Search alternatives:
improved » improve (Expand Search)
Showing 2,261 - 2,280 results of 3,386 for search 'improved ((whale OR whole) OR while) optimization algorithm', query time: 0.15s Refine Results
  1. 2261

    Mapping Landslide Sensitivity Based on Machine Learning: A Case Study in Ankang City, Shaanxi Province, China by Baoxin Zhao, Jingzhong Zhu, Youbiao Hu, Qimeng Liu, Yu Liu

    Published 2022-01-01
    “…The main purpose of this research is to apply the logistic regression (LR) model, the support vector machine (SVM) model based on radial basis function, the random forest (RF) model, and the coupled model of the whale optimization algorithm (WOA) and genetic algorithm (GA) with RF, to make landslide susceptibility mapping for the Ankang City of Shaanxi Province, China. …”
    Get full text
    Article
  2. 2262

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  3. 2263

    Dynamic Water Scheduling in the Northwest River Delta Basin Based on Minimum Discharge Flow Control in Cross-section by WU Di, FANG Chunyan, SHANG Yunfei

    Published 2025-01-01
    “…On this basis, by taking into account both ecological water demand and socio-economic water demand, the minimum discharge flow control index of the cross-section was determined, and a fitness function was constructed. The whale optimization algorithm was used to find the optimal water allocation plan. …”
    Get full text
    Article
  4. 2264

    A long-term localization and mapping system for autonomous inspection robots in large-scale environments using 3D LiDAR sensors. by Wandeng Mao, Liang Jiang, Shanfeng Liu, Shengzhe Xi, Hua Bao

    Published 2025-01-01
    “…Prolonged operation poses the risk of sensor degradation, while the presence of dynamic objects disrupts the stability of the constructed map, consequently impacting the accuracy of robot localization. …”
    Get full text
    Article
  5. 2265

    A Novel Artificial Bee Colony Approach of Live Virtual Machine Migration Policy Using Bayes Theorem by Gaochao Xu, Yan Ding, Jia Zhao, Liang Hu, Xiaodong Fu

    Published 2013-01-01
    “…As a result, the whole approach achieves a longer-term efficient optimization for power saving. …”
    Get full text
    Article
  6. 2266

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  7. 2267

    Adaptive Safe Data Driven Control Strategy for Closed Loop System by Wen Ruchun

    Published 2025-01-01
    “…Finally, some simulation results are given to show our theoretical results on adaptive safe data driven control and its improved switching form. Generally, this new paper extends our previous contributions about data driven control to complete its synthesis research, combining some advanced factors together from both the academic theory and practice, for example, adaptation, safety, optimization theory and algorithm, switching logic together.…”
    Get full text
    Article
  8. 2268

    Hybrid precoding and power allocation for mmWave NOMA systems based on time delay line arrays by Gangcan SUN, Xinli WU, Wanming HAO, Zhengyu ZHU

    Published 2022-06-01
    “…Methods:To reduce inter-user interference,an improved K-means algorithm is proposed to group users and select a cluster head for each group of users, which maximizes the correlation of user channels in the same cluster and reduces the correlation between users in different clusters as much as possible;Then,a low-complexity analog precoding is designed to maximize the array gain of the antenna based on the relevant user channel matrix composed of the cluster head set, followed by a digital precoding designed to eliminate inter-user interference with the maximum equivalent channel gain between beams using a forced-zero technique; Finally, an EE maximization problem is formed to optimize the transmit power under users'quality of services and total transmit power constraints,and a two-layer iterative algorithm is proposed for the resulting non-convex optimization problem. …”
    Get full text
    Article
  9. 2269

    A Hybrid CT-DEWCA-Based Energy-Efficient Routing Protocol for Data and Storage Nodes in Underwater Acoustic Sensor Networks by Imran Khan, Muhammad Rauf, Atif Jamil

    Published 2025-01-01
    “…This research proposes an energy-aware deployment approach and introduces the Controlled Transmission enhanced by hybrid model scheme with Differential Evolution, Whale Optimization, and Chaotic Adaptation (CT-DEWCA) for relay selection. …”
    Get full text
    Article
  10. 2270

    Microgrid system for electric vehicle charging stations integrated with renewable energy sources using a hybrid DOA–SBNN approach by Kommoju Naga Durga Veera Sai Eswar, M. Arun Noyal Doss, Mohammad Shorfuzzaman, Ali Elrashidi

    Published 2025-01-01
    “…In addition to supporting eco-friendly mobility, the technology lowers grid dependency and improves energy reliability. The manuscript introduces a hybrid technique for efficient electric vehicle (EV) charging integrating the Dollmaker Optimization algorithm (DOA) and spatial Bayesian neural network (SBNN). …”
    Get full text
    Article
  11. 2271

    Pickup and delivery planning for the crowdsourced freight delivery routing problem. by Jingxian Zhang

    Published 2025-01-01
    “…The objective is to minimize total service costs, including fixed vehicle costs, transportation costs, and penalty costs for delays, while planning routes that cover all orders. To solve this combinatorial optimization problem, we propose an improved partheno genetic algorithm (IPGA) and a simulated annealing algorithm (SA). …”
    Get full text
    Article
  12. 2272

    Intelligent Dual Basal–Bolus Calculator for Multiple Daily Insulin Injections via Offline Reinforcement Learning by Junyoung Yoo, Vega Pradana Rachim, Suyeon Jung, Sung-Min Park

    Published 2024-01-01
    “…Managing blood glucose levels through multiple daily injections (MDIs) of insulin presents a challenge in daily diabetes care, necessitating frequent self-dosing adjustments to avoid glycemic extremes. While essential in MDI treatment, bolus calculators need significant usability improvements due to meal counting and parameter optimization complexities. …”
    Get full text
    Article
  13. 2273

    Synthesizing Sum and Difference Patterns with Low Complexity Feeding Network by Sharing Element Excitations by Jafar Ramadhan Mohammed

    Published 2017-01-01
    “…Unlike the standard optimization approaches such as genetic algorithm (GA), the described algorithm performs repeatedly deterministic transformations on the initial field until the prescribed requirements are satisfied. …”
    Get full text
    Article
  14. 2274

    Enhancing grid frequency regulation in low inertia modern multi‐area power systems using cascaded non‐integer control approaches with BESS‐based virtual inertia by Tushar Kanti Roy, Amanullah Maung Than Oo

    Published 2024-12-01
    “…It should be noted that improper controller parameters can worsen frequency deviations and system stability. Hence, a whale optimization algorithm optimizes control parameters using the integral time absolute error based objective function. …”
    Get full text
    Article
  15. 2275

    Vulnerability Assessment in Karst Aquifers with EPIK and COP Indices Calibration by Hamid Kardan Moghadam, Amir Reza Nemati Mansour, Abbas Akbarzadeh, Ali Mirarabi

    Published 2025-05-01
    “…In order to calibrate the GQI qualitative index with the zoning of the springs in the region, whale optimization algorithms were used. In this calibration, the weights and ranks of the two vulnerability indices were determined. …”
    Get full text
    Article
  16. 2276

    Intelligent Cyber-Attack Detection in IoT Networks Using IDAOA-Based Wrapper Feature Selection by Mohammed Abdullah, Ryna Svyd

    Published 2025-06-01
    “…This study presents an innovative framework that integrates the Improved Dynamic Arithmetic Optimization Algorithm (IDAOA) with a Bagging technique to enhance the performance of intelligent cyber intrusion detection systems. …”
    Get full text
    Article
  17. 2277

    A Metaheuristic Method for the Task Assignment Problem in Continuous-Casting Production by Hongtao Hu, Yiwei Wu, Tingsong Wang

    Published 2018-01-01
    “…This problem is formulated as a nonlinear mixed-integer programming model aimed at minimizing total tardiness within the resource constraints and time windows constraints for the tasks. An improved solution algorithm based on particle swam optimization is developed to efficiently solve the proposed model. …”
    Get full text
    Article
  18. 2278

    Task Allocation and Path Planning Method for Unmanned Underwater Vehicles by Feng Liu, Wei Xu, Zhiwen Feng, Changdong Yu, Xiao Liang, Qun Su, Jian Gao

    Published 2025-06-01
    “…Experimental results demonstrate that the proposed task allocation mechanism and improved path planning algorithm exhibit significant advantages in task completion rate and path optimization efficiency.…”
    Get full text
    Article
  19. 2279

    Efficient Path Planning and Formation Control in Multi-Robot Systems: A Neural Fields and Auto-Switching Mechanism Approach by Raouf Fareh, Mohammed Baziyad, Tamer Farouk Rabie, Sofiane Khadraoui, Mohammad Habibur Rahman

    Published 2025-01-01
    “…The effectiveness of this approach is validated through experiments, demonstrating significant improvements in execution speed, path smoothness, and overall system stability compared to competitive methods, including well-known techniques such as A*, Probabilistic RoadMap (PRM), Rapidly-exploring Random Tree Star (RRT*), and also against recent optimization techniques including Grey Wolf Optimization (GWO) and Whale Optimization Algorithm (WOA).…”
    Get full text
    Article
  20. 2280

    A Method for Efficient Task Assignment Based on the Satisfaction Degree of Knowledge by Jiafu Su, Jie Wang, Sheng Liu, Na Zhang, Chi Li

    Published 2020-01-01
    “…Then, an improved genetic algorithm is developed to solve the task assignment model. …”
    Get full text
    Article