Showing 2,021 - 2,040 results of 3,047 for search 'improve while optimization algorithm', query time: 0.21s Refine Results
  1. 2021

    Connected Transit Bus Dynamic Priority Weight Modeling and Conflicting Request Resolution Control at the Signalized Intersection by Shuxian He, Haihang Han, Huan Zhang, Shanzhi Sun, Tony Z. Qiu

    Published 2022-01-01
    “…What is more, it shows better delay optimization for social vehicles than the algorithm with delay as the objective while declining bus delay appreciable quantity with 43.4 s in average. …”
    Get full text
    Article
  2. 2022

    Effect of Voltage Dependent Load Model on Placement and Sizing of Distributed Generator in Large Scale Distribution System by Gopisetti Manikanta, Ashish Mani, Hemender Pal Singh, Devendra Kumar Chaturvedi

    Published 2024-02-01
    “…In addition to AQiEA, four other algorithms (Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Gravitational Search Algorithm (GSA), Grey Wolf Optimization (GWO), and Ecogeography-based Optimization (EBO) with Classification based on Multiple Association Rules (CMAR)) have also been employed for comparison. …”
    Get full text
    Article
  3. 2023

    Microgrid system for electric vehicle charging stations integrated with renewable energy sources using a hybrid DOA–SBNN approach by Kommoju Naga Durga Veera Sai Eswar, M. Arun Noyal Doss, Mohammad Shorfuzzaman, Ali Elrashidi

    Published 2025-01-01
    “…In addition to supporting eco-friendly mobility, the technology lowers grid dependency and improves energy reliability. The manuscript introduces a hybrid technique for efficient electric vehicle (EV) charging integrating the Dollmaker Optimization algorithm (DOA) and spatial Bayesian neural network (SBNN). …”
    Get full text
    Article
  4. 2024

    Urban Land-use Features Mapping from LiDAR and Remote Sensing Images using Visual Transformer Network Model by Q. Yuan

    Published 2025-03-01
    “…Finally, it is found that the proposed algorithm is generally better than other representative methods, and the classification accuracy using remote sensing data and LiDAR is improved. …”
    Get full text
    Article
  5. 2025

    Reinforcement learning-based assimilation of the WOFOST crop model by Haochong Chen, Xiangning Yuan, Jian Kang, Danni Yang, Tianyi Yang, Xiang Ao, Sien Li

    Published 2024-12-01
    “…Our results demonstrate that the Time-Series Driven RL model achieved assimilation accuracy comparable to the SUBPLEX optimization algorithm, with an average MAE of 0.65 compared to 0.76 for SUBPLEX, and a slight decrease in RMSE, while significantly reducing the computational burden by 365 times. …”
    Get full text
    Article
  6. 2026

    Quantum circuit unoptimization by Yusei Mori, Hideaki Hakoshima, Kyohei Sudo, Toshio Mori, Kosuke Mitarai, Keisuke Fujii

    Published 2025-05-01
    “…In this paper, we define and construct a quantum algorithmic primitive called quantum circuit unoptimization, which makes a given quantum circuit complex by introducing some redundancies while preserving circuit equivalence, i.e., the inverse operation of circuit optimization. …”
    Get full text
    Article
  7. 2027

    CFTformer: End-to-End Cross-Frame Multi-Object Tracking With Transformer by Abdollah Amirkhani, Seyed Alireza Khoshnevis

    Published 2025-01-01
    “…Overall, the model was able to achieve 1.7% and 0.6% improvement in the identification F1 score (IDF1) metric on MOT17 and MOT20 datasets while having ~0-15% lower number of identity switches, compared to other transformer-based approaches. …”
    Get full text
    Article
  8. 2028

    RIM-Net: A Real-Imaginary-Magnitude Network for NLOS/LOS Identification in UWB Indoor Positioning Systems by Jiacheng Ni, Fang Li, Shuai Cao, Linsong Li

    Published 2025-01-01
    “…Furthermore, the optimization of the TOA algorithm validated the effectiveness of RIM-Net in localization, achieving an average performance improvement of 9.66%. …”
    Get full text
    Article
  9. 2029

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  10. 2030

    Protein docking by the underestimation of free energy funnels in the space of encounter complexes. by Yang Shen, Ioannis Ch Paschalidis, Pirooz Vakili, Sandor Vajda

    Published 2008-10-01
    “…We describe a docking method based on stochastic global minimization of funnel-shaped energy functions in the space of rigid body motions (SE(3)) while accounting for flexibility of the interface side chains. …”
    Get full text
    Article
  11. 2031

    Privacy-Oriented Successive Approximation Image Position Follower Processing by Ying Miao, Danyang Shao, Zhimin Yan

    Published 2021-01-01
    “…The algorithm solves the problems of lack of scale estimation of KCF algorithm and low real-time rate of DSST algorithm and improves the tracking accuracy while ensuring the real-time performance of the algorithm.…”
    Get full text
    Article
  12. 2032

    Computational design exploration of rocket nozzle using deep reinforcement learning by Aagashram Neelakandan, Arockia Selvakumar Arockia Doss, Natrayan Lakshmaiya

    Published 2025-03-01
    “…Additionally, the use of the Single-Step Proximal Policy Optimization (SSPPO) algorithm enhances the exploration of nozzle geometries by maximizing aerodynamic performance while balancing computational efficiency. …”
    Get full text
    Article
  13. 2033

    Fairness-Aware Computation Offloading for Mobile Edge Computing With Energy Harvesting by Dedi Triyanto, I. Wayan Mustika, Widyawan, Praphan Pavarangkoon

    Published 2025-01-01
    “…This research formulates the Fairness-aware Computation Offloading Optimization (FACOO) algorithm. The Lyapunov approach and sequential least squares quadratic programming (SLSQP) are used to ascertain the best offloading ratio, transmission power, and CPU frequency while complying with signal-to-interference-plus-noise ratio (SINR) limitations. …”
    Get full text
    Article
  14. 2034

    A novel mechanism-guided residual network for accurate modelling of scroll expander under noisy and sparse data conditions by Xiaoshuang Lv, Xin Ma, Wei Peng, Ke Li, Chengdong Li

    Published 2025-08-01
    “…This framework is based on the architecture of residual network, where the mechanistic laws are embedded as constraints in the training of the network through an improved loss function. Then, a hybrid optimization algorithm is detailed, which can achieve efficient and accurate updating of the parameters of the network and mechanistic equations. …”
    Get full text
    Article
  15. 2035

    A Distributed Resilience Enhancement Strategy for Multi-microgrids Based on System of Systems Architecture by Linxinyan LIN, Junpeng ZHU, Yue YUAN

    Published 2023-12-01
    “…Firstly, the energy exchange process of the multi-microgrid systems is modeled based on the SoS architecture, and the distributed optimization algorithm is used to solve the model, which ensures the privacy of user information. …”
    Get full text
    Article
  16. 2036

    Online Autonomous Motion Control of Communication-Relay UAV with Channel Prediction in Dynamic Urban Environments by Cancan Tao, Bowen Liu

    Published 2024-12-01
    “…Comparative experiments and simulation results under different scenarios show that the proposed motion-control method can drive the UAV to reach or track the optimal relay position and improve the network performance, while demonstrating that it is beneficial to consider the impact of the environments on the channel characteristics.…”
    Get full text
    Article
  17. 2037

    Tent–PSO-Based Unmanned Aerial Vehicle Path Planning for Cooperative Relay Networks in Dynamic User Environments by Shuyue Liu, Wenmao Zhou, Mingwei Qin, Xin Peng

    Published 2025-03-01
    “…The proper planning of UAV paths can improve user coverage while maintaining communication quality. …”
    Get full text
    Article
  18. 2038

    Hybrid Damping Mode MR Damper: Development and Experimental Validation with Semi-Active Control by Jeongwoo Lee, Kwangseok Oh

    Published 2025-05-01
    “…This configuration supports four damping modes—Soft/Soft, Hard/Soft, Soft/Hard, and Hard/Hard—allowing adaptability to varying driving conditions. Magnetic circuit optimization ensures rapid damping force adjustments (≈10 ms), while a semi-active control algorithm incorporating skyhook logic, roll, dive, and squat control strategies was implemented. …”
    Get full text
    Article
  19. 2039

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  20. 2040

    A Knowledge-Driven Smart System Based on Reinforcement Learning for Pork Supply-Demand Regulation by Haohao Song, Jiquan Wang

    Published 2025-07-01
    “…By harnessing dynamic decision-making capabilities of reinforcement learning (RL), we design an optimization architecture centered on the Q-learning mechanism and dual-strategy pools, which is integrated into the honey badger algorithm to form the RL-enhanced honey badger algorithm (RLEHBA). …”
    Get full text
    Article