Search alternatives:
improved » improve (Expand Search)
cost » post (Expand Search)
Showing 1,461 - 1,480 results of 3,524 for search 'improved ((cost OR most) OR root) optimization algorithm', query time: 0.22s Refine Results
  1. 1461

    Application of deep reinforcement learning in parameter optimization and refinement of turbulence models by Zhan Zhang

    Published 2025-07-01
    “…The aim of this study is to improve the accuracy of simulations by optimizing turbulence model parameters, in order to address the cost and time limitations of traditional wind tunnel tests and on-site measurements. …”
    Get full text
    Article
  2. 1462
  3. 1463
  4. 1464

    Marine Voyage Optimization and Weather Routing with Deep Reinforcement Learning by Charilaos Latinopoulos, Efstathios Zavvos, Dimitrios Kaklis, Veerle Leemen, Aristides Halatsis

    Published 2025-04-01
    “…These algorithms are computationally costly, so we split optimization into an offline phase (costly pre-training for a route) and an online phase where the algorithms are fine-tuned as updated weather data become available. …”
    Get full text
    Article
  5. 1465

    A Distributed Parallel Genetic Algorithm of Placement Strategy for Virtual Machines Deployment on Cloud Platform by Yu-Shuang Dong, Gao-Chao Xu, Xiao-Dong Fu

    Published 2014-01-01
    “…The solution calculated by the genetic algorithm of the second stage is the optimal one of the proposed approach. …”
    Get full text
    Article
  6. 1466

    Mining Spatiotemporal Mobility Patterns Using Improved Deep Time Series Clustering by Ziyi Zhang, Diya Li, Zhe Zhang, Nick Duffield

    Published 2024-10-01
    “…Mining spatiotemporal mobility patterns is crucial for optimizing urban planning, enhancing transportation systems, and improving public safety by providing useful insights into human movement and behavior over space and time. …”
    Get full text
    Article
  7. 1467

    DECISION TREE WITH HILL CLIMBING ALGORITHM BASED SPECTRUM HOLE DETECTION IN COGNITIVE RADIO NETWORK by N Suganthi, R Meenakshi, A Sairam, M Parvathi

    Published 2025-06-01
    “…The approach integrates a Decision Tree (DT) algorithm for rapid initial classification of Primary User (PU) activity, followed by a Hill Climbing (HC) optimization algorithm that fine-tunes the detection based on a fitness function. …”
    Get full text
    Article
  8. 1468

    Investigating the performance of random oversampling and genetic algorithm integration in meteorological drought forecasting with machine learning by Tahsin Baykal, Özlem Terzi, Gülsün Yıldırım, Emine Dilek Taylan

    Published 2025-05-01
    “…Therefore, this study aims to evaluate the effectiveness of machine learning methods for meteorological drought estimation and to integrate Random Oversampling (ROS) and Genetic Algorithm (GA) methods to improve estimation accuracy. …”
    Get full text
    Article
  9. 1469

    Significance of Machine Learning-Driven Algorithms for Effective Discrimination of DDoS Traffic Within IoT Systems by Mohammed N. Alenezi

    Published 2025-06-01
    “…Findings revealed that the RF model outperformed other models by delivering optimal detection speed and remarkable performance across all evaluation metrics, while KNN (K = 7) emerged as the most efficient model in terms of training time.…”
    Get full text
    Article
  10. 1470

    Adaptive Q-Learning Grey Wolf Optimizer for UAV Path Planning by Golam Moktader Nayeem, Mingyu Fan, Golam Moktader Daiyan

    Published 2025-03-01
    “…Grey Wolf Optimization (GWO) is one of the most popular algorithms for solving such problems. …”
    Get full text
    Article
  11. 1471

    Improving the System of Mandatory Requirements to Business under the Digital Transformation of Economy by S. A. Minich

    Published 2023-08-01
    “…Objective: to elaborate scientifically substantiated proposals for improving the system of mandatory requirements in the sphere of business and other economic activity under formation of digital economy, taking into account the foreign experience of eliminating barriers for business and the available practice of legislation optimization in this sphere.Methods: the research methodological basis consists of traditional general and specific methods of scientific cognition: dialectical, formal-logical, historical-comparative, systematic, terminological, general logic methods (analysis, synthesis, generalization, induction, deduction, etc.), as well as special methods: historical-legal, formal-legal, and method of comparative jurisprudence.Results: the author investigated and systematized theoretical approaches and experience of improving the system of mandatory requirements in foreign countries and the Russian Federation; the possibilities of introducing the most successful innovative legal instruments and practices to improve the regulation of economic relations were considered. …”
    Get full text
    Article
  12. 1472

    Occlusion mapping reveals the impact of flight and sensing parameters on vertical forest structure exploration with cost-effective UAV based laser scanning by Matthias Gassilloud, Barbara Koch, Anna Göritz

    Published 2025-05-01
    “…Our results offer transferable insights to optimize UAV LiDAR data acquisitions, thereby contributing to an enhanced structural metric retrieval and improved analysis of forest functional properties.…”
    Get full text
    Article
  13. 1473

    Comprehensive Comparison and Validation of Forest Disturbance Monitoring Algorithms Based on Landsat Time Series in China by Yunjian Liang, Rong Shang, Jing M. Chen, Xudong Lin, Peng Li, Ziyi Yang, Lingyun Fan, Shengwei Xu, Yingzheng Lin, Yao Chen

    Published 2025-02-01
    “…When considering different forest disturbance types, COLD achieved the highest accuracies for Fire, Harvest, and Other disturbances, while CCDC was most accurate for Forestation. These findings highlight the necessity of region-specific calibration and parameter optimization tailored to specific disturbance types to improve forest disturbance monitoring accuracy, and also provide a solid foundation for future studies on algorithm modifications and ensembles.…”
    Get full text
    Article
  14. 1474

    A Review of Smart Camera Sensor Placement in Construction by Wei Tian, Hao Li, Hao Zhu, Yongwei Wang, Xianda Liu, Rongzheng Yang, Yujun Xie, Meng Zhang, Jun Zhu, Xiangyu Wang

    Published 2024-12-01
    “…This comprehensive review navigates through the complexities of camera and environment models, advocating for advanced optimization techniques like genetic algorithms, greedy algorithms, Swarm Intelligence, and Markov Chain Monte Carlo to refine CSP strategies. …”
    Get full text
    Article
  15. 1475

    Energy Aware Swarm Optimization with Intercluster Search for Wireless Sensor Network by Shanmugasundaram Thilagavathi, Bhavani Gnanasambandan Geetha

    Published 2015-01-01
    “…Challenges in WSN include a well-organized communication platform for the network with negligible power utilization. In this work, an improved binary particle swarm optimization (PSO) algorithm with modified connected dominating set (CDS) based on residual energy is proposed for discovery of optimal number of clusters and cluster head (CH). …”
    Get full text
    Article
  16. 1476

    Non-Vertical Well Trajectory Design Based on Multi-Objective Optimization by Xiaowei Li, Yu Li, Yang Wu, Zhaokai Hou, Haipeng Gu

    Published 2025-07-01
    “…The optimization and control of the wellbore trajectory is one of the important technologies to improve drilling efficiency, reduce drilling cost, and ensure drilling safety in the process of modern oil and gas exploration and development. …”
    Get full text
    Article
  17. 1477

    Multi-Objective Optimization for Green BTS Site Selection in Telecommunication Networks Using NSGA-II and MOPSO by Salar Babaei, Mehran Khalaj, Mehdi Keramatpour, Ramin Enayati

    Published 2025-01-01
    “…These algorithms were chosen due to their proven efficiency in handling NP-hard optimization problems and their ability to balance exploration and exploitation in search spaces.…”
    Get full text
    Article
  18. 1478

    The Application of the SubChain Salp Swarm Algorithm in the Less-Than-Truckload Freight Matching Problem by Yibo Sun, Lei Yue, Yi Liu, Weitong Chen, Zhe Sun

    Published 2025-04-01
    “…Traditional LTL matching methods are challenged by delays in updating logistic information and higher distribution costs. In order to solve LTL challenges, we developed a novel SubChain Salp Swarm Algorithm (SSSA) by improving the traditional Salp Swarm Algorithm with the utilization of a SubChain operation. …”
    Get full text
    Article
  19. 1479

    Creation of a Custom 3D Algorithm for Proper Alignment of Straight Nails in Tibiotalocalcaneal Arthrodesis by Omer Subasi PhD, Wei Shao Tung BS, Julian Hollander Bsc, Samir Ghandour MD, Atta Taseh MD, Nour Nassour MD, Adarsh Aratikatla, Alireza Ebrahimi MD, Bernard Burgesson MD, Soheil Ashkani-Esfahani MD, John Y. Kwon MD

    Published 2024-12-01
    “…Conclusion: A straight nail passing through the sustentaculum tali places surrounding neurovascular structures at risk and can also compromise the biomechanical stability of the implant. Our novel 3D algorithm shows that intraoperative adjustment of the starting point lateral to the central tibial axis is required to obtain optimal alignment of the hindfoot nail. …”
    Get full text
    Article
  20. 1480

    Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm by Saite CHEN, Weihai LI, Yuanzhi YAO, Nenghai YU

    Published 2023-06-01
    “…The use of location-based service brings convenience to people’s daily lives, but it also raises concerns about users’ location privacy.In the k-nearest neighbor query problem, constructing K-anonymizing spatial regions is a method used to protects users’ location privacy, but it results in a large waste of communication overhead.The SpaceTwist scheme is an alternative method that uses an anchor point instead of the real location to complete the k-nearest neighbor query,which is simple to implement and has less waste of communication overhead.However,it cannot guarantee K-anonymous security, and the specific selection method of the anchor point is not provided.To address these shortcomings in SpaceTwist, some schemes calculate the user’s K-anonymity group by introducing a trusted anonymous server or using the way of user collaboration, and then enhance the end condition of the query algorithm to achieve K-anonymity security.Other schemes propose the anchor point optimization method based on the approximate distribution of interest points, which can further reduce the average communication overhead.A lightweight K-anonymity incremental nearest neighbor (LKINN) location privacy protection algorithm was proposed to improve SpaceTwist.LKINN used convex hull mathematical tool to calculate the key points of K-anonymity group, and proposed an anchor selection method based on it, achieving K-anonymity security with low computational and communication costs.LKINN was based on a hybrid location privacy protection architecture, making only semi-trusted security assumptions for all members of the system, which had lax security assumptions compared to some existing research schemes.Simulation results show that LKINN can prevent semi-trusted users from stealing the location privacy of normal users and has smaller query response time and communication overhead compare to some existing schemes.…”
    Get full text
    Article