Search alternatives:
improved » improve (Expand Search)
Showing 1,061 - 1,080 results of 1,675 for search 'improved (post OR most) optimization algorithm', query time: 0.18s Refine Results
  1. 1061

    Encoding-Based Machine Learning Approach for Health Status Classification and Remote Monitoring of Cardiac Patients by Sohaib R. Awad, Faris S. Alghareb

    Published 2025-02-01
    “…In short, this study aims to explore how ML algorithms can enhance diagnostic accuracy, improve real-time monitoring, and optimize treatment outcomes. …”
    Get full text
    Article
  2. 1062

    Corrosion rate prediction for long-distance submarine pipelines based on MWIWOA-SVM by Zhengshan LUO, Haipeng LYU, Jihao LUO

    Published 2025-05-01
    “…MethodsTo address these issues, Multi-Way Improved Whale Optimization Algorithm (MWIWOA) was proposed to optimize the SVM-based prediction model for the internal corrosion rate of long-distance submarine pipelines. …”
    Get full text
    Article
  3. 1063
  4. 1064
  5. 1065

    Maximum Power Exploitation of Photovoltaic System under Fast-Varying Solar Irradiation and Local Shading by Yi-Jui Chiu, Bi Li, Chin-Ling Chen, Shui-Yang Lien, Ding Chen, Ji-Ming Yi, Yung-Hui Shih

    Published 2022-01-01
    “…In addition, under fast-varying solar irradiation and local shading, the speed, ability, and stability of the improved MPPT system with the PF-MPPT algorithm when tracking the maximum power were 9.52, 1.32, and 1.84 times of the MPPT system with the P&O algorithm and 2.18, 1.41, and 2.00 times of the MPPT system with the particle swarm optimization algorithm, respectively.…”
    Get full text
    Article
  6. 1066
  7. 1067

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  8. 1068

    Multidisciplinary Collaborative Reliability Analysis of the Gear Reducer based on Inverse Reliability Strategy by Wang Liangliang, Peng Jinshuan, Shao Yiming

    Published 2015-01-01
    “…The IRS- GA- CO,which not only lifted the coupling between all disciplines to improve the search most probable point,the burden of system- level optimizer also can be significantly reduced. …”
    Get full text
    Article
  9. 1069

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  10. 1070

    基于改进Kriging模型的主动学习可靠性分析方法 by 陈哲, 杨旭锋, 程鑫

    Published 2021-01-01
    “…,the differential evolution algorithm is introduced to explore the optimal parameter of Kriging model and improve the accuracy of Kriging prediction information.As a result,the training point in each iteration is guaranteed to be the global optimal one and the efficiency of ALK model is largely improved.…”
    Get full text
    Article
  11. 1071

    Spatiotemporal pattern analysis of land use in Jiangsu Province based on long-term time series remote sensing images by Zhendong Ji, Lingzhi Yin, Jinhong Wang

    Published 2025-06-01
    “…Principal Component Analysis (PCA) was applied to reduce feature dimensionality, and the Random Forest classification algorithm was optimized with Bayesian Optimization and Tree-structured Parzen Estimators (TPE) for improved performance. …”
    Get full text
    Article
  12. 1072
  13. 1073
  14. 1074

    Green Energy Strategic Management for Service of Quality Composition in the Internet of Things Environment by Jianhao Gao

    Published 2020-01-01
    “…The simulation results reveal that MFO has good optimization effect in the abovementioned models, and the optimization effect of MFO is improved by 8% and 6% compared with the genetic algorithm and particle swarm optimization, so as to realize the green energy strategic management of QoS composition in the environment of IoT.…”
    Get full text
    Article
  15. 1075

    Intelligent Cyber-Attack Detection in IoT Networks Using IDAOA-Based Wrapper Feature Selection by Mohammed Abdullah, Ryna Svyd

    Published 2025-06-01
    “…This study presents an innovative framework that integrates the Improved Dynamic Arithmetic Optimization Algorithm (IDAOA) with a Bagging technique to enhance the performance of intelligent cyber intrusion detection systems. …”
    Get full text
    Article
  16. 1076

    GRU-based multi-scenario gait authentication for smartphones by Qi JIANG, Ru FENG, Ruijie ZHANG, Jinhua WANG, Ting CHEN, Fushan WEI

    Published 2022-10-01
    “…At present, most of the gait-based smartphone authentication researches focus on a single controlled scenario without considering the impact of multi-scenario changes on the authentication accuracy.The movement direction of the smartphone and the user changes in different scenarios, and the user’s gait data collected by the orientation-sensitive sensor will be biased accordingly.Therefore, it has become an urgent problem to provide a multi-scenario high-accuracy gait authentication method for smartphones.In addition, the selection of the model training algorithm determines the accuracy and efficiency of gait authentication.The current popular authentication model based on long short-term memory (LSTM) network can achieve high authentication accuracy, but it has many training parameters, large memory footprint, and the training efficiency needs to be improved.In order to solve the above problems a multi-scenario gait authentication scheme for smartphones based on Gate Recurrent Unit (GRU) was proposed.The gait signals were preliminarily denoised by wavelet transform, and the looped gait signals were segmented by an adaptive gait cycle segmentation algorithm.In order to meet the authentication requirements of multi-scenario, the coordinate system transformation method was used to perform direction-independent processing on the gait signals, so as to eliminate the influence of the orientation of the smartphone and the movement of the user on the authentication result.Besides, in order to achieve high-accuracy authentication and efficient model training, GRUs with different architectures and various optimization methods were used to train the gait model.The proposed scheme was experimentally analyzed on publicly available datasets PSR and ZJU-GaitAcc.Compared with the related schemes, the proposed scheme improves the authentication accuracy.Compared with the LSTM-based gait authentication model, the training efficiency of the proposed model is improved by about 20%.…”
    Get full text
    Article
  17. 1077

    A Location Selection Policy of Live Virtual Machine Migration for Power Saving and Load Balancing by Jia Zhao, Yan Ding, Gaochao Xu, Liang Hu, Yushuang Dong, Xiaodong Fu

    Published 2013-01-01
    “…We propose a novel approach MOGA-LS, which is a heuristic and self-adaptive multiobjective optimization algorithm based on the improved genetic algorithm (GA). …”
    Get full text
    Article
  18. 1078
  19. 1079

    Design and Implementation of Hybrid GA-PSO-Based Harmonic Mitigation Technique for Modified Packed U-Cell Inverters by Hasan Iqbal, Arif Sarwat

    Published 2024-12-01
    “…This paper proposes a hybrid version of the GA-PSO algorithm that exploits the exploratory strengths of GA and the convergence efficiencies of PSO in determining the optimized switching angles for SHM techniques applied to modified five-level and seven-level PUC inverters. …”
    Get full text
    Article
  20. 1080

    Perimeter Degree Technique for the Reduction of Routing Congestion during Placement in Physical Design of VLSI Circuits by Kuruva Lakshmanna, Fahimuddin Shaik, Vinit Kumar Gunjan, Ninni Singh, Gautam Kumar, R. Mahammad Shafi

    Published 2022-01-01
    “…Consequently, in conjunction with the optimized floorplan data, the optimized model created by the Improved Harmonic Search Optimization algorithm undergoes testing and investigation in order to estimate the amount of congestion that occurs during the routing process in VLSI circuit design and to minimize the amount of congestion that occurs.…”
    Get full text
    Article