Showing 2,561 - 2,580 results of 5,934 for search '(whole OR while) (optimizer OR optimize) algorithm', query time: 0.23s Refine Results
  1. 2561

    Optional and mandatory assignment strategies for dynamic vehicle routing with time windows by Mustafa Demirbilek

    Published 2025-09-01
    “…In MPA, customer requests can be rejected if future requests are expected to be more advantageous, whereas MPM mandates accepting requests provided vehicle capacity is sufficient. After optimizing the methods through sensitivity analyses, we evaluated their performance against Clarke and Wright's Savings Algorithm (CW) across various real-world-inspired scenarios, including different time window lengths, interarrival times, and region types. …”
    Get full text
    Article
  2. 2562
  3. 2563

    DATA DRIVEN RULE-BASED PEAK SHAVING ALGORITHM FOR SCHEDULING REFRIGERATORS by Daniel KWEGYIR, Francis Effah BOAFO, Daniel OPOKU, Emmanuel Asuming FRIMPONG

    Published 2024-12-01
    “…The GWOP is tuned using a brute-force grid search method to optimize its parameters. In the real-time mode, the algorithm dynamically adjusts refrigerator operations based on real-time mismatch calculations between predicted demand and generation. …”
    Get full text
    Article
  4. 2564
  5. 2565

    High-Performance Identification and Control of MIMO (Multiple Input—Multiple Output) Experimental Module with Fractional-Order Approach Application by Alexandre Marques de Almeida, Alisson Luan Daga, Rafael Palma Setti Penteado Lanzarini, Ervin Kaminski Lenzi, Marcelo Kaminski Lenzi

    Published 2025-04-01
    “…An important aspect concerns the use of Particle Swarm Optimization (PSO) metaheuristic algorithm for optimization tasks, both in parameter estimation and controller tuning. …”
    Get full text
    Article
  6. 2566
  7. 2567

    AutoML: A systematic review on automated machine learning with neural architecture search by Imrus Salehin, Md. Shamiul Islam, Pritom Saha, S.M. Noman, Azra Tuni, Md. Mehedi Hasan, Md. Abu Baten

    Published 2024-01-01
    “…AutoML emerged to increase productivity and efficiency by automating as much as possible the inefficient work that occurs while repeating this process whenever machine learning is applied. …”
    Get full text
    Article
  8. 2568

    The Hydrodynamic Performance of a Vertical-Axis Hydro Turbine with an Airfoil Designed Based on the Outline of a Sailfish by Aiping Wu, Shiming Wang, Chenglin Ding

    Published 2025-06-01
    “…Through Latin hypercube experimental design combined with optimization algorithms, four key geometric variables governing the airfoil’s hydrodynamic characteristics were systematically analyzed. …”
    Get full text
    Article
  9. 2569

    An Innovative Smart Irrigation Using Embedded and Regression-Based Machine Learning Technologies for Improving Water Security and Sustainability by Abdennabi Morchid, Abdennacer Elbasri, Zahra Oughannou, Hassan Qjidaa, Rachid El Alami, Badre Bossoufi, Saleh Mobayen, Pawel Skruch

    Published 2025-01-01
    “…This study proposes an irrigation system based on embedded systems, using sensors and algorithms to collect and analyze data in order to optimize water management. …”
    Get full text
    Article
  10. 2570

    A hybrid framework for heart disease prediction using classical and quantum-inspired machine learning techniques by Ankur Kumar, Sanjay Dhanka, Abhinav Sharma, Rohit Bansal, Mochammad Fahlevi, Fazla Rabby, Mohammed Aljuaid

    Published 2025-07-01
    “…Subsequently, both classical and quantum-inspired models are trained and optimized. The classical models utilized Genetic Algorithms (CGA) and Particle Swarm Optimization (CPSO) for hyperparameter tuning, while the quantum-inspired models employed Quantum Genetic Algorithms (QGAs) and Quantum Particle Swarm Optimization (QPSO). …”
    Get full text
    Article
  11. 2571

    Expedited re-design of multi-band passive microwave circuits using orthogonal scaling directions and gradient-based tuning by Slawomir Koziel, Anna Pietrenko-Dabrowska, Ubaid Ullah

    Published 2024-04-01
    “…In particular, the employment of a given passive structure in a different application area often requires re-adjustment of the operating frequencies/bands while maintaining top performance. Achieving this necessitates the utilization of numerical optimization methods. …”
    Get full text
    Article
  12. 2572

    Techno-economic analysis and energy management strategies for micro gas turbines: A state-of-the-art review by A.H. Samitha Weerakoon, Mohsen Assadi

    Published 2024-10-01
    “…Additionally, the optimization of Micro Gas Turbine systems using advanced algorithms enhances energy efficiency by 10–15%, highlighting the importance of smart control systems and optimal component sizing. …”
    Get full text
    Article
  13. 2573

    Sparse support path generation for multi-axis curved layer fused filament fabrication by Tak Yu Lau, Dong He, Yamin Li, Yihe Wang, Danjie Bi, Lulu Huang, Pengcheng Hu, Kai Tang

    Published 2025-08-01
    “…Firstly, the overhang regions are detected by identifying the overhang points given a multi-axis nozzle path. Then, an optimization framework for the support guide curve is proposed to minimize its total length while ensuring that overhang filaments can be stably supported. …”
    Get full text
    Article
  14. 2574

    A trade-off between line hardening and dynamic line rating by a new convex optimization model for resilient micro-grid-oriented expansion planning of reconfigurable smart distribut... by Saeed Behzadi, Amir Bagheri

    Published 2025-07-01
    “…The simulation results demonstrate the efficacy of the conducted model. According to the optimal Pareto algorithm solution, the resiliency index is guaranteed to be more than 92% in the face of LPHI disasters. …”
    Get full text
    Article
  15. 2575

    Evolutionary search algorithm for learning activation function of an artificial neural network by Yurshin Viacheslav

    Published 2025-01-01
    “…The proposed method aims to enhance the efficiency of the search process for optimal activation functions. Our algorithm employs genetic programming to evolve the general form of activation functions, while gradient descent optimizes their parameters during network training. …”
    Get full text
    Article
  16. 2576

    Use of schedule theory algorithms for task planning and time management tasks by М. Шматко, О. Жураковська

    Published 2024-10-01
    “…At the moment, there are many algorithms for solving such tasks, but the algorithms must be customized to specific conditions, while ensuring the quality of the task and performance. …”
    Get full text
    Article
  17. 2577

    Co‐Creation in Automated Public Space Lighting Design: Enhancing Safety and Reducing Light Pollution by Jan Cudzik, Michał Nessel, Victor Moczarski

    Published 2025-05-01
    “…The article presents an algorithm that iteratively determines the optimal number and placement of lamps based on expected lighting levels. …”
    Get full text
    Article
  18. 2578

    Image forgery detection algorithm based on U-shaped detection network by Zhuzhu WANG

    Published 2019-04-01
    “…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
    Get full text
    Article
  19. 2579

    Image forgery detection algorithm based on U-shaped detection network by Zhuzhu WANG

    Published 2019-04-01
    “…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
    Get full text
    Article
  20. 2580

    Packet-loss robust scalable authentication algorithm for compressed image streaming by Xiao-wei YI, Heng-tai MA, Gang ZHENG, Chang-wen ZHENG

    Published 2014-04-01
    “…To construct the authentication algorithm by hash chaining and error-correction coding, the proposed approach can realize optimizing bit-rate allocations and unequal authentication protection. …”
    Get full text
    Article