Search alternatives:
optimizer » optimize (Expand Search)
Showing 3,701 - 3,720 results of 5,934 for search '(whole OR while) optimizer algorithm', query time: 1.03s Refine Results
  1. 3701

    Self-Adjusting Look-Ahead Distance of Precision Path Tracking for High-Clearance Sprayers in Field Navigation by Xu Wang, Bo Zhang, Xintong Du, Huailin Chen, Tianwen Zhu, Chundu Wu

    Published 2025-06-01
    “…This is done based on the principle of minimizing the overall error, enabling the dynamic and adaptive optimization of the look-ahead distance within the pure pursuit algorithm. …”
    Get full text
    Article
  2. 3702

    Mixed Balanced Truncation for Reducing the Complexity of Large-Scale Electrical and Electronic System Simulations by Huy-Du Dao, Thanh-Tung Nguyen, Ngoc-Kien Vu, Van-Ta Hoang, Hong-Quang Nguyen

    Published 2025-01-01
    “…This paper proposes the Mixed Balanced Truncation (MBT) algorithm, which combines the strengths of Balanced Truncation (BT) and Positive-Real Balanced Truncation (PRBT) while addressing their respective limitations. …”
    Get full text
    Article
  3. 3703

    Maintenance Scheduling Strategy for MMCs Within an MVDC System Using Sensitivity Analysis by Tae-Yang Nam, Dong-Il Cho, Joong-Woo Shin, Kwang-Hoon Yoon, Jae-Chul Kim, Won-Sik Moon

    Published 2024-01-01
    “…The proposed algorithm optimizes the maintenance timing and priority by performing a sensitivity analysis of the system reliability indicators, from both the consumer and operator perspectives. …”
    Get full text
    Article
  4. 3704

    A hybrid blockchain-based solution for secure sharing of electronic medical record data by Gang Han, Yan Ma, Zhongliang Zhang, Yuxin Wang

    Published 2025-01-01
    “…This algorithm not only streamlines the signature process across chains but also strengthens system security and optimizes storage efficiency, addressing a key challenge in multi-chain systems. …”
    Get full text
    Article
  5. 3705

    About a Routing Problem of the Tool Motion on Sheet Cutting by A. A. Petunin, A. G. Chentsov, P. A. Chentsov

    Published 2015-04-01
    “…An optimal procedure based on the dynamic programming and an effective heuristic algorithm realized on a multicore computer are proposed. …”
    Get full text
    Article
  6. 3706

    Joint uplink and downlink resource allocation for D2D communication based on weighted bipartite graph matching and interference clustering by SHEN Bin, YUAN Wenjun, LI Xuan

    Published 2024-06-01
    “…Moreover, the transmit power of DUE was optimized to maximize the system sum rate while ensured that DUE did not cause serious interference to CUE. …”
    Get full text
    Article
  7. 3707

    Aircraft Flight Autonomous Decision-Making Method Based on Target Predicted Trajectory and Markov Decision Process by Yang Zhou, Xinmin Tang, Xuanming Ren

    Published 2024-12-01
    “…Secondly, we adopt the Markov Decision Process as the autonomous decision-making method for the own aircraft, proposing a method by which to calculate the optimal decision sequence based on the prediction scenarios of the IMM algorithm; that is, in both multi-step prediction and single-step prediction scenarios, the payoff values of different action strategies at each decision moment are calculated to obtain the optimal decision sequence. …”
    Get full text
    Article
  8. 3708

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  9. 3709

    Learned Shrinkage Approach for Low-Dose Reconstruction in Computed Tomography by Joseph Shtok, Michael Elad, Michael Zibulevsky

    Published 2013-01-01
    “…Our numerical simulations indicate that the proposed algorithm can manage well with noisy measurements, allowing a dose reduction by a factor of 4, while reducing noise and streak artifacts in the FBP reconstruction, comparable to the performance of a statistically based iterative algorithm.…”
    Get full text
    Article
  10. 3710

    WSNs data acquisition by combining expected network coverage and clustered compressed sensing. by Zhouzhou Liu, Yangmei Zhang, Yang Bi, Jingxuan Wang, Yuanyuan Hou, Chao Liu, Guangyi Jiang, Shan Li

    Published 2025-01-01
    “…Combined with an optimized network coverage algorithm, a node scheduling strategy is introduced to focus on critical observation areas while minimizing overall energy consumption. …”
    Get full text
    Article
  11. 3711

    Corrosion rate prediction for long-distance submarine pipelines based on MWIWOA-SVM by Zhengshan LUO, Haipeng LYU, Jihao LUO

    Published 2025-05-01
    “…The extended search mode was refined by integrating the simplex method, while the optimization capability of the Whale Optimization Algorithm (WOA) was enhanced with Levy flight to improve step length. …”
    Get full text
    Article
  12. 3712
  13. 3713

    Accelerated Tensor Robust Principal Component Analysis via Factorized Tensor Norm Minimization by Geunseop Lee

    Published 2025-07-01
    “…Experimental results demonstrate that our algorithm achieves significantly faster performance than existing reference methods known for efficient computation while maintaining high accuracy in recovering low-rank tensors for applications such as color image recovery and background subtraction.…”
    Get full text
    Article
  14. 3714

    Fast Processing of Massive Hyperspectral Image Anomaly Detection Based on Cloud-Edge Collaboration by Yunchang Wang, Jin Sun, Yang Xu, Zhihui Wei, Shangdong Zheng, Zebin Wu

    Published 2025-01-01
    “…With the improvement of hyperspectral image resolution, existing anomaly detection algorithms find it challenging to quickly process large volumes of hyperspectral data while fully exploiting spectral information. …”
    Get full text
    Article
  15. 3715

    A Study on Multi-ship Avoidance System for Unmanned Surface Vehicles Using the Quaternion Ship Domain and Collision Risk Index by Dong-Hun Lee, Mu-Yeong Seo, Hyo-Geun Lee, Won-Jun Yoo, Sanghyun Kim, Kwang-Jun Paik

    Published 2025-02-01
    “…This paper proposes a multi-ship collision avoidance algorithm that integrates the quaternion ship domain (QSD) and collision risk index (CRI) to assess collision risk and generate optimal avoidance trajectories. …”
    Get full text
    Article
  16. 3716

    Application of RNA-seq for single nucleotide variation identification in a cohort of patients with hypertrophic cardiomyopathy by Anastasia Chumakova, Ivan Vlasov, Elena Filatova, Anna Klass, Andrey Lysenko, Gennady Salagaev, Maria Shadrina, Petr Slominsky

    Published 2025-05-01
    “…The algorithm was evaluated and the optimal quality threshold was determined based on allelic discrimination for the rs397516037 mutation (MYBPC3 c.3697 C > T) among patients. …”
    Get full text
    Article
  17. 3717

    A Time- and Space-Integrated Expansion Planning Method for AC/DC Hybrid Distribution Networks by Yao Guo, Shaorong Wang, Dezhi Chen

    Published 2025-04-01
    “…A modified graph attention network (MGAT)-based deep reinforcement learning (DRL) algorithm is used for optimization, balancing economic and reliability objectives. …”
    Get full text
    Article
  18. 3718

    Utilizing weak graph for edge consolidation-based efficient enhancement of network robustness by Wei Ding, Zhengdan Wang

    Published 2025-05-01
    “…We compare the proposed algorithm with optimal and approximate algorithms across graphs of varying scales. …”
    Get full text
    Article
  19. 3719

    Zynq FPGA-Based Acceleration of Kernelized Correlation Filters via High-Level Synthesis of a Custom DFT Block by Enver Çavuş, Mustafa Yetiş

    Published 2024-04-01
    “…Within this framework, a custom combined DFT and inverse DFT IP, named CDFT, is developed and optimized on the Programmable Logic (PL) side of the Xilinx ZCU102 FPGA, whereas the rest of the KCF algorithm is run with customized Petalinux build on the (Processing System) side. …”
    Get full text
    Article
  20. 3720

    Local Search-Based Metaheuristic Methods for the Solid Waste Collection Problem by Haneen Algethami

    Published 2023-01-01
    “…The routing solver in the Google OR-tools solver is utilised with three well-known metaheuristic methods for neighbourhood exploration: a guided local search (GLS), a tabu search (TS), and simulated annealing (SA), with two initialisation strategies, Clarke and Wright’s algorithm and the nearest neighbour algorithm. Results showed that optimal solutions are found in faster computational times than using only an IP solver, especially for large instances. …”
    Get full text
    Article