Search alternatives:
whale » whole (Expand Search)
Showing 4,461 - 4,480 results of 5,910 for search '(whale OR while) optimize algorithm', query time: 0.15s Refine Results
  1. 4461

    Query scheduling based on cloud-edge multi-data warehouse architecture and cost prediction model by GAO Xuning, YANG Song, LI Mingzhe, ZHANG Yanfeng

    Published 2025-01-01
    “…The scheduling framework and optimization algorithm achieve significant performance improvement on SSB and TPC-DS datasets. …”
    Get full text
    Article
  2. 4462

    Query scheduling based on cloud-edge multi-data warehouse architecture and cost prediction model by GAO Xuning, YANG Song, LI Mingzhe, ZHANG Yanfeng

    Published 2025-01-01
    “…The scheduling framework and optimization algorithm achieve significant performance improvement on SSB and TPC-DS datasets. …”
    Get full text
    Article
  3. 4463

    Selecting the Strategic Port of “the Belt and Road” Based on the Global Network by Zihui Yang, Qingchun Meng, Chanjuan Li

    Published 2021-01-01
    “…Under “the Belt and Road” initiative, China promoted cooperation between domestic enterprises and international ports vigorously, which brought back fruitful results, while the rational selection of strategic pivots ports and the optimization of the layout of the port network are important guarantees to a further promotion to the economic development of “the Belt and Road” ports and give full play to the driving and radiation role of strategic pivots ports. …”
    Get full text
    Article
  4. 4464

    Subsystem-Based Fault Detection in Robotics via <italic>L2</italic> Norm and Random Forest Models by Elham Abdullah Alamoudi

    Published 2024-01-01
    “…This single-signal approach allows the algorithm to accurately classify data without being distracted by different types of signals, in addition to eliminating the curse of dimensionality. …”
    Get full text
    Article
  5. 4465

    Enhancing Lifetime and Reliability in WSNs: Complementary of Dual-Battery Systems Energy Management Strategy by Mehrshad Eskandarpour, Hossein Soleimani

    Published 2025-01-01
    “…Unlike previous approaches, this system enables simultaneous charging and load powering and is specifically optimized for energy-harvesting WSN environments. Simulation results in MATLAB/Simulink demonstrate that the system improves battery lifespan by up to 25% compared to conventional single-battery configurations, while ensuring stable voltage regulation and improved reliability under variable loads. …”
    Get full text
    Article
  6. 4466

    Linear adaptive filtering of random sequences on basis of deterministic approach by V. A. Artemiev, A. O. Naumov, L. L. Kokhan

    Published 2018-09-01
    “…The optimal current estimate is based on both measurement results and extrapolated values. …”
    Get full text
    Article
  7. 4467

    An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs by Jing Wang, Xue Yuan, Yingjie Xu, Yudi Zhang

    Published 2024-01-01
    “…When compared with some related schemes, this optimization speeds up both the key generation and signing phases with constant rounds while maintaining security against malicious adversaries.…”
    Get full text
    Article
  8. 4468

    Energy-Efficient Adaptive Routing and Context-Aware Lifetime Maximization in Wireless Sensor Networks by Shaohua Wan

    Published 2014-11-01
    “…We design and implement a Bezier-based multipath routing algorithm that allows a given source node to send samples of data to a given sink node in large scale sensor networks. …”
    Get full text
    Article
  9. 4469

    Hydrofoil Installation and Performance Optimisation for Ship Resistance Reduction in Trimaran Through Particle Swarm Optimisation Method by Ghadimi Aliakbar, Ghadimi Parviz, Ghassemi Hassan

    Published 2025-03-01
    “…The primary aim of this hydrofoil is to reduce the overall resistance while the ship is moving. This study focuses on minimising the ship’s total resistance. …”
    Get full text
    Article
  10. 4470

    CBID: A Scalable Method for Distributed Data Aggregation in WSNs by Aristides Mpitziopoulos, Damianos Gavalas, Charalampos Konstantopoulos, Grammati Pantziou

    Published 2010-07-01
    “…Herein we present CBID, a novel algorithm that calculates near-optimal routes for MAs that incrementally fuse the data as they visit the Sensor Nodes (SNs) while also enabling fast updates on the designed itineraries upon changes of network topology. …”
    Get full text
    Article
  11. 4471

    Intelligent resource scheduling scheme for UAV swarm collaborative sensing by ZHAO Pengcheng, LI Tianyang, LENG Supeng, XIONG Kai

    Published 2025-03-01
    “…Furthermore, a multi-agent reinforcement learning (MARL) algorithm with an attention mechanism was employed to solve the optimization problem, enabling agents to extract critical environmental features more effectively. …”
    Get full text
    Article
  12. 4472

    Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage by ZHANG Kejun, WANG Wenbin, XU Shaofei, YU Xinying, WANG Jun, LI Pengcheng, QIAN Rong

    Published 2024-09-01
    “…A blockchain-based verification algorithm was designed to detect tampering of third-party data. …”
    Get full text
    Article
  13. 4473

    Variational Quantum Simulation: A Case Study for Understanding Warm Starts by Ricard Puig, Marc Drudis, Supanut Thanasilp, Zoë Holmes

    Published 2025-01-01
    “…While our main focus is on this case study of variational quantum simulation, we end by discussing how our results work in other iterative settings.…”
    Get full text
    Article
  14. 4474

    A grid-based reliable multi-hop routing protocol for energy-efficient wireless sensor networks by Zhansheng Chen, Hong Shen

    Published 2018-03-01
    “…In order to minimize and balance the energy consumption, our proposed protocol, grid-based reliable multi-hop routing protocol, optimizes the cluster head election process by combining individual ability which consists of node’s residual energy and node’s location, and local cognition which can balance energy consumption among clusters via a consultative mechanism based on cluster head’s lifetime expectancy, while considering data forwarding delay and reliable transmission of data. …”
    Get full text
    Article
  15. 4475

    Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage by ZHANG Kejun, WANG Wenbin, XU Shaofei, YU Xinying, WANG Jun, LI Pengcheng, QIAN Rong

    Published 2024-09-01
    “…A blockchain-based verification algorithm was designed to detect tampering of third-party data. …”
    Get full text
    Article
  16. 4476

    Physical Activity Recognition Utilizing the Built-In Kinematic Sensors of a Smartphone by Yi He, Ye Li

    Published 2013-04-01
    “…The results indicated that the accelerometer was significant to PA recognition, while gyroscope and orientation sensor were effective to recognize the change of body posture and detect falls, respectively. …”
    Get full text
    Article
  17. 4477

    A Gaussian process approach for contextual bandit-based battery replacement by Zhou Tianshi

    Published 2025-01-01
    “…This research aims to assist electric vehicle providers in optimizing battery replacement schedules, with the objective of minimizing operating losses while meeting evening peak demand. …”
    Get full text
    Article
  18. 4478
  19. 4479

    GBM-Reservoir: Brain tumor (Glioblastoma Multiforme) MRI dataset collection with ground truth segmentation masksfigshare by Naida Solak, André Ferreira, Gijs Luijten, Behrus Puladi, Victor Alves, Jan Egger

    Published 2025-02-01
    “…The first mask is the raw output from the registration process and is provided for all samples, while the second mask, provided particularly for synthetic samples, is a post-processed version of the first, designed to simplify interpretation and optimize it for network training. …”
    Get full text
    Article
  20. 4480

    DS-AdaptNet: An Efficient Retinal Vessel Segmentation Framework With Adaptive Enhancement and Depthwise Separable Convolutions by Shuting Chen, Chengxi Hong, Hong Jia

    Published 2025-01-01
    “…Second, we develop a Context-Aware Adaptive Threshold Optimization (CA-ATO) algorithm that dynamically determines optimal thresholds by integrating multi-scale contextual information and uncertainty estimates, substantially improving boundary delineation accuracy and fine structure preservation. …”
    Get full text
    Article