Search alternatives:
whale » whole (Expand Search)
Showing 3,961 - 3,980 results of 5,910 for search '(whale OR while) optimize algorithm', query time: 0.43s Refine Results
  1. 3961

    Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments by Faeiz Alserhani

    Published 2024-12-01
    “…User selection is accomplished through robust Deep Reinforcement Learning with the Tabu Search (DRL-TS) algorithm, while channel selection is optimized through rigorous training employing Proximal Policy Optimization (PPO). …”
    Get full text
    Article
  2. 3962

    Bayesian Q-learning in multi-objective reward model for homophobic and transphobic text classification in low-resource languages: A hypothesis testing framework in multi-objective... by Vivek Suresh Raj, Ruba Priyadharshini, Saranya Rajiakodi, Bharathi Raja Chakravarthi

    Published 2025-06-01
    “…Most Reinforcement Learning (RL) algorithms optimize a single-objective function, whereas real-world decision-making involves multiple aspects. …”
    Get full text
    Article
  3. 3963

    A Hybrid Dynamic Path-Planning Method for Obstacle Avoidance in Unmanned Aerial Vehicle-Based Power Inspection by Zheng Huang, Chengling Jiang, Chao Shen, Bin Liu, Tao Huang, Minghui Zhang

    Published 2025-01-01
    “…Simulation results show that, compared to traditional algorithms, the proposed method achieves an 8% to 12% optimization in path length, more than 50% in node optimization, and over 95% in planning time optimization. …”
    Get full text
    Article
  4. 3964

    The Impact of AI Software on Financial Transactions by Li Boyang

    Published 2025-01-01
    “…The rapid advancement of artificial intelligence (AI) has profoundly transformed financial trading, enhanced efficiency, accuracy, and customer service while introducing new challenges. This paper explores AI’s applications in quantitative trading, risk forecasting, and intelligent customer interactions, demonstrating its ability to optimize decision-making and reduce operational costs. …”
    Get full text
    Article
  5. 3965

    Online Autonomous Motion Control of Communication-Relay UAV with Channel Prediction in Dynamic Urban Environments by Cancan Tao, Bowen Liu

    Published 2024-12-01
    “…The method mainly consists of two parts: wireless channel parameter estimation and optimal relay position search. Considering that in practical applications, the radio frequency (RF) channel parameters in complex urban environments are difficult to obtain in advance and are constantly changing, an estimation algorithm based on Gaussian process learning is proposed for online evaluation of the wireless channel parameters near the current position of the UAV; for the optimal relay position search problem, in order to improve the real-time performance of the method, a line search algorithm and a general gradient-based algorithm are proposed, which are used for point-to-point communication and multi-node communication scenarios, respectively, reducing the two-dimensional search to a one-dimensional search, and the stability proof and convergence conditions of the algorithm are given. …”
    Get full text
    Article
  6. 3966

    Research on Automotive Radar Mutual Interference Mitigation Method based on V2X Communication Assistance by Yangshui Gao, Liping Kui, Qinbiao Yang, Lei Xiong, Rong Zhang, Zhenting Chen

    Published 2025-02-01
    “…To solve mixed integer nonlinear programming optimization problems, Q-learning algorithm is introduced. …”
    Get full text
    Article
  7. 3967

    Blood Scattering Model for Pulsed Doppler by Piotr KARWAT, Andrzej NOWICKI, Marcin LEWANDOWSKI

    Published 2014-09-01
    “…Generated data are used for optimization and validation of Doppler signals processing algorithms. …”
    Get full text
    Article
  8. 3968

    Synthesizing Sum and Difference Patterns with Low Complexity Feeding Network by Sharing Element Excitations by Jafar Ramadhan Mohammed

    Published 2017-01-01
    “…Unlike the standard optimization approaches such as genetic algorithm (GA), the described algorithm performs repeatedly deterministic transformations on the initial field until the prescribed requirements are satisfied. …”
    Get full text
    Article
  9. 3969

    Distributed Formation Control with Obstacle and Collision Avoidance for Hypersonic Gliding Vehicles Subject to Multiple Constraints by Zhen Zhang, Yifan Luo, Yaohong Qu

    Published 2023-01-01
    “…The actual control input solver adopts a feasible solution process to calculate the actual control signals while dealing with constraints. Finally, extensive numerical simulations are implemented to unveil the proposed algorithm’s performance and superiority.…”
    Get full text
    Article
  10. 3970

    Robust sparse smooth principal component analysis for face reconstruction and recognition. by Jing Wang, Xiao Xie, Li Zhang, Jian Li, Hao Cai, Yan Feng

    Published 2025-01-01
    “…Consequently, the proposed RSSPCA algorithm generally outperforms existing algorithms in face reconstruction and recognition. …”
    Get full text
    Article
  11. 3971

    IoT intrusion detection method for unbalanced samples by ANTONG P, Wen CHEN, Lifa WU

    Published 2023-02-01
    “…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
    Get full text
    Article
  12. 3972

    Efficient multiplication for finite fields of p characteristic by LI Yin 1, CHEN Gong-liang1, LI Jian-hua1

    Published 2009-01-01
    “…Based on residue arithmetic,a new form of polynomial named PAPB in Fp[x] had been constructed.The amount and distribution of such irreducible polynomials had also been investigated.Then,an efficient algorithm for multiplication modulo PAPB had been proposed using residue arithmetic and Chinese remainder theorem.In the end,the result analysis was given.The theoretic analysis and simulation experiment show that for some finite field of medium prime characteristic,the given algorithm only costs O(k1.5) operations in Fp while the multiplication modulo irreducible binomial cost O(k2) operations,which shows a better performance.As a result,the work presents an interesting perspective for optimal extension field and elliptic curve cryptography.…”
    Get full text
    Article
  13. 3973

    Analysis of Two-Grid Characteristic Finite Element Methods for Convection-Diffusion Equations by Keyan Wang, Boxia Hu

    Published 2023-01-01
    “…We present an optimal error estimate in Lp-norm for the characteristic finite element method unconditionally, while all previous works require certain time-step restrictions. …”
    Get full text
    Article
  14. 3974

    Efficient dynamic task offloading and resource allocation in UAV-assisted MEC for large sport event by Chen Peng, Qiqi Wang, Desheng Zhang

    Published 2025-04-01
    “…Experiments shows that the EDRA algorithm can reduce energy consumption by 32.4% compared to advanced algorithms while ensuring stronger system performance.…”
    Get full text
    Article
  15. 3975

    Turning Energy-Aware Route Planning With an Extended TSP and Double-Layer State Graph: Experimental Evaluation With a Crawler Mobile Robot by Namihei Adachi, Hisashi Date

    Published 2025-01-01
    “…The routes that minimized energy consumption showed an average 17 % reduction in energy consumption, while the routes that minimized travel time achieved an average 5 % reduction in travel time compared to the standard TSP algorithm.…”
    Get full text
    Article
  16. 3976

    Federated deep reinforcement learning-based edge collaborative caching strategy in space-air-ground integrated network by LIU Liang, JING Tengxiang, DUAN Jie, MAO Wuping, YAN Hongcheng, MA Wenjie

    Published 2025-01-01
    “…Simulation results show that compared with other algorithm, the proposed algorithm can improve the cache hit rate of user requests by 18% and reduce the access latency of content by 25% while protecting user privacy.…”
    Get full text
    Article
  17. 3977

    Differentiable architecture search-based automatic modulation recognition for multi-carrier signals by LI Jie, LI Jing, LYU Lu, GONG Fengkui

    Published 2024-09-01
    “…Simulation results demonstrate that the proposed algorithm improves accuracy in urban multipath channels, especially at low SNR, while simultaneously providing better robustness to modulation parameter variations and small-sample scenarios.…”
    Get full text
    Article
  18. 3978

    A grid-based sectoring for energy-efficient wireless sensor networks by Nubunga Ishaya, Mustapha Aminu Bagiwa

    Published 2025-04-01
    “…This research improves CH selection by organizing sensor nodes into square grid clusters and employing a routing algorithm for randomized CH selection. Game theory (GT) and Ad hoc on Demand Vectors (AODV) were used to choose the optimal routing path, while Grey Wolf Optimization (GWO) was used to determine the optimal CHs. …”
    Get full text
    Article
  19. 3979

    Energy-Efficient Node Selection for Target Tracking in Wireless Sensor Networks by Yong Wang, Dianhong Wang

    Published 2013-01-01
    “…With this understanding, a dynamic node selection scheme based on genetic algorithms is proposed, which can optimize the tradeoff between the accuracy of tracking and the energy cost of nodes. …”
    Get full text
    Article
  20. 3980

    Secure Latency-Aware Task Offloading Using Federated Learning and Zero Trust in Edge Computing for IoMT by Waleed Almuseelem

    Published 2025-01-01
    “…Within FL, an improved on-policy temporal difference control algorithm is leveraged for local model training. Moreover, this algorithm determines the optimal offloading strategy based on the global model while considering trustworthiness, the heterogeneous nature of tasks, resource availability, and latency. …”
    Get full text
    Article