Showing 8,101 - 8,120 results of 8,683 for search 'optimal computing algorithms', query time: 0.13s Refine Results
  1. 8101

    An Application of Artificial Intelligence for the Joint Estimation of Amplitude and Two-Dimensional Direction of Arrival of Far Field Sources Using 2-L-Shape Array by Fawad Zaman, Ijaz Mansoor Qureshi, Junaid Ali Khan, Zafar Ullah Khan

    Published 2013-01-01
    “…In these proposed artificial intelligence techniques, the metaheuristics based on genetic algorithm and simulated annealing are used as global optimizers assisted with rapid local version of pattern search for optimization of the adaptive parameters. …”
    Get full text
    Article
  2. 8102
  3. 8103
  4. 8104

    Minimal‐cost route planning via Fibonacci‐heap‐typed data structure by Wangjia Zhan, Haohao Qiu, Bo Min, Lin Lin

    Published 2024-11-01
    “…Subsequently, the minimal‐cost route planning algorithm is developed to find a feasible transport route with the minimal cost of clearing obstacles by resorting to the Edmonds' algorithm and some feasible data structures. …”
    Get full text
    Article
  5. 8105
  6. 8106

    Financial Management of Innovative Activity by V. P. Shestak, E. I. Moreva, I. G. Tyutyunnik

    Published 2019-12-01
    “…This allows to create a control algorithm to maximize the effectiveness. The methods of computational diagnostics and tomographic economics are used for the element-by-element analysis of the subsystems of the innovation system. …”
    Get full text
    Article
  7. 8107

    User preferences in ride-sharing mathematical models for enhanced matching by Zahra Dastani, Hamidreza Koosha, Hossein Karimi, Abolfazl Mohammadzadeh Moghaddam

    Published 2024-11-01
    “…In addition, we introduce an Iterative Enhance-and-Optimize Algorithm capable of producing high-quality solutions within short computational times. …”
    Get full text
    Article
  8. 8108

    A smarter approach to liquefaction risk: harnessing dynamic cone penetration test data and machine learning for safer infrastructure by Shubhendu Vikram Singh, Sufyan Ghani

    Published 2024-10-01
    “…ML models, including Support Vector Machine (SVM) optimized with Particle Swarm Optimization (PSO), Grey Wolf Optimizer (GWO), Genetic Algorithm (GA), and Firefly Algorithm (FA), were employed to predict the e/qd ratio using key geotechnical parameters, such as fine content, peak ground acceleration, reduction factor, and penetration rate. …”
    Get full text
    Article
  9. 8109
  10. 8110

    Low latency Montgomery multiplier for cryptographic applications by khalid javeed, Muhammad Huzaifa, Safiullah Khan, Atif Raza Jafri

    Published 2021-07-01
    “…Many interesting and novel optimization strategies are adopted in the proposed design. …”
    Get full text
    Article
  11. 8111

    Scalable and energy-efficient task allocation in industry 4.0: Leveraging distributed auction and IBPSO. by Qingwen Li, Tang Wai Fan, Lam Sui Kei, Zhaobin Li

    Published 2025-01-01
    “…The main contributions we make are: the design of an auction decentralization algorithm (AOCTA) which allows for an efficient and flexible task distribution in dynamic contexts, the optimization of coalition formation in complex jobs by using IBPSO and improves the efficiency of energy and decreases the cost of computation as well as thorough simulations that show that our proposed method significantly surpasses conventional methods for efficiency, task completion rates in terms of energy usage, task completion rate, and scaling of the system. …”
    Get full text
    Article
  12. 8112

    Vehicle-to-Vehicle Communication Channel Estimator Based on Gate Recurrent Unit by Jun-Han Wang, He He, Kosuke Tamura, Shun Kojima, Jaesang Cha, Chang-Jun Ahn

    Published 2025-01-01
    “…At the same time, the computational complexity of the algorithm has been reduced to some extent, allowing the estimator to complete the channel estimation faster. …”
    Get full text
    Article
  13. 8113

    Effective 3C Resource Utilization and Fair Allocation Strategy for Multi-Task Federated Learning by Chaofeng Zhang, Mianxiong Dong, Kaoru Ota

    Published 2023-01-01
    “…Next, a Federated Learning Long Short-Term Memory (LSTM) based Queuing Optimization and Allocation Policy Calculation Algorithm (FL-QAPC) is proposed for resource allocation policy calculation using multi-dimensional network state inputs with time series. …”
    Get full text
    Article
  14. 8114

    DSFA-SwinNet: A Multi-Scale Attention Fusion Network for Photovoltaic Areas Detection by Shaofu Lin, Yang Yang, Xiliang Liu, Li Tian

    Published 2025-01-01
    “…Secondly, a hybrid loss function has been developed with weights optimized employing the Bayesian Optimization algorithm to provide a strategic method for parameter tuning in similar research. …”
    Get full text
    Article
  15. 8115
  16. 8116

    Detection Model for Cotton Picker Fire Recognition Based on Lightweight Improved YOLOv11 by Zhai Shi, Fangwei Wu, Changjie Han, Dongdong Song, Yi Wu

    Published 2025-07-01
    “…In response to the limited research on fire detection in cotton pickers and the issue of low detection accuracy in visual inspection, this paper proposes a computer vision-based detection method. The method is optimized according to the structural characteristics of cotton pickers, and a lightweight improved YOLOv11 algorithm is designed for cotton fire detection in cotton pickers. …”
    Get full text
    Article
  17. 8117

    Lightweight security architecture design for wireless sensor network by Chao WANG, Guang-yue HU, Huan-guo ZHANG

    Published 2012-02-01
    “…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
    Get full text
    Article
  18. 8118

    Multi-Vehicle Object Recognition Method Based on YOLOv7-W by Xin Liu, Jingbin Zhao, Zhi Zhang, Rongxing Wu, Xun Li

    Published 2025-01-01
    “…To improve the matching accuracy of prior frames, the k-means++ clustering algorithm is employed to optimize the prior frame parameters. …”
    Get full text
    Article
  19. 8119

    Factor Graph-Based Planning as Inference for Autonomous Vehicle Racing by Salman Bari, Xiagong Wang, Ahmad Schoha Haidari, Dirk Wollherr

    Published 2024-01-01
    “…We exploit the locality feature of the factor graph structure to integrate the minimum curvature path and local planning computations into a unified algorithm. This diverges from the conventional separation of global and local planning modules, where curvature minimization occurs at the global level. …”
    Get full text
    Article
  20. 8120