Showing 2,261 - 2,280 results of 3,386 for search '(improved OR improve) ((whale OR whole) OR while) optimization algorithm', query time: 0.19s Refine Results
  1. 2261

    Simulation and test study of transmission characteristics of V-shaped rubber belt CVT by TIAN Zhewen, TIAN Hao, CHEN Shuoyan

    Published 2025-06-01
    “…ObjectiveThe dynamic matching problem of continuously variable transmission (CVT) with the engine and Baja racing car was subjected to research analysis.MethodsThe parameters of key components of CVT were first optimized by genetic algorithm in Matlab software, then the dynamic modeling and simulation of CVT and the whole vehicle were carried out in Matlab/Simulink and RecurDyn, and finally the vehicle test was carried out on the chassis dynamometer.ResultsThe results of modeling simulation and vehicle test show that the dynamic index of Baja racing car is significantly improved after the optimization of the parameters of key components of CVT. …”
    Get full text
    Article
  2. 2262

    Research on Automotive Radar Mutual Interference Mitigation Method based on V2X Communication Assistance by Yangshui Gao, Liping Kui, Qinbiao Yang, Lei Xiong, Rong Zhang, Zhenting Chen

    Published 2025-02-01
    “…Abstract This article analyzes the interference issues between radar and radar, radar and communication, and communication and communication in a vehicle network equipped with a radar communication integrated system. To improve the signal-to-interference-plus-noise ratio (SINR) of radar signals while ensuring communication quality, we provide an optimized expression for the signal-to-noise ratio of radar signals constrained by communication quality. …”
    Get full text
    Article
  3. 2263

    Urban Land-use Features Mapping from LiDAR and Remote Sensing Images using Visual Transformer Network Model by Q. Yuan

    Published 2025-03-01
    “…Finally, it is found that the proposed algorithm is generally better than other representative methods, and the classification accuracy using remote sensing data and LiDAR is improved. …”
    Get full text
    Article
  4. 2264

    Research on the cooperative offloading strategy of sensory data based on delay and energy constraints by Peiyan YUAN, Saike SHAO, Ran WEI, Junna ZHANG, Xiaoyan ZHAO

    Published 2023-03-01
    “…The edge offloading of the internet of things (IoT) sensing data was investigated.Multiple edge servers cooperatively offload all or part of the sensing data initially sent to the cloud center, which protects data privacy and improves user experience.In the process of cooperative offloading, the transmission of the sensing data and the information exchange among edge servers will consume system resources, resulting in the cost of cooperation.How to maximize the offloading ratio of the sensing data while maintaining a low collaboration cost is a challenging problem.A joint optimization problem of sensing data offload ratio and cooperative scale satisfying the constraints of network delay and system energy consumption was formulated.Subsequently, a distributed alternating direction method of multipliers (ADMM) via constraint projection and variable splitting was proposed to solve the problem.Finally, simulation experiments were carried out on MATLAB.Numerical results show that the proposed method improved the network delay and energy consumption compared to the fairness cooperation algorithm (FCA), the distributed optimization algorithm (DOA), and multi-subtasks-to-multi-servers offloading scheme (MTMS) algorithm.…”
    Get full text
    Article
  5. 2265

    Cooperative Downloading in Mobile Ad Hoc Networks: A Cost-Energy Perspective by He Li, Yang Yang, Xuesong Qiu, Zhipeng Gao, Guizhen Ma

    Published 2016-03-01
    “…Cooperative downloading in mobile ad hoc networks is an effective way to improve the efficiency of downloading files. This work addresses the problem while distributing content to a group of mobile terminals (MTs) that cooperate during the download process by forming mobile ad hoc networks. …”
    Get full text
    Article
  6. 2266

    A Location Selection Policy of Live Virtual Machine Migration for Power Saving and Load Balancing by Jia Zhao, Yan Ding, Gaochao Xu, Liang Hu, Yushuang Dong, Xiaodong Fu

    Published 2013-01-01
    “…We propose a novel approach MOGA-LS, which is a heuristic and self-adaptive multiobjective optimization algorithm based on the improved genetic algorithm (GA). …”
    Get full text
    Article
  7. 2267

    Bilevel Programming Model of Urban Public Transport Network under Fairness Constraints by Jingjing Hao, Xinquan Liu, Xiaojing Shen, Nana Feng

    Published 2019-01-01
    “…The model improves the fairness of the urban public transport system effectively while ensuring the travel demand of the residents. …”
    Get full text
    Article
  8. 2268

    BS-SCRM: a novel approach to secure wireless sensor networks via blockchain and swarm intelligence techniques by Jing Xiao, Chaoqun Li, Zhigang Li, Jie Zhou

    Published 2024-04-01
    “…The proposed BS-SCRM method is structured in two phases: (1) an enhanced cluster head (CH) election utilizing an elite strategy-enhanced Whale Optimization Algorithm (WOA) that considers node energy and proximity to the base station, and (2) a secure data on-chain phase where blockchain comes into play, encrypting and validating cluster data to safeguard integrity and prevent tampering. …”
    Get full text
    Article
  9. 2269

    Denoising of acoustic emission signals from rock failure processes through ICEEMDAN combined with multiple criteria and wavelet transform by Tao Wang, Weiwei Ye, Liyuan Liu, Zhihui Zhao, Wei Huang

    Published 2025-03-01
    “…Abstract To improve the accuracy of rock failure monitoring, this article addresses the optimization of denoising acoustic emission (AE) signals. …”
    Get full text
    Article
  10. 2270

    Bio-inspired clustering scheme for Internet of Drones application in industrial wireless sensor network by Farooq Aftab, Ali Khan, Zhongshan Zhang

    Published 2019-11-01
    “…The results indicate that the proposed scheme has improved 60% and 38% with respect to ant colony optimization and grey wolf optimization, respectively, in terms of average cluster building time while average energy consumption has improved 23% and 33% when compared to the ant colony optimization and grey wolf optimization, respectively.…”
    Get full text
    Article
  11. 2271

    Development and Practice of Cloud Collaborative Platform for Downhole Measurement Tools by Che Yang, Yuan Guangjie, Qian Hongyu, Du Weiqiang, Wang Chenlong, Ding Jiping

    Published 2025-06-01
    “…The measurement tools are mainly single machine version, which is difficult to meet the current requirements for improving drilling quality and efficiency. In the paper, based on the remote operation requirements of coreless magnetic steering tool, a platform architecture of five modules, including simulation rehearsal, virtual training, remote operation, smart tool and intelligent decision, was designed in detail, achieving a whole process digitization from predrilling risk assessment and in-drilling acquisition and processing to post-drilling feedback and optimization, and a visual interface was developed. …”
    Get full text
    Article
  12. 2272

    Two-Sided Matching on Comprehensive Transportation Network Emergency Vehicles’ Allocation by Kunwei Xie, Heying Xu, Hongxia Lv

    Published 2021-01-01
    “…Firstly, based on the needs of both parties involved in the matching, the satisfaction evaluation systems are constructed; with the goal of maximizing the weighted satisfaction of the affected areas and vehicles, the optimization model of the materials and emergency vehicles matching is established; then, an improved National Intern Matching Program (NIMP) algorithm is designed to solve the model, which is based on the k: 1 experimental pairing and updating ideas, and can take into account the capacity and destination constraints of vehicles in the matching process. …”
    Get full text
    Article
  13. 2273

    Exploration of Energy-Saving Chilling Landscape Design Based on Algo for Group Intelligence by Zhuo Li

    Published 2022-01-01
    “…The experimental results show that the algo for group intelligence outperforms another algorithm in terms of solving ability to the extent that the average optimization ability is improved by 13.45%, so the algo for group intelligence demonstrates its superior ability to take into account both local and global search. …”
    Get full text
    Article
  14. 2274

    Mapping Landslide Sensitivity Based on Machine Learning: A Case Study in Ankang City, Shaanxi Province, China by Baoxin Zhao, Jingzhong Zhu, Youbiao Hu, Qimeng Liu, Yu Liu

    Published 2022-01-01
    “…The main purpose of this research is to apply the logistic regression (LR) model, the support vector machine (SVM) model based on radial basis function, the random forest (RF) model, and the coupled model of the whale optimization algorithm (WOA) and genetic algorithm (GA) with RF, to make landslide susceptibility mapping for the Ankang City of Shaanxi Province, China. …”
    Get full text
    Article
  15. 2275

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  16. 2276

    Dynamic Water Scheduling in the Northwest River Delta Basin Based on Minimum Discharge Flow Control in Cross-section by WU Di, FANG Chunyan, SHANG Yunfei

    Published 2025-01-01
    “…On this basis, by taking into account both ecological water demand and socio-economic water demand, the minimum discharge flow control index of the cross-section was determined, and a fitness function was constructed. The whale optimization algorithm was used to find the optimal water allocation plan. …”
    Get full text
    Article
  17. 2277

    A long-term localization and mapping system for autonomous inspection robots in large-scale environments using 3D LiDAR sensors. by Wandeng Mao, Liang Jiang, Shanfeng Liu, Shengzhe Xi, Hua Bao

    Published 2025-01-01
    “…For global localization, we propose a novel ScanContext-ICP method, which integrates our improved ScanContext method, termed ScanContext++, for place recognition and global pose initialization. …”
    Get full text
    Article
  18. 2278

    A Novel Artificial Bee Colony Approach of Live Virtual Machine Migration Policy Using Bayes Theorem by Gaochao Xu, Yan Ding, Jia Zhao, Liang Hu, Xiaodong Fu

    Published 2013-01-01
    “…The other one is that it uses the Bayes theorem to further optimize the improved ABC-based process to faster get the final optimal solution. …”
    Get full text
    Article
  19. 2279

    A Sleep Scheduling Mechanism with PSO Collaborative Evolution for Wireless Sensor Networks by Luobing Dong, He Tao, William Doherty, Marten Young

    Published 2015-03-01
    “…To extend the lifetime of a wireless sensor network and improve the energy efficiency of its nodes, it is necessary to use node collaborative sleep algorithm to reduce the number of redundant nodes in the network. …”
    Get full text
    Article
  20. 2280

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article