Showing 4,221 - 4,240 results of 5,934 for search '(whole OR while) optimization algorithm', query time: 0.18s Refine Results
  1. 4221

    Local Search-Based Metaheuristic Methods for the Solid Waste Collection Problem by Haneen Algethami

    Published 2023-01-01
    “…The routing solver in the Google OR-tools solver is utilised with three well-known metaheuristic methods for neighbourhood exploration: a guided local search (GLS), a tabu search (TS), and simulated annealing (SA), with two initialisation strategies, Clarke and Wright’s algorithm and the nearest neighbour algorithm. Results showed that optimal solutions are found in faster computational times than using only an IP solver, especially for large instances. …”
    Get full text
    Article
  2. 4222

    Application of RNA-seq for single nucleotide variation identification in a cohort of patients with hypertrophic cardiomyopathy by Anastasia Chumakova, Ivan Vlasov, Elena Filatova, Anna Klass, Andrey Lysenko, Gennady Salagaev, Maria Shadrina, Petr Slominsky

    Published 2025-05-01
    “…The algorithm was evaluated and the optimal quality threshold was determined based on allelic discrimination for the rs397516037 mutation (MYBPC3 c.3697 C > T) among patients. …”
    Get full text
    Article
  3. 4223

    Research on GNNs with stable learning by Wenbin Li, Wenxuan Wei, Peiyang Wang, Li Pan, Bo Yang, Yanling Xu

    Published 2025-08-01
    “…The aim is to extract genuine causal features while eliminating spurious causal features. By introducing a feature sample weighting decorrelation technique in the random Fourier transform space and combining it with a baseline GNN model, a Stable-GNN model and a constrained sampling weight gradient update algorithm are designed. …”
    Get full text
    Article
  4. 4224

    Generalized Singular Value Decomposition-Based Secure Beam Hybrid Precoding for Millimeter Wave Massive Multiple-Input Multiple-Output Systems by Boqing Chen, Lijun Yang, Meng Wu

    Published 2025-04-01
    “…In a hybrid precoding system, the low-complexity GSVD-Sparsity algorithm can achieve a spectral efficiency close to that of the GSVD-based scheme in a fully digital system while maintaining anti-eavesdropping capabilities.…”
    Get full text
    Article
  5. 4225

    Key Nodes Identification Method in Scale-Free Network Based on Structural Holes by Weiyan Liu

    Published 2025-01-01
    “…The proposed algorithm achieves higher accuracy in structural hole-aware ranking compared to benchmarks while maintaining <inline-formula> <tex-math notation="LaTeX">${ O}\left ({{ m+n.logn }}\right)$ </tex-math></inline-formula> complexity. …”
    Get full text
    Article
  6. 4226

    Adaptive dimensionality reduction for neural network-based online principal component analysis. by Nico Migenda, Ralf Möller, Wolfram Schenck

    Published 2021-01-01
    “…While the continuous update of the principal components is widely studied, the available algorithms for dimensionality adjustment are limited to an increment of one in neural network-based and incremental PCA. …”
    Get full text
    Article
  7. 4227

    A Lightweight, Intelligent Autonomous Exploration System for Indoor Robots Using Improved Random Walk With Back-Off Strategies by Blesson Mathews Luke, S. Abraham Sampson

    Published 2025-01-01
    “…The algorithm maintained a reliable average localization error of 0.005 m while exhibiting memory efficiency by the reduced memory usage by up to 13.7% relative to TB3. …”
    Get full text
    Article
  8. 4228

    Implementing Remote Radiotherapy Planning to Increase Patient Flow at a Johannesburg Academic Hospital, South Africa: Protocol for a Prospective Feasibility Study by Duvern Ramiah, Sonwabile Ngcezu, Oluwatosin Ayeni, Okechinyere Achilonu, Mariam Adeleke, Theo Nair, Joseph Otten, Daniel Mmereki

    Published 2025-07-01
    “…Phase 1 (feasibility) encompasses system commissioning, including beam modeling, computed tomography (CT)-to-electron density calibration, multileaf collimator (MLC) optimization, and dose calculations using the anisotropic analytical algorithm. …”
    Get full text
    Article
  9. 4229

    Machine learning assisted estimation of total solids content of drilling fluids by B.T. Gunel, Y.D. Pak, A.Ö. Herekeli, S. Gül, B. Kulga, E. Artun

    Published 2025-12-01
    “…While a standard retort test can take approximately 2 h at the rig site, such kind of real-time estimations can help the rig personnel to timely optimize drilling fluids, with a potential of saving 2920 man-hours in a given year for a single drilling rig.…”
    Get full text
    Article
  10. 4230

    Energy efficient control of indoor environments under time-varying multi-parameter uncertainty by Jianhao ZHAO, Hua SONG, Xinyuan NAN, Xin CAI

    Published 2024-12-01
    “…Prioritized experience replay (PER) in DDPG is used to rationally and optimally control the power of the equipment for indoor air quality (IAQ) and thermal comfort. …”
    Get full text
    Article
  11. 4231

    Online Autonomous Motion Control of Communication-Relay UAV with Channel Prediction in Dynamic Urban Environments by Cancan Tao, Bowen Liu

    Published 2024-12-01
    “…The method mainly consists of two parts: wireless channel parameter estimation and optimal relay position search. Considering that in practical applications, the radio frequency (RF) channel parameters in complex urban environments are difficult to obtain in advance and are constantly changing, an estimation algorithm based on Gaussian process learning is proposed for online evaluation of the wireless channel parameters near the current position of the UAV; for the optimal relay position search problem, in order to improve the real-time performance of the method, a line search algorithm and a general gradient-based algorithm are proposed, which are used for point-to-point communication and multi-node communication scenarios, respectively, reducing the two-dimensional search to a one-dimensional search, and the stability proof and convergence conditions of the algorithm are given. …”
    Get full text
    Article
  12. 4232

    Three-Dimensional in Vivo Imaging of Green Fluorescent Protein-Expressing T Cells in Mice with Noncontact Fluorescence Molecular Tomography by Anikitos Garofalakis, Giannis Zacharakis, Heiko Meyer, Eleftherios N. Economou, Clio Mamalaki, Joseph Papamatheakis, Dimitris Kioussis, Vasilis Ntziachristos, Jorge Ripoll

    Published 2007-03-01
    “…Given that optical tomography is capable of quantitatively imaging the distribution of several important chromophores and fluorophores in vivo, there has been a great deal of interest in developing optical imaging systems with increased numbers of measurements under optimal experimental conditions. In this article, we present a novel system that enables three-dimensional imaging of fluorescent probes in whole animals using a noncontact setup, in parallel with a three-dimensional surface reconstruction algorithm. …”
    Get full text
    Article
  13. 4233

    A Novel Nonlinear Adaptive Control Method for Longitudinal Speed Control for Four-Independent-Wheel Autonomous Vehicles by Jinhua Zhang, Zhenghao Chen, Jinshi Yu

    Published 2024-11-01
    “…Based on the design of the upper controller, an innovative optimized longitudinal force distribution strategy and the construction of a tire reverse longitudinal slip model are proposed, followed by the design of a fuzzy PID controller as the lower slip ratio controller to achieve precise whole-vehicle longitudinal speed tracking and improve overall control performance. …”
    Get full text
    Article
  14. 4234

    Unmanned aerial vehicle field sampling and antenna pattern reconstruction using Bayesian compressed sensing by Sayeh Mirzaei, Alireza Gholipour

    Published 2019-06-01
    “…Performing onsite measurements by scanning the whole 4π [sr] solid angle around the antenna under test (AUT) is more complicated. …”
    Get full text
    Article
  15. 4235

    Surrogate modeling of passive microwave circuits using recurrent neural networks and domain confinement by Kaustab C. Sahu, Slawomir Koziel, Anna Pietrenko-Dabrowska

    Published 2025-04-01
    “…The proposed procedure ensures building models of outstanding predictive power while using small training datasets, which is beyond the capabilities of benchmark algorithms.…”
    Get full text
    Article
  16. 4236

    Weighted Hybrid Random Forest Model for Significant Feature prediction in Alzheimer’s Disease Stages by M. Rohini, D. Surendran

    Published 2025-03-01
    “…Thus, the proposed Weighted Hybrid Random Forest algorithm (WHBM) utilized the 63 features that comprise the whole brain volume. …”
    Get full text
    Article
  17. 4237

    A global object-oriented dynamic network for low-altitude remote sensing object detection by Daoze Tang, Shuyun Tang, Yalin Wang, Shaoyun Guan, Yining Jin

    Published 2025-05-01
    “…This study introduces the Global Object-Oriented Dynamic Network (GOOD-Net) algorithm, comprising three fundamental components: an object-oriented, dynamically adaptive backbone network; a neck network designed to optimize the utilization of global information; and a task-specific processing head augmented for detailed feature refinement. …”
    Get full text
    Article
  18. 4238

    A seismic random noise suppression method based on CNN-Mamba by Xiujuan WEI, Xingye LIU, Huailai ZHOU

    Published 2025-05-01
    “…The hardware-aware parallel algorithm of Mamba was employed to reduce the computational resource consumption, thus ensuring the denoising performance while enhancing computational efficiency. …”
    Get full text
    Article
  19. 4239

    IoT intrusion detection method for unbalanced samples by ANTONG P, Wen CHEN, Lifa WU

    Published 2023-02-01
    “…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
    Get full text
    Article
  20. 4240

    Efficient multiplication for finite fields of p characteristic by LI Yin 1, CHEN Gong-liang1, LI Jian-hua1

    Published 2009-01-01
    “…Based on residue arithmetic,a new form of polynomial named PAPB in Fp[x] had been constructed.The amount and distribution of such irreducible polynomials had also been investigated.Then,an efficient algorithm for multiplication modulo PAPB had been proposed using residue arithmetic and Chinese remainder theorem.In the end,the result analysis was given.The theoretic analysis and simulation experiment show that for some finite field of medium prime characteristic,the given algorithm only costs O(k1.5) operations in Fp while the multiplication modulo irreducible binomial cost O(k2) operations,which shows a better performance.As a result,the work presents an interesting perspective for optimal extension field and elliptic curve cryptography.…”
    Get full text
    Article