Showing 2,881 - 2,900 results of 8,683 for search 'optimal computing algorithms', query time: 0.26s Refine Results
  1. 2881

    Resource Adaptive Automated Task Scheduling Using Deep Deterministic Policy Gradient in Fog Computing by Prashanth Choppara, S. Sudheer Mangalampalli

    Published 2025-01-01
    “…This paper presents a novel adaptive scheduling framework based on the DDPG algorithm for task scheduling optimization in fog computing environments. …”
    Get full text
    Article
  2. 2882
  3. 2883

    Client grouping and time-sharing scheduling for asynchronous federated learning in heterogeneous edge computing environment by Qianpiao MA, Qingmin JIA, Jianchun LIU, Hongli XU, Renchao XIE, Tao HUANG

    Published 2023-11-01
    “…To overcome the three key challenges of federated learning in heterogeneous edge computing, i.e., edge heterogeneity, data Non-IID, and communication resource constraints, a grouping asynchronous federated learning (FedGA) mechanism was proposed.Edge nodes were divided into multiple groups, each of which performed global updated asynchronously with the global model, while edge nodes within a group communicate with the parameter server through time-sharing communication.Theoretical analysis established a quantitative relationship between the convergence bound of FedGA and the data distribution among the groups.A time-sharing scheduling magic mirror method (MMM) was proposed to optimize the completion time of a single round of model updating within a group.Based on both the theoretical analysis for FedGA and MMM, an effective grouping algorithm was designed for minimizing the overall training completion time.Experimental results demonstrate that the proposed FedGA and MMM can reduce model training time by 30.1%~87.4% compared to the existing state-of-the-art methods.…”
    Get full text
    Article
  4. 2884

    Collaborative optimal operation control of HVAC systems based on multi-agent by Chen Fu, Kaipeng Chen, Yan Xu, Dongyue Ming, Ruiwen Ye, Yingjun Wu, Lixia Sun

    Published 2025-07-01
    “…As a consequence, the computing efficiency of optimization algorithms is relatively low, posing challenges for real-time optimal operation control. …”
    Get full text
    Article
  5. 2885

    Algorithm of reconstruction combined midface defects after resection malignant tumors by M. V. Bolotin, A. M. Mudunov, V. Yu. Sobolevsky, V. I. Sokorutov

    Published 2022-08-01
    “…In type IV resections satisfactory aesthetic results were obtained in all patients.Conclusion. Preoperative computer 3D modeling is necessary in planning of reconstruction. …”
    Get full text
    Article
  6. 2886

    A comparative study of the performance of ten metaheuristic algorithms for parameter estimation of solar photovoltaic models by Adel Zga, Farouq Zitouni, Saad Harous, Karam Sallam, Abdulaziz S. Almazyad, Guojiang Xiong, Ali Wagdy Mohamed

    Published 2025-01-01
    “…The algorithms evaluated include the Crayfish Optimization Algorithm, the Golf Optimization Algorithm, the Coati Optimization Algorithm, the Crested Porcupine Optimizer, the Growth Optimizer, the Artificial Protozoa Optimizer, the Secretary Bird Optimization Algorithm, the Mother Optimization Algorithm, the Election Optimizer Algorithm, and the Technical and Vocational Education and Training-Based Optimizer. …”
    Get full text
    Article
  7. 2887

    Soil Condition Classification Based on Natural Water Content Using Computer Vision Technique by Mark Miller, Yong Fang, Yubo Wang, Sergey Kharitonov, Vladimir Akulich

    Published 2025-06-01
    “…As a result, seven algorithms were obtained that allow classifying the soil images, which can later be used to optimize the tunnel construction process. …”
    Get full text
    Article
  8. 2888
  9. 2889
  10. 2890
  11. 2891
  12. 2892

    Cutting-Edge Stochastic Approach: Efficient Monte Carlo Algorithms with Applications to Sensitivity Analysis by Ivan Dimov, Rayna Georgieva

    Published 2025-04-01
    “…In recent years, researchers have developed advanced algorithms based on the analysis of variance (ANOVA) technique for computing numerical sensitivity indicators. …”
    Get full text
    Article
  13. 2893

    Forgetful Swarm Optimization for Astronomical Observation Scheduling by Nariman Nakhjiri, Maria Salamo, Miquel Sanchez-Marre, Christian Blum, Juan Carlos Morales

    Published 2024-01-01
    “…Additionally, it has significantly less computational cost than ILS and the base models of a global optimization algorithm such as EA.…”
    Get full text
    Article
  14. 2894

    Research on consensus mechanism optimization for IoT blockchain by Qijie SONG, Tieming CHEN, Yuan CHEN, Dongjie MA, Zhengqiu WENG

    Published 2020-02-01
    “…The essence of the blockchain is a decentralized distributed ledger system.The Internet of things is interconnected by massive heterogeneous terminals and has natural distributed characteristics.Therefore,the combinedIoT blockchain is widely optimistic.At the same time,due to the heterogeneity of the IoT-aware terminal,the limited computing capacity and the ability of data transmission,the IoT blockchain faces great challenges.The password consensus technology has become a key issue.On the basis of summarizing the current blockchain consensus algorithm,its applicability to the IoT blockchain was analyzed,the current application status of several IoT blockchain platforms and consensus mechanisms was introduced,and the optimization research progress of the consensus mechanismin IoT blockchain was described.Finally,the optimization technology of the IoT blockchain and the potential research directions were summarized.…”
    Get full text
    Article
  15. 2895

    Permission clustering-based attribute value optimization by Wenchao WU, Zhiyu REN, Xuehui DU

    Published 2021-08-01
    “…In new large-scale computing environment, the attributes of entities were massive and they had complex sources and uneven quality, which were great obstacles to the application of ABAC (attribute-based access control).The attributes were also hard to be corrected manually, making it difficult to be applied in access control system straightly.To solve the optimization problem of nominal attributes, a novel algorithm of attribute value optimization based on permission clustering was designed, in which entities were presented by the privilege set related to them.So that the entities were tagged by density-based clustering method with distances of their privilege set presentations.Then the attribute values were reduced and corrected based on rough set theory.Finally, the algorithm was verified on UCI data sets, which proved that after applying it, ABAC policy mining was improved in the evaluation criteria, such as the true positive rate and F1-score.…”
    Get full text
    Article
  16. 2896

    Unmanned Aerial Vehicles (UAV) Networking Algorithms: Communication, Control, and AI-Based Approaches by Mien L. Trinh, Dung T. Nguyen, Long Q. Dinh, Mui D. Nguyen, De Rosal Ignatius Moses Setiadi, Minh T. Nguyen

    Published 2025-04-01
    “…Given the limitations of UAVs in both computations and communications, UAVs usually need algorithms for either low latency or energy efficiency. …”
    Get full text
    Article
  17. 2897
  18. 2898

    System analysis and information processing to solve the problem of detecting breakdowns of computer information storage by N. M. Kodatsky, E. A. Revyakina, A. R. Gazizov

    Published 2025-01-01
    “…A tool for assessing the state of computer equipment based on the Random Forest algorithm has been developed using historical data from SMART tests. …”
    Get full text
    Article
  19. 2899

    Efficient optimization of the Held–Karp lower bound by Righini, Giovanni

    Published 2021-11-01
    “…Although motivated by the optimization of the Held–Karp lower bound for the TSP, the algorithm solves a more general problem, allowing for the efficient pre-computation of alternative minimum spanning trees in weighted graphs where any vertex can be deleted.…”
    Get full text
    Article
  20. 2900