Showing 541 - 560 results of 1,378 for search '(improved OR improve) most optimization algorithm', query time: 0.22s Refine Results
  1. 541
  2. 542

    Daily runoff forecasting using novel optimized machine learning methods by Peiman Parisouj, Changhyun Jun, Sayed M. Bateni, Essam Heggy, Shahab S. Band

    Published 2024-12-01
    “…This study addresses these challenges by introducing a novel bio-inspired metaheuristic algorithm, Artificial Rabbits Optimization (ARO), integrated with various machine learning (ML) models for runoff forecasting in the Carson and Chehalis River basins. …”
    Get full text
    Article
  3. 543

    Bio inspired optimization techniques for disease detection in deep learning systems by A. Ashwini, Vanajaroselin Chirchi, S. Balasubramaniam, Mohd Asif Shah

    Published 2025-05-01
    “…This research endeavors to elucidate the integration of bio-inspired optimization techniques that improve disease diagnostics through deep learning models. …”
    Get full text
    Article
  4. 544

    Entire aerial-aquatic trajectory modeling and optimization for trans-medium vehicles by Teng Long, Nianhui Ye, Baoshou Zhang, Jingliang Sun, Renhe Shi

    Published 2025-07-01
    “…Simultaneously, several constraints, i.e., the max impact load, trajectory height, etc., are involved in the optimization problem. Rather than directly optimizing by a heuristic algorithm, a multi-surrogate cooperative sampling-based optimization method is proposed to alleviate the computational complexity of the entire trajectory optimization problem. …”
    Get full text
    Article
  5. 545

    Optimization mechanism of attack and defense strategy in honeypot game with evidence for deception by Lihua SONG, Yangyang JIANG, Changyou XING, Guomin ZHANG

    Published 2022-11-01
    “…Using game theory to optimize honeypot behavior is an important method in improving defender’s trapping ability.Existing work tends to use over simplified action spaces and consider isolated game stages.A game model named HoneyED with expanded action spaces and covering comprehensively the whole interaction process between a honeypot and its adversary was proposed.The model was focused on the change in the attacker’s beliefs about its opponent’s real identity.A pure-strategy-equilibrium involving belief was established for the model by theoretical analysis.Then, based on the idea of deep counterfactual regret minimization (Deep-CFR), an optimization algorithm was designed to find an approximate hybrid-strategy-equilibrium.Agents for both sides following hybrid strategies from the approximate equilibrium were obtained.Theoretical and experimental results show that the attacker should quit the game when its belief reaches a certain threshold for maximizing its payoff.But the defender’s strategy is able to maximize the honeypot’s profit by reducing the attacker’s belief to extend its stay as long as possible and by selecting the most suitable response to attackers with different deception recognition abilities.…”
    Get full text
    Article
  6. 546

    Shape optimization of non-uniform parametric piezoelectric energy harvester beam by Milad Hasani, Hossein Shahverdi

    Published 2025-04-01
    “…Results indicate that optimization significantly improves the power density of conventional cantilever piezoelectric beams, achieving high power outputs without the need for complex structures. …”
    Get full text
    Article
  7. 547

    Binary program taint analysis optimization method based on function summary by Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU

    Published 2023-04-01
    “…Taint analysis is a popular software analysis method, which has been widely used in the field of information security.Most of the existing binary program dynamic taint analysis frameworks use instruction-level instrumentation analysis methods, which usually generate huge performance overhead and reduce the program execution efficiency by several times or even dozens of times.This limits taint analysis technology’s wide usage in complex malicious samples and commercial software analysis.An optimization method of taint analysis based on function summary was proposed, to improve the efficiency of taint analysis, reduce the performance loss caused by instruction-level instrumentation analysis, and make taint analysis to be more widely used in software analysis.The taint analysis method based on function summary used function taint propagation rules instead of instruction taint propagation rules to reduce the number of data stream propagation analysis and effectively improve the efficiency of taint analysis.For function summary, the definition of function summary was proposed.And the summary generation algorithms of different function structures were studied.Inside the function, a path-sensitive analysis method was designed for acyclic structures.For cyclic structures, a finite iteration method was designed.Moreover, the two analysis methods were combined to solve the function summary generation of mixed structure functions.Based on this research, a general taint analysis framework called FSTaint was designed and implemented, consisting of a function summary generation module, a data flow recording module, and a taint analysis module.The efficiency of FSTaint was evaluated in the analysis of real APT malicious samples, where the taint analysis efficiency of FSTaint was found to be 7.75 times that of libdft, and the analysis efficiency was higher.In terms of accuracy, FSTaint has more accurate and complete propagation rules than libdft.…”
    Get full text
    Article
  8. 548
  9. 549

    Stability Evaluation Method for Rock Slope-Anchorage Systems Based on Genetic Algorithms and Discrete Element Analysis by Peng Xia, Bowen Zeng, Yiheng Pan

    Published 2025-05-01
    “…The findings indicate that (1) the proposed evaluation method effectively accounts for the interaction between the anchorage structure and the rock slope, ensuring accurate results; (2) the method leverages the discrete element numerical model to quantitatively assess deformation and stress distribution within the system; (3) the integration of genetic algorithms significantly enhances the efficiency of identifying the most representative numerical model, and thereby the efficiency of stability evaluation is improved; and (4) the evaluation framework is capable of performing dynamic analyses of the stability evolution throughout the entire operational lifecycle of the rock slope anchorage system.…”
    Get full text
    Article
  10. 550
  11. 551

    Enhancing LoRaWAN Performance Using Boosting Machine Learning Algorithms Under Environmental Variations by Maram A. Alkhayyal, Almetwally M. Mostafa

    Published 2025-06-01
    “…Bayesian Optimization was applied to fine-tune hyperparameters to improve model accuracy. …”
    Get full text
    Article
  12. 552

    Optimizing concrete strength: How nanomaterials and AI redefine mix design by Dan Huang, Guangshuai Han, Ziyang Tang

    Published 2025-07-01
    “…XGB was identified as the most effective ML algorithm for predicting compressive strength among others in this study (R2=0.974). …”
    Get full text
    Article
  13. 553
  14. 554

    Smallest-Small-World Cellular Harmony Search for Optimization of Unconstrained Benchmark Problems by Sung Soo Im, Do Guen Yoo, Joong Hoon Kim

    Published 2013-01-01
    “…Harmony search has successfully been applied to a wide variety of practical optimization problems. Most of the previous researches have sought to improve the performance of the HS algorithm by changing the pitch adjusting rate and harmony memory considering rate. …”
    Get full text
    Article
  15. 555

    Optimization of Flight Scheduling in Urban Air Mobility Considering Spatiotemporal Uncertainties by Lingzhong Meng, Minggong Wu, Xiangxi Wen, Zhichong Zhou, Qingguo Tian

    Published 2025-05-01
    “…Additionally, the proposed phased artificial lemming algorithm (ALA) outperforms traditional optimization algorithms in terms of solution quality. …”
    Get full text
    Article
  16. 556

    Efficient and Composable Masked AES S-Box Designs Using Optimized Inverters by Vedad Hadžic, Roderick Bloem

    Published 2024-12-01
    “… Hardware implementations of cryptographic algorithms are susceptible to power analysis attacks, allowing attackers to break the otherwise strong security guarantees. …”
    Get full text
    Article
  17. 557

    Selective opposition based constrained barnacle mating optimization: Theory and applications by Marzia Ahmed, Mohd Herwan Sulaiman, Md. Maruf Hassan, Md. Atikur Rahaman, Masuk Abdullah

    Published 2024-12-01
    “…In addition to increasing efficiency by cutting down on wasted time spent exploring, this also increases the likelihood of stumbling onto optimal solutions. After that, it is put through its paces in a real-world case study, where it proves to be superior to the most cutting-edge algorithms available.…”
    Get full text
    Article
  18. 558

    Precision Measurement and Feature Selection in Medical Diagnostics using Hybrid Genetic Algorithm and Support Vector Machine by Gowri Subadra K, Sathish Babu P

    Published 2025-07-01
    “…In the proposed method, GA is used to identify the most relevant features from the breast cancer diagnosis data, to improve the efficiency of the classification process. …”
    Get full text
    Article
  19. 559

    AI-Driven Predictive Maintenance for Workforce and Service Optimization in the Automotive Sector by Şenda Yıldırım, Ahmet Deniz Yücekaya, Mustafa Hekimoğlu, Meltem Ucal, Mehmet Nafiz Aydin, İrem Kalafat

    Published 2025-06-01
    “…However, conventional approaches frequently do not successfully forecast which clients are most likely to need or utilize maintenance services. …”
    Get full text
    Article
  20. 560

    Comparative analysis of software optimization methods in context of branch predication on GPUs by I. Yu. Sesin, R. G. Bolbakov

    Published 2021-12-01
    “…Covered approaches include: optimizing compilers, JIT-compilation, branch predictor, speculative execution, adaptive optimization, run-time algorithm specialization, profile-guided optimization. …”
    Get full text
    Article