Search alternatives:
optimizer » optimize (Expand Search)
Showing 3,601 - 3,620 results of 5,934 for search '(whole OR while) optimizer algorithm', query time: 0.19s Refine Results
  1. 3601

    Low power IoT device communication through hybrid AES-RSA encryption in MRA mode by Qiang Chang, Tianqi Ma, Wenzhong Yang

    Published 2025-04-01
    “…The enhanced RSA algorithm replaces the traditional dual-prime system with a triple-prime system, increasing the number of primes while reducing the bit length of each prime. …”
    Get full text
    Article
  2. 3602

    Enhanced flux potential analysis links changes in enzyme expression to metabolic flux by Xuhang Li, Albertha J M Walhout, L Safak Yilmaz

    Published 2025-02-01
    “…Our approach outperforms alternatives by striking an optimal balance, evaluating enzyme expression at pathway level, rather than either single-reaction or whole-network levels.…”
    Get full text
    Article
  3. 3603

    Research on Channel Modeling and Communication Coverage of Wireless Sensor Networks in Barrier Area of Nuclear Power Plants by Zhi-Guang Deng, Qian Wu, Xin Lv, Bi-Wei Zhu, Mei-Qiong Xiang, Xue-Mei Wang, Jia-Liang Zhu

    Published 2022-01-01
    “…The simulation results show that the improved teaching and learning algorithm can optimize the network coverage of the obstacle area well, and under the four obstacle modules, 14 nodes can cover the whole area by more than 99%. …”
    Get full text
    Article
  4. 3604

    DETERMINATION OF TEMPERATURE-TIME PARAMETERS OF GROWING SINGLE CRYSTALS β-BaB<sub>2</sub>O<sub>4</sub> BY MODIFIED CZOCHRALSKI METHOD by S. A. Guretskii, I. M. Kolesova, A. V. Kravtsov, A. A. Linkevish, K. L. Trukhanava, V. B. Malyutin, V. L. Kolpashikov, S. YU. Yanovsky

    Published 2019-06-01
    “…The aim of this work is to find of the mechanism the determination of optimal temperature-time mode of crystallization during the whole process of β-BaB2O4 crystal growth by modified Czochralski method. …”
    Get full text
    Article
  5. 3605

    Structure Design and Finite Element Analysis of a Rope Traction Upper Limb Rehabilitation Robot by Yu Junwei, Xu Hongbin, Xu Taojin, Zheng Chengjie, Lu Shiqing

    Published 2018-01-01
    “…The result shows that the total mass of support frame after optimization is comparatively 48% less than before. At the same time,the inherent characteristic of the whole frame is obtained,which is prepared for the later control strategy.…”
    Get full text
    Article
  6. 3606

    Simulation and test study of transmission characteristics of V-shaped rubber belt CVT by TIAN Zhewen, TIAN Hao, CHEN Shuoyan

    Published 2025-06-01
    “…ObjectiveThe dynamic matching problem of continuously variable transmission (CVT) with the engine and Baja racing car was subjected to research analysis.MethodsThe parameters of key components of CVT were first optimized by genetic algorithm in Matlab software, then the dynamic modeling and simulation of CVT and the whole vehicle were carried out in Matlab/Simulink and RecurDyn, and finally the vehicle test was carried out on the chassis dynamometer.ResultsThe results of modeling simulation and vehicle test show that the dynamic index of Baja racing car is significantly improved after the optimization of the parameters of key components of CVT. …”
    Get full text
    Article
  7. 3607

    Detection of soluble solid content in table grapes during storage based on visible-near-infrared spectroscopy by Yuan Su, Ke He, Wenzheng Liu, Jin Li, Keying Hou, Shengyun Lv, Xiaowei He

    Published 2025-01-01
    “…Comparing the modelling results derived from whole-band spectral data with those obtained from selected spectral variables, the optimal spectral prediction model was formulated utilizing PLSR. …”
    Get full text
    Article
  8. 3608

    Anomaly detection of large scale network based on data streams by ZHENG Jun, HU Ming-zeng, YUN Xiao-chun, ZHENG Zhong

    Published 2006-01-01
    “…The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.A novel monitoring mechanism of LSN anomaly detection based on the data stream approach was proposed.The main contributions included: the sketch data structure and the frequent sketch algorithm of data streams were designed for anomaly detection of LSN.Optimized query methods were designed for customizing the security monitoring and detection policy with the correlations of multi data streams.The data reduction was proposed to make it possible that the whole network traffic character could be got using a few of special data streams.The experiments of the real networking environments validate the effectivity of LSN anomaly detection methods.…”
    Get full text
    Article
  9. 3609

    Assigning Priorities for Fixed Priority Preemption Threshold Scheduling by Saehwa Kim

    Published 2015-01-01
    “…This paper analyzes the inefficiency or nonoptimality of the previously proposed optimal priority assignment algorithms for PTS. We develop theorems for exhaustively but safely pruning infeasible priority orderings while assigning priorities to tasks for PTS. …”
    Get full text
    Article
  10. 3610

    Clustering-based energy-aware virtual network embedding by Xu Liu, Zhongbao Zhang, Junning Li, Sen Su

    Published 2017-08-01
    “…Extensive simulations demonstrate that this algorithm significantly reduces the energy cost by up to 14% over the state-of-the-art algorithm while maintaining similar revenue.…”
    Get full text
    Article
  11. 3611

    Improving total bone marrow and lymphoid irradiation: feasibility of intensity-modulated proton therapy (IMPT) and dosimetric comparison with helical tomotherapy (HT) by Dayananda Shamurailatpam Sharma, Arjunan Manikandan, Gaganpreet Singh, Sanjib Gayen, Sham Sundar, Aishwarya G, Rangasamy S, Mahammood Suhail, Rajesh S, Ganapathy Krishnan, Revathi Raj, Srinivas Chilukuri, Jose Easow, Rakesh Jalali

    Published 2025-05-01
    “…Dosimetric benefits were compared to HT, safety and accuracy were verified using an in-house algorithm and planar dosage measurement. Results The average cranio-caudal and lateral whole-body PTV dimensions were 169.24 cm and 46.41 cm for five adults; 95.2 cm and 28.86 cm for one pediatric patient. …”
    Get full text
    Article
  12. 3612

    Zero-shot classification with multi-model information interaction and its application in Mars exploration scenarios by TAN Xiaomeng, XI Bobo, XUE Changbin, LI Yunsong

    Published 2025-05-01
    “…To address the issue that traditional Mars image classification methods based on images do not perform well in the face of the complex and unknown environment of Mars and the frequent occurrence of unseen categories, a zero-shot classification algorithm of multi-modal information interaction was studied and the migration and optimization of the algorithm to the field of deep space exploration was explored. …”
    Get full text
    Article
  13. 3613

    Angular Stabilization of a Multirotor Aircraft in Venus’ Atmosphere by Vladislav V. Ryzhkov

    Published 2025-07-01
    “…The developed stabilization algorithm can be applied to aerial vehicles operating in complex atmospheric conditions, including strong disturbances typical of the Venus cloud layer.…”
    Get full text
    Article
  14. 3614

    Improved sequence-based localization applied in coal mine by Mingzhi Song, Jiansheng Qian

    Published 2016-11-01
    “…Sequence–centroid localization contributes to improving this issue, but the location error on the boundary of whole area is unsatisfactory as well. This article proposes an improved sequence-based localization method which is integrated with quantum-behaved particle swarm optimization, as quantum-behaved particle swarm optimization makes good use of the search performance of global optimal solution. …”
    Get full text
    Article
  15. 3615

    3D Voxel-based Collaborative Path Planning for UAVs in Urban Emergency Response by Z. Wu, Z. Wang, W. Xie, Z. Lin, Y. Wu, Y. Mo

    Published 2025-08-01
    “…For local coverage, an improved Boustrophedon Cell Decomposition (BCD) algorithm is introduced, tailored for UAV operations, while global coverage is addressed through a multi-traveling salesman problem (MTSP) approach, optimized using the Jump Point Search (JPS) algorithm and Genetic Algorithm (GA). …”
    Get full text
    Article
  16. 3616

    Reconfigurable and Scalable Artificial Intelligence Acceleration Hardware Architecture With RISC-V CNN Coprocessor for Real-Time Seizure Detection by Shuenn-Yuh Lee, Ming-Yueh Ku, Sing-Yu Pan, Chou-Ching Lin

    Published 2025-01-01
    “…This study proposes a seizure detection algorithm to identify a seizure attack with EEG. This algorithm includes a simplified signal preprocessor and a nearly optimized convolutional neural network (CNN). …”
    Get full text
    Article
  17. 3617

    Research on Hybrid Architecture Neural Networks for Time Series Prediction by Fujin Zhuang, Xiao Chen, Punyaphol Horata, Khamron Sunat

    Published 2025-01-01
    “…This multi-module collaborative architecture effectively processes multi-scale features of time series data while providing model interpretability. Through comparative analysis of various optimization algorithms&#x2019; convergence performance and prediction accuracy, this study found that the AdamW optimizer, with its effective weight decay mechanism and adaptive learning rate, demonstrated superior performance in training stability and generalization capability, with MSE and R2 metrics outperforming traditional optimizers. …”
    Get full text
    Article
  18. 3618

    An Effective Heuristic-Based Approach for Partitioning by Xibin Zhao, Hehua Zhang, Yu Jiang, Songzheng Song, Xun Jiao, Ming Gu

    Published 2013-01-01
    “…We note that the genetic algorithm has a strong global search capability, while the simulated annealing algorithm will fail in a local optimal solution easily. …”
    Get full text
    Article
  19. 3619

    Anomaly detection of large scale network based on data streams by ZHENG Jun, HU Ming-zeng, YUN Xiao-chun, ZHENG Zhong

    Published 2006-01-01
    “…The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.A novel monitoring mechanism of LSN anomaly detection based on the data stream approach was proposed.The main contributions included: the sketch data structure and the frequent sketch algorithm of data streams were designed for anomaly detection of LSN.Optimized query methods were designed for customizing the security monitoring and detection policy with the correlations of multi data streams.The data reduction was proposed to make it possible that the whole network traffic character could be got using a few of special data streams.The experiments of the real networking environments validate the effectivity of LSN anomaly detection methods.…”
    Get full text
    Article
  20. 3620

    Research on High-Reliability Energy-Aware Scheduling Strategy for Heterogeneous Distributed Systems by Ziyu Chen, Jing Wu, Lin Cheng, Tao Tao

    Published 2025-06-01
    “…Second, to address the time-varying reliability characteristics introduced by DVFS, we propose a Fibonacci search-based dynamic frequency scaling algorithm (SEFFA). This algorithm effectively reduces energy consumption while ensuring task reliability, achieving sub-optimal processor energy adjustment. …”
    Get full text
    Article