Showing 1,761 - 1,780 results of 2,140 for search 'constraints optimization problem', query time: 0.11s Refine Results
  1. 1761

    Essential mathematics for economic analysis / by Hammond, Peter J., 1945-

    Published 2021
    View in OPAC
    Electronic eBook
  2. 1762

    Strategi Government Public Relations (GPR) Pemda DIY dalam mengelola informasi publik pasca pandemi covid-19 by Ilham Hilal Ramadhan, Eko Prasetyo Nugroho Saputro

    Published 2023-09-01
    “…The results of this study indicate that the DIY Regional Government Public Relations strategy in managing public information after pandemic Covid-19 is by 1) defining the problem, namely DIY Regional Government Public Relations identifying an issue or problem through a team of analysts tasked with analyzing issues or problems that need to be followed up, 2) program planning, namely DIY Regional Government Public Relations coordinating with the DIY Regional Secretariat Protocol Subdivision to see the latest leadership agenda schedule which then prepares a reporting team consisting of reporters, videographers, and photographers, 3) action and communication (implementation), namely the DIY Local Government Public Relations carries out live coverage and optimizes the use of online media and media mainstream as a means of dissemination of information, and 4) evaluation, namely the evaluation mechanism for Public Relations of the DIY Regional Government does not yet have good evaluation standards in managing public relations activities. …”
    Get full text
    Article
  3. 1763

    Result aggregation algorithm based on differential evolution and Top-k ranking in learning Worker’s weight by Yuping XING, Yongzhao ZHAN

    Published 2021-01-01
    “…To solve the problem of quickly obtaining the optimal ranking result in the crowdsourcing result aggregation, an efficient and effective aggregation algorithm of Worker’s weight was proposed.The Worker’s weight optimization model based on differential evolution algorithm focused on the uncertainties and differences of Workers completing ranking tasks, the uncertainties and differences were reflected in the objective function and constraint conditions of the model.This model obtained the optimal weight of candidate results, and maximized the matching between Worker’s weight and result performance.Then, the optimization model solving method based on Top-k ranking was proposed to quickly obtain the optimal Worker’s weight with the appropriate k value for specific multi-data items ranking scenario.The optimization of Worker’s weight could realize optimized performance and speed of the result aggregation.The correctness of the algorithm is verified by qualitative analysis, the effectiveness and efficiency of the algorithm is verified by the simulation results, and the comparison with the relevant algorithms shows the optimal comprehensive performance of the algorithm.…”
    Get full text
    Article
  4. 1764

    Implementation strategy of telecom operators’ data lake technology by Junjun HU, Xiaojun XIE, Yanbin SHI, Qi YU

    Published 2019-02-01
    “…Firstly,the traditional data architecture of telecom operators was analyzed and the problems such as low quality,lack of real-time,lack of flexibility and mutual constraints of storage and application were identified.Then,the feasibility of introducing data lake technology was discussed,the storage scale and low cost of data lake,the originality of data and ease of use,and the application of on-demand modeling were clarified,which could provide great benefits for telecom operators’ data architecture optimization.Finally,the data lake construction plan of unified storage,unified standards,near-source acquisition,and application separation was proposed,and key points such as data lake data partitioning,deployment,lake entry and application data dynamic loading,and unified data management were clearly stated.…”
    Get full text
    Article
  5. 1765

    Implementation strategy of telecom operators’ data lake technology by Junjun HU, Xiaojun XIE, Yanbin SHI, Qi YU

    Published 2019-02-01
    “…Firstly,the traditional data architecture of telecom operators was analyzed and the problems such as low quality,lack of real-time,lack of flexibility and mutual constraints of storage and application were identified.Then,the feasibility of introducing data lake technology was discussed,the storage scale and low cost of data lake,the originality of data and ease of use,and the application of on-demand modeling were clarified,which could provide great benefits for telecom operators’ data architecture optimization.Finally,the data lake construction plan of unified storage,unified standards,near-source acquisition,and application separation was proposed,and key points such as data lake data partitioning,deployment,lake entry and application data dynamic loading,and unified data management were clearly stated.…”
    Get full text
    Article
  6. 1766

    A Novel Mixed-Precision Quantization Approach for CNNs by Dan Wu, Yanzhi Wang, Yuqi Fei, Guowang Gao

    Published 2025-01-01
    “…It finally adds the conditional constraints to trade-off the training loss of the network and the time complexity of the model. …”
    Get full text
    Article
  7. 1767

    Automatic collaborative water surface coverage and cleaning strategy of UAV and USVs by Tianping Deng, Xiaohui Xu, Zeyan Ding, Xiao Xiao, Ming Zhu, Kai Peng

    Published 2025-04-01
    “…As the problem of surface garbage pollution becomes more serious, it is necessary to improve the efficiency of garbage inspection and picking rather than traditional manual methods. …”
    Get full text
    Article
  8. 1768

    DepthRL: a weakly supervised approach for monocular depth estimation using deep reinforcement learning by Han Chen, Yongxiong Wang, Jiayi Zhang, Jiapeng Zhang, Zhiqun Pan, Shuwen Jia, Shuai Huang

    Published 2025-06-01
    “…Unlike conventional methods, we reframe depth estimation as an optimization problem, utilizing reinforcement learning to determine the optimal policy for accurate depth prediction without the need for dense annotations. …”
    Get full text
    Article
  9. 1769

    Energy-Efficient Online Path Planning for Internet of Drones Using Reinforcement Learning by Zainab AlMania, Tarek Sheltami, Gamil Ahmed, Ashraf Mahmoud, Abdulaziz Barnawi

    Published 2024-08-01
    “…The improved particle swarm optimization with reinforcement learning (IPSO-RL) framework is designed to tackle the multi-UAV path planning problem in a fully distributed and reactive manner. …”
    Get full text
    Article
  10. 1770

    Machine Learning to Select Experiments Driven by Fundamental Science and Applications for Targeted Nuclear Data Improvement by D. Neudecker, T. E. Cutler, M. Devlin, P. Brain, N. Gibson, M. J. Grosskopf, M. W. Herman, J. Hutchinson, T. Kawano, A. Khatiwada, N. Kleedtke, E. Leal-Cidoncha, R. C. Little, A. E. Lovell, A. Stamatopoulos, E. C. Thompson, S. A. Vander Wiel, E. Williamson

    Published 2025-06-01
    “…Answering this question entails solving a high-dimensional and complex optimization problem that is best solved with advanced statistic techniques often classified as machine learning. …”
    Get full text
    Article
  11. 1771

    Microgrid modernization using exponential decentralized consensus-based energy assessment by considering renewable generation uncertainties and operational price analysis by Ijaz Ahmed, Muhammad Rehan, Mohammed Alqahtani, Muhammad Khalid

    Published 2025-09-01
    “…This work investigates a decentralized optimization technique under a directed communication network for decentralized agents to solve the economic dispatch problem (EDP) under uncertain renewable sources via an exponential approach. …”
    Get full text
    Article
  12. 1772

    A two-stage model of the fuzzy analytic hierarchy process and the fuzzy synthetic evaluation technique to prioritize sustainable sanitation services under uncertainty by Shaher Zyoud, Siwar M. Omair, Susan A. Jarrad

    Published 2025-01-01
    “…The socioeconomic context is valued at 5.10%, geographical constraints at 4.51%, and license constraints at 4.8%. …”
    Get full text
    Article
  13. 1773

    Adaptive bandwidth allocation algorithm based on the multi-threshold reservation mechanism by Geng CHEN, Wei-wei XIA, Lian-feng SHEN

    Published 2014-12-01
    “…An adaptive bandwidth allocation algorithm based on multi-threshold reservation mechanism is proposed to guarantee the quality of service (QoS) of multi-services in heterogeneous wireless networks.With the bandwidth reserva-tion mechanism by setting multi-threshold in each network for every traffic,the adaptive bandwidth allocation scheme according to the transmission rate levels requirements for traffic k and the network status can be formulated as an optimal problem with the constraints of the bandwidth allocation matrix for each traffic and all users based on the multi-homing technology.A procedure of the iterative method is presented to solve the optimal problem of the formulated adaptive bandwidth allocation scheme.The optimized bandwidth allocation matrixes for traffics and for all users are obtained for the real-time network throughput maximization under bandwidth reserving thresholds and network capacity constrains and the bandwidth resource utilization efficiency of heterogeneous wireless network can be increased.Numerical simula-tion results show that the proposed algorithm can support QoS requiring transmission rate grades,decrease the new call blocking probability,increase the average user access rate and improve the network throughput of the heterogeneous wireless network by 40% to the largest extent.…”
    Get full text
    Article
  14. 1774
  15. 1775
  16. 1776

    User preference–based QoS-aware service function placement in IoT-Edge cloud by Briytone Mutichiro, Younghan Kim

    Published 2021-05-01
    “…For this, several parameters, and factors such as capacity, latency, workload, and cost constraints, are considered. The proposed solutions are evaluated based on different metrics and the obtained results show the gap between the heuristic user preference placement algorithm and the optimal solution to be minimal.…”
    Get full text
    Article
  17. 1777

    Research on hanging load control method for collaborative suspension of multi-rotor UAV by LU Xiangyang, REN Xianglong, XUE Jiuhui

    Published 2025-04-01
    “…Udwadia-Kalaba(U-K equation)is an effective attempt to solve the problem of cooperative load transport of rotorcraft by modeling the cooperative flight control of rotorcraft by treating the constraint conditions. …”
    Get full text
    Article
  18. 1778

    Application of Algorithms of Constrained Fuzzy Models in Economic Management by Lingyan Meng, Dishi Zhu

    Published 2021-01-01
    “…The results of the empirical analysis show that the existence of basis constraints affects investors’ investment strategies as well as their final returns, but there is a limit to the influence of basis constraints on portfolio performance, and investors can obtain optimal investment returns by selecting a reasonable number of securities to form a portfolio based on the characteristics of different securities.…”
    Get full text
    Article
  19. 1779

    Evaluating Alternative Investment Options for Grinding Machines Using the Incremental Cost Method by Fatayaturrokhma Ilmala Arifah, Endang Chumaidiyah, Nanang Suryana

    Published 2025-03-01
    “…To address this problem, an investment in an additional grinding machine is proposed. …”
    Get full text
    Article
  20. 1780

    Secure transmission for NOMA downlink based on short packet communication by Gangcan SUN, Shaoke ZHAO, Wanming HAO, Zhengyu ZHU

    Published 2021-02-01
    “…For the low-latency requirements of Internet of things (IoT) business, short packet communication (SPC) and non-orthogonal multiple access (NOMA) were combined to study the problem of secure transmission in the multi-user NOMA system with eavesdroppers.With the maximizing the secure throughput of weak uses as the objective, considering the user decoding error probability constraint, total power constraint and power allocation constraint, a low-complexity power allocation algorithm was proposed to realize secure transmission.In order to solve the problem caused by complex objective function formula and unreliable serial interference cancellation (SIC) technology, the proof that the compactness of the constraints was necessary to find the optimal solution.Under the constraint of maximum decoding error probability, the power constraint was transformed and calculated to obtain the strict limit of transmitting power for strong users, and the transmit power search set from base station to strong user was derived.Then, the one-dimensional search algorithm was used to allocate power resources to maximize the throughput of weak users.Simulation results prove that the proposed algorithm can effectively improve the security throughput of weak users in the system.…”
    Get full text
    Article