Search alternatives:
coot » cost (Expand Search)
Showing 1,341 - 1,360 results of 2,044 for search '(improved OR improve) (((coot OR post) OR most) OR root) optimization algorithm', query time: 0.20s Refine Results
  1. 1341
  2. 1342

    Machine learning analysis of pharmaceutical cocrystals solubility parameters in enhancing the drug properties for advanced pharmaceutical manufacturing by Tareq Nafea Alharby, Bader Huwaimel

    Published 2025-08-01
    “…Each model’s performance was assessed via measuring Root Mean Square Error (RMSE), R2, Mean Absolute Error (MAE), and Monte Carlo Cross-Validation (CV) scores using a Tabu Search method for optimization. …”
    Get full text
    Article
  3. 1343

    Orchard Navigation Method Based on RS-SC Loop Frame Search Method and SLAM Technology by Ning Xu, Qingshan Meng, Fengping Liu, Zhihe Li, Guangming Wang, Na Guo, Wenxuan Wu

    Published 2025-01-01
    “…In the loop frame matching, an optimization algorithm combining normal distribution transformation and iterative nearest point is used to reduce the cumulative error significantly. …”
    Get full text
    Article
  4. 1344

    Broad learning system based on attention mechanism and tracking differentiator by LIAO Lüchao, ZOU Weidong, YANG Jialong, LU Huihuang, XIA Yuanqing, GAO Jianlei

    Published 2024-09-01
    “…In terms of model structure, A-TD-BLS introduced self-attention mechanism to the original BLS, and further fused and transformed the extracted features through attention weighting to improve the feature learning ability.In terms of model training methods, a weight optimization algorithm based on tracking differentiator was designed.This method effectively alleviates the overfitting phenomenon of the original BLS by limiting the size of the weight values, significantly reduces the influence of the number of hidden layer nodes on model performance and makes the generalization performance more stable.Moreover, the training algorithm was extended to the BLS incremental learning framework, so that the model can improve performance by dynamically adding hidden layer nodes.Multiple experiments conducted on some benchmark datasets show that compared to the original BLS, the classification accuracy of A-TD-BLS is increased by 1.27% on average on classification datasets and the root mean square error of A-TD-BLS is reduced by 0.53 on average on regression datasets.Besides, A-TD-BLS is less affected by the number of hidden layer nodes and has more stable generalization performance. …”
    Get full text
    Article
  5. 1345

    2HR-Net VSLAM: Robust visual SLAM based on dual high-reliability feature matching in dynamic environments. by Wang Yang, Huang Chao, Zhang Yi, Tan Shuyi

    Published 2025-01-01
    “…Finally, the shared matching Siamese network with a unique dual-branch feature fusion strategy and similarity optimization algorithm is proposed to enhance the accuracy of feature matching. …”
    Get full text
    Article
  6. 1346

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  7. 1347

    A Rice Leaf Area Index Monitoring Method Based on the Fusion of Data from RGB Camera and Multi-Spectral Camera on an Inspection Robot by Yan Li, Xuerui Qi, Yucheng Cai, Yongchao Tian, Yan Zhu, Weixing Cao, Xiaohu Zhang

    Published 2024-12-01
    “…The model based on the LightGBM regression algorithm has the most improvement in accuracy, with a coefficient of determination (R<sup>2</sup>) of 0.892, a root mean square error (RMSE) of 0.270, and a mean absolute error (MAE) of 0.160. …”
    Get full text
    Article
  8. 1348

    Reinforcement Learning for Computational Guidance of Launch Vehicle Upper Stage by Shiyao Li, Yushen Yan, Hao Qiao, Xin Guan, Xinguo Li

    Published 2022-01-01
    “…This manuscript investigates the use of a reinforcement learning method for the guidance of launch vehicles and a computational guidance algorithm based on a deep neural network (DNN). Computational guidance algorithms can deal with emergencies during flight and improve the success rate of missions, and most of the current computational guidance algorithms are based on optimal control, whose calculation efficiency cannot be guaranteed. …”
    Get full text
    Article
  9. 1349

    Optimising the Selection of Input Variables to Increase the Predicting Accuracy of Shear Strength for Deep Beams by Mohammed Majeed Hameed, Faidhalrahman Khaleel, Mohamed Khalid AlOmar, Siti Fatin Mohd Razali, Mohammed Abdulhakim AlSaadi

    Published 2022-01-01
    “…The study found that all applied models were significantly improved by the presence of the GAITH algorithm, except for the MLR model. …”
    Get full text
    Article
  10. 1350

    Optimum Design Research on the Link Mechanism of the JP72 Lifting Jet Fire Truck Boom System by Guo Tong, Wang Jiawen, Liang Yingnan, Peng Buyu, Liu Tao, Liu Yiqun

    Published 2024-12-01
    “…The fmincon function was used to realize the sequential quadratic programming (SQP) algorithm, which is one of the most effective methods to solve the constrained nonlinear optimization problems, for the optimal design. …”
    Get full text
    Article
  11. 1351

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  12. 1352

    A Short-Term Load Forecasting Method Considering Multiple Factors Based on VAR and CEEMDAN-CNN-BILSTM by Bao Wang, Li Wang, Yanru Ma, Dengshan Hou, Wenwu Sun, Shenghu Li

    Published 2025-04-01
    “…Finally, the sine–cosine and Cauchy mutation sparrow search algorithm (SCSSA) is used to optimize the parameters of the combinative model to improve the forecasting accuracy. …”
    Get full text
    Article
  13. 1353
  14. 1354

    Spatio‐temporal dynamic navigation for electric vehicle charging using deep reinforcement learning by Ali Can Erüst, Fatma Yıldız Taşcıkaraoğlu

    Published 2024-12-01
    “…A recently proposed on‐policy actor–critic method, phasic policy gradient (PPG) which extends the proximal policy optimization algorithm with an auxiliary optimization phase to improve training by distilling features from the critic to the actor network, is used to make EVCS decisions on the network where EV travels through the optimal path from origin node to EVCS by considering dynamic traffic conditions, unit value of EV owner and time‐of‐use charging price. …”
    Get full text
    Article
  15. 1355

    Performance evaluation of an adopted model based on big-bang big-crunch and artificial neural network for cloud applications by Pradeep Rawat, Robin Singh Bhadoria, Punit Gupta, Priti Dimri, G. P. Saroha

    Published 2021-08-01
    “…The proposed model is inspired from Big-Bang Big-Crunch algorithm in astrology. The work has been compared with a genetic algorithm, Particle swarm optimization and TOPSIS algorithm. …”
    Get full text
    Article
  16. 1356

    Enhancing 4G/LTE Network Path Loss Prediction with PSO-GWO Hybrid Approach by Messaoud Garah, Nabil Boukhennoufa

    Published 2025-07-01
    “…Furthermore, a hybrid optimization model, PSO-GWO, is proposed to improve prediction accuracy. …”
    Get full text
    Article
  17. 1357

    Adaptive Variational Modal Decomposition–Dual Attention Mechanism Parallel Residual Network: A Tool Lifetime Prediction Method Based on Adaptive Noise Reduction by Jing Kang, Taiyong Wang, Yi Li, Ye Wei, Yaomin Zhang, Ying Tian

    Published 2024-12-01
    “…The method first adapts the parameters of the variational modal noise reduction algorithm using an improved sparrow optimization algorithm, and then reconstructs the original vibration signal with noise reduction. …”
    Get full text
    Article
  18. 1358

    Spatiotemporal pattern analysis of land use in Jiangsu Province based on long-term time series remote sensing images by Zhendong Ji, Lingzhi Yin, Jinhong Wang

    Published 2025-06-01
    “…Principal Component Analysis (PCA) was applied to reduce feature dimensionality, and the Random Forest classification algorithm was optimized with Bayesian Optimization and Tree-structured Parzen Estimators (TPE) for improved performance. …”
    Get full text
    Article
  19. 1359

    Exploring a QoS Driven Scheduling Approach for Peer-to-Peer Live Streaming Systems with Network Coding by Laizhong Cui, Nan Lu, Fu Chen

    Published 2014-01-01
    “…The main contributions of this paper are: (i) We introduce a new network coding method to increase the content diversity and reduce the complexity of scheduling; (ii) we formulate the push scheduling as an optimization problem and transform it to a min-cost flow problem for solving it in polynomial time; (iii) we propose a push scheduling algorithm to reduce the coding overhead and do extensive experiments to validate the effectiveness of our approach. …”
    Get full text
    Article
  20. 1360

    Classification-based point cloud denoising and 3D reconstruction of roadways by Denghong CHEN, Ning PANG, Wen NIE, Juqiang FENG, Jiliang KAN, Jinjing ZHANG

    Published 2025-05-01
    “…By integrating a mean value method, an improved density-based spatial clustering of applications with noise (DBSCAN) algorithm, and an improved bilateral filtering algorithm, this study constructed a technical framework for classification processing. …”
    Get full text
    Article