611

    Service Function Chain Migration: A Survey by Zhiping Zhang, Changda Wang

    Published 2025-05-01
    “…Traditional optimization algorithms often fall short in large-scale, heterogeneous networks due to limited computational efficiency and scalability. …”
    Get full text
    Article
  12. 5612

    Research on the effectiveness of data compression methods in relational and NoSQL DBMS by V. A. Egunov, V. S. Surin, P. S. Stupnitskiy, R. D. Akhmetova

    Published 2024-04-01
    “…Data compression in OpenSearch is more efficient than in MySQL when using standard algorithms. OpenSearch is an excellent choice if youneed to conserve storage resources while making optimal use of the processor, otherwise both systems will do the job well.…”
    Get full text
    Article
  13. 5613

    Convolutional neural network model over encrypted data based on functional encryption by Chen WANG, Jiarun LI, Jian XU

    Published 2024-03-01
    “…Currently, homomorphic encryption, secure multi-party computation, and other encryption schemes are used to protect the privacy of sensitive data in outsourced convolutional neural network (CNN) models.However, the computational and communication overhead caused by the above schemes would reduce system efficiency.Based on the low cost of functional encryption, a new convolutional neural network model over encrypted data was constructed using functional encryption.Firstly, two algorithms based on functional encryption were designed, including inner product functional encryption and basic operation functional encryption algorithms to implement basic operations such as inner product, multiplication, and subtraction over encrypted data, reducing computational and communication costs.Secondly, a secure convolutional computation protocol and a secure loss optimization protocol were designed for each of these basic operations, which achieved ciphertext forward propagation in the convolutional layer and ciphertext backward propagation in the output layer.Finally, a secure training and classification method for the model was provided by the above secure protocols in a module-composable way, which could simultaneously protect the confidentiality of user data as well as data labels.Theoretical analysis and experimental results indicate that the proposed model can achieve CNN training and classification over encrypted data while ensuring accuracy and security.…”
    Get full text
    Article
  14. 5614

    Addressing grading bias in rock climbing: machine and deep learning approaches by B. O’Mara, M. S. Mahmud

    Published 2025-01-01
    “…The primary three approaches were from a route-centric, climber-centric, or path finding and path generation context. Of these, the most optimal methods used natural language processing or recurrent neural network algorithms. …”
    Get full text
    Article
  15. 5615

    Review of the Research on Underwater Explosion Ice-Breaking Technology by Xiao Huang, Zi-Xian Zhong, Xiao Luo, Yuan-Dong Wang

    Published 2025-07-01
    “…Key findings establish that shock waves initiate brittle fracture via stress superposition while bubble pulsation drives crack propagation through pressure oscillation; optimal ice fragmentation depends critically on charge weight, standoff distance, and ice thickness. …”
    Get full text
    Article
  16. 5616

    Exploring Machine Learning Models for Vault Safety in ICL Implantation: A Comparative Analysis of Regression and Classification Models by Qing Zhang, Qi Li, Zhilong Yu, Ruibo Yang, Emmanuel Eric Pazo, Yue Huang, Hui Liu, Chen Zhang, Salissou Moutari, Shaozhen Zhao

    Published 2025-06-01
    “…Regression and classification models were developed using gradient boosting, random forest, and CatBoost algorithms. Regression models predicted vault height as a continuous variable, while classification models categorized vault heights into binary and multi-class tasks. …”
    Get full text
    Article
  17. 5617

    Revolutionizing pharmacology: AI-powered approaches in molecular modeling and ADMET prediction by Irfan Pathan, Arif Raza, Adarsh Sahu, Mohit Joshi, Yamini Sahu, Yash Patil, Mohammad Adnan Raza, Ajazuddin

    Published 2025-12-01
    “…The fusion of Artificial intelligence (AI) with computational chemistry has revolutionized drug discovery by enhancing compound optimization, predictive analytics, and molecular modeling. …”
    Get full text
    Article
  18. 5618

    ON TRAVERSABILITY COST EVALUATION FROM PROPRIOCEPTIVE SENSING FOR A CRAWLING ROBOT by Jakub Mrva, Martin Stejskal, Jan Faigl

    Published 2015-12-01
    “…This paper addresses the problem of traversability cost evaluation based on proprioceptive sensing for a hexapod walking robot while optimizing different criteria. We present several methods of evaluating the robot-terrain interaction that can be used as a cost function for an assessment of the robot motion that can be utilized in high-level path-planning algorithms.…”
    Get full text
    Article
  19. 5619

    Advanced parameter tuning scheme for double CFO based fractional order composite controller synthesis method by Siyi Chen, Yang Shu, Haiyang Kuang, Dongqi Cheng, Ying Luo

    Published 2025-12-01
    “…This method sequentially employs D-decomposition and optimization algorithms to address these challenges. …”
    Get full text
    Article
  20. 5620

    Utilizing UAVs in Wireless Networks: Advantages, Challenges, Objectives, and Solution Methods by Mohammad Javad Sobouti, Amirhossein Mohajerzadeh, Haitham Y. Adarbah, Zahra Rahimi, Hamed Ahmadi

    Published 2024-10-01
    “…Additionally, we discuss the main methods and algorithms employed for UAV placement and trajectory optimization. …”
    Get full text
    Article