Showing 3,961 - 3,980 results of 5,934 for search '(while OR whole) (optimizer OR optimize) algorithm', query time: 0.32s Refine Results
  1. 3961

    Outcomes among children and adults at risk of severe dengue in Sri Lanka: Opportunity for outpatient case management in countries with high disease burden. by Champica K Bodinayake, Ajith DeS Nagahawatte, Vasantha Devasiri, Niroshana J Dahanayake, Gaya B Wijayaratne, Nayani P Weerasinghe, Madureka Premamali, Tianchen Sheng, Bradly P Nicholson, Harshanie A Ubeysekera, Ruvini Mp Kurukulasooriya, Aruna D de Silva, Truls Østbye, Christopher W Woods, L Gayani Tillekeratne

    Published 2021-12-01
    “…<h4>Conclusions</h4>One-half of patients hospitalized with acute dengue progressed to develop DHF and a very small number developed DSS or severe dengue. Developing an algorithm for triaging patients to ambulatory versus inpatient management should be the future goal to optimize utilization of healthcare resources in dengue-endemic countries.…”
    Get full text
    Article
  2. 3962

    Fast Processing of Massive Hyperspectral Image Anomaly Detection Based on Cloud-Edge Collaboration by Yunchang Wang, Jin Sun, Yang Xu, Zhihui Wei, Shangdong Zheng, Zebin Wu

    Published 2025-01-01
    “…With the improvement of hyperspectral image resolution, existing anomaly detection algorithms find it challenging to quickly process large volumes of hyperspectral data while fully exploiting spectral information. …”
    Get full text
    Article
  3. 3963

    A grid-based sectoring for energy-efficient wireless sensor networks by Nubunga Ishaya, Mustapha Aminu Bagiwa

    Published 2025-04-01
    “…This research improves CH selection by organizing sensor nodes into square grid clusters and employing a routing algorithm for randomized CH selection. Game theory (GT) and Ad hoc on Demand Vectors (AODV) were used to choose the optimal routing path, while Grey Wolf Optimization (GWO) was used to determine the optimal CHs. …”
    Get full text
    Article
  4. 3964

    Research on GNNs with stable learning by Wenbin Li, Wenxuan Wei, Peiyang Wang, Li Pan, Bo Yang, Yanling Xu

    Published 2025-08-01
    “…The aim is to extract genuine causal features while eliminating spurious causal features. By introducing a feature sample weighting decorrelation technique in the random Fourier transform space and combining it with a baseline GNN model, a Stable-GNN model and a constrained sampling weight gradient update algorithm are designed. …”
    Get full text
    Article
  5. 3965

    Generalized Singular Value Decomposition-Based Secure Beam Hybrid Precoding for Millimeter Wave Massive Multiple-Input Multiple-Output Systems by Boqing Chen, Lijun Yang, Meng Wu

    Published 2025-04-01
    “…In a hybrid precoding system, the low-complexity GSVD-Sparsity algorithm can achieve a spectral efficiency close to that of the GSVD-based scheme in a fully digital system while maintaining anti-eavesdropping capabilities.…”
    Get full text
    Article
  6. 3966

    IoT intrusion detection method for unbalanced samples by ANTONG P, Wen CHEN, Lifa WU

    Published 2023-02-01
    “…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
    Get full text
    Article
  7. 3967

    The Impact of AI Software on Financial Transactions by Li Boyang

    Published 2025-01-01
    “…The rapid advancement of artificial intelligence (AI) has profoundly transformed financial trading, enhanced efficiency, accuracy, and customer service while introducing new challenges. This paper explores AI’s applications in quantitative trading, risk forecasting, and intelligent customer interactions, demonstrating its ability to optimize decision-making and reduce operational costs. …”
    Get full text
    Article
  8. 3968

    Application of RNA-seq for single nucleotide variation identification in a cohort of patients with hypertrophic cardiomyopathy by Anastasia Chumakova, Ivan Vlasov, Elena Filatova, Anna Klass, Andrey Lysenko, Gennady Salagaev, Maria Shadrina, Petr Slominsky

    Published 2025-05-01
    “…The algorithm was evaluated and the optimal quality threshold was determined based on allelic discrimination for the rs397516037 mutation (MYBPC3 c.3697 C > T) among patients. …”
    Get full text
    Article
  9. 3969

    Turning Energy-Aware Route Planning With an Extended TSP and Double-Layer State Graph: Experimental Evaluation With a Crawler Mobile Robot by Namihei Adachi, Hisashi Date

    Published 2025-01-01
    “…The routes that minimized energy consumption showed an average 17 % reduction in energy consumption, while the routes that minimized travel time achieved an average 5 % reduction in travel time compared to the standard TSP algorithm.…”
    Get full text
    Article
  10. 3970

    Federated deep reinforcement learning-based edge collaborative caching strategy in space-air-ground integrated network by LIU Liang, JING Tengxiang, DUAN Jie, MAO Wuping, YAN Hongcheng, MA Wenjie

    Published 2025-01-01
    “…Simulation results show that compared with other algorithm, the proposed algorithm can improve the cache hit rate of user requests by 18% and reduce the access latency of content by 25% while protecting user privacy.…”
    Get full text
    Article
  11. 3971

    Energy efficient control of indoor environments under time-varying multi-parameter uncertainty by Jianhao ZHAO, Hua SONG, Xinyuan NAN, Xin CAI

    Published 2024-12-01
    “…Prioritized experience replay (PER) in DDPG is used to rationally and optimally control the power of the equipment for indoor air quality (IAQ) and thermal comfort. …”
    Get full text
    Article
  12. 3972

    Calibration and Uncertainty Analysis of Freundlich and Langmuir Isotherms Using the Markov Chain Monte Carlo (MCMC) Approach by Haniyeh Sharifi Moghadam, Saeed Alimohammadi

    Published 2024-10-01
    “…First, their parameters were estimated and calibrated using a simple optimization model. To analyze parameter uncertainty, a Bayesian approach employing the Markov Chain Monte Carlo method was adopted, utilizing the Metropolis-Hastings and Gibbs algorithms, and the results were compared. …”
    Get full text
    Article
  13. 3973

    A Method for Efficient Task Assignment Based on the Satisfaction Degree of Knowledge by Jiafu Su, Jie Wang, Sheng Liu, Na Zhang, Chi Li

    Published 2020-01-01
    “…Considering the uncertain factors associated with the whole R&D process, the task assignment model component serves as a robust optimization model to assign tasks. …”
    Get full text
    Article
  14. 3974

    Three-Dimensional in Vivo Imaging of Green Fluorescent Protein-Expressing T Cells in Mice with Noncontact Fluorescence Molecular Tomography by Anikitos Garofalakis, Giannis Zacharakis, Heiko Meyer, Eleftherios N. Economou, Clio Mamalaki, Joseph Papamatheakis, Dimitris Kioussis, Vasilis Ntziachristos, Jorge Ripoll

    Published 2007-03-01
    “…Given that optical tomography is capable of quantitatively imaging the distribution of several important chromophores and fluorophores in vivo, there has been a great deal of interest in developing optical imaging systems with increased numbers of measurements under optimal experimental conditions. In this article, we present a novel system that enables three-dimensional imaging of fluorescent probes in whole animals using a noncontact setup, in parallel with a three-dimensional surface reconstruction algorithm. …”
    Get full text
    Article
  15. 3975

    A Novel Nonlinear Adaptive Control Method for Longitudinal Speed Control for Four-Independent-Wheel Autonomous Vehicles by Jinhua Zhang, Zhenghao Chen, Jinshi Yu

    Published 2024-11-01
    “…Based on the design of the upper controller, an innovative optimized longitudinal force distribution strategy and the construction of a tire reverse longitudinal slip model are proposed, followed by the design of a fuzzy PID controller as the lower slip ratio controller to achieve precise whole-vehicle longitudinal speed tracking and improve overall control performance. …”
    Get full text
    Article
  16. 3976

    Unmanned aerial vehicle field sampling and antenna pattern reconstruction using Bayesian compressed sensing by Sayeh Mirzaei, Alireza Gholipour

    Published 2019-06-01
    “…Performing onsite measurements by scanning the whole 4π [sr] solid angle around the antenna under test (AUT) is more complicated. …”
    Get full text
    Article
  17. 3977

    Blood Scattering Model for Pulsed Doppler by Piotr KARWAT, Andrzej NOWICKI, Marcin LEWANDOWSKI

    Published 2014-09-01
    “…Generated data are used for optimization and validation of Doppler signals processing algorithms. …”
    Get full text
    Article
  18. 3978

    Synthesizing Sum and Difference Patterns with Low Complexity Feeding Network by Sharing Element Excitations by Jafar Ramadhan Mohammed

    Published 2017-01-01
    “…Unlike the standard optimization approaches such as genetic algorithm (GA), the described algorithm performs repeatedly deterministic transformations on the initial field until the prescribed requirements are satisfied. …”
    Get full text
    Article
  19. 3979

    Distributed Formation Control with Obstacle and Collision Avoidance for Hypersonic Gliding Vehicles Subject to Multiple Constraints by Zhen Zhang, Yifan Luo, Yaohong Qu

    Published 2023-01-01
    “…The actual control input solver adopts a feasible solution process to calculate the actual control signals while dealing with constraints. Finally, extensive numerical simulations are implemented to unveil the proposed algorithm’s performance and superiority.…”
    Get full text
    Article
  20. 3980

    Efficient multiplication for finite fields of p characteristic by LI Yin 1, CHEN Gong-liang1, LI Jian-hua1

    Published 2009-01-01
    “…Based on residue arithmetic,a new form of polynomial named PAPB in Fp[x] had been constructed.The amount and distribution of such irreducible polynomials had also been investigated.Then,an efficient algorithm for multiplication modulo PAPB had been proposed using residue arithmetic and Chinese remainder theorem.In the end,the result analysis was given.The theoretic analysis and simulation experiment show that for some finite field of medium prime characteristic,the given algorithm only costs O(k1.5) operations in Fp while the multiplication modulo irreducible binomial cost O(k2) operations,which shows a better performance.As a result,the work presents an interesting perspective for optimal extension field and elliptic curve cryptography.…”
    Get full text
    Article