Showing 4,101 - 4,120 results of 5,620 for search 'while (optimizer OR optimize) algorithm', query time: 0.23s Refine Results
  1. 4101

    GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA by Cihangir Tezcan, Gregor Leander

    Published 2025-03-01
    “…In this work we provide optimized implementations of several widely used algorithms on GPUs, leading to interesting insights on the cost of brute force attacks on several real-word applications. …”
    Get full text
    Article
  2. 4102

    Integrated multiomics analysis and machine learning refine neutrophil extracellular trap-related molecular subtypes and prognostic models for acute myeloid leukemia by Fangmin Zhong, Fangyi Yao, Zihao Wang, Jing Liu, Bo Huang, Xiaozhong Wang

    Published 2025-02-01
    “…The formation of NETs is impaired in acute myeloid leukemia (AML), which can result in immunodeficiency and increased susceptibility to infection.MethodsThe gene set variation analysis (GSVA) algorithm was employed for the calculation of NET score, while the consensus clustering algorithm was utilized to identify molecular subtypes. …”
    Get full text
    Article
  3. 4103

    EDT-MCFEF: a multi-channel feature fusion model for emergency department triage of medical texts by Tao Lin, Shiming Yi

    Published 2025-06-01
    “…The model employs a hybrid masking approach and RoBERTa (Robustly Optimized BERT Approach) to facilitate feature enhancement and word vector processing of text. …”
    Get full text
    Article
  4. 4104

    A Strategy-Driven Semantic Framework for Precision Decision Support in Targeted Medical Fields by Sivan Albagli-Kim, Dizza Beimel

    Published 2025-02-01
    “…Strategies integrate domain-specific knowledge and algorithms, refining decision making while maintaining the iterative nature of expert–patient interactions. …”
    Get full text
    Article
  5. 4105

    Detection and Classification of Power Quality Disturbances Based on Improved Adaptive S-Transform and Random Forest by Dongdong Yang, Shixuan Lü, Junming Wei, Lijun Zheng, Yunguang Gao

    Published 2025-08-01
    “…The IAST employs a globally adaptive Gaussian window as its kernel function, which automatically adjusts window length and spectral resolution based on real-time frequency characteristics, thereby enhancing time–frequency localization accuracy while reducing algorithmic complexity. To optimize computational efficiency, window parameters are determined through an energy concentration maximization criterion, enabling rapid extraction of discriminative features from diverse PQ disturbances (e.g., voltage sags and transient interruptions). …”
    Get full text
    Article
  6. 4106

    A Logarithmic Compression Method for Magnitude-Rich Data: The LPPIE Approach by Vasileios Alevizos, Zongliang Yue, Sabrina Edralin, Clark Xu, Nikitas Gerolimos, George A. Papakostas

    Published 2025-07-01
    “…This study introduces Logarithmic Positional Partition Interval Encoding (LPPIE), a novel lossless compression methodology employing iterative logarithmic transformations to drastically reduce data size. While conventional dictionary-based algorithms rely on repeated sequences, LPPIE translates numeric data sequences into highly compact logarithmic representations. …”
    Get full text
    Article
  7. 4107

    Vision transformer-enhanced thermal anomaly detection in building facades through fusion of thermal and visible imagery by Siyu Zheng, Jiaxin Zhang, Rui Zu, Yunqin Li

    Published 2025-07-01
    “…This research employs an optimized Vision Transformer (ViT) technology, enhanced by the Line Acquisition, Filtering, and Revision (LAFR) algorithm. …”
    Get full text
    Article
  8. 4108

    Simulation-Based Assessment of the Control of a Hybrid ECS Including a Vapor Cycle System by Arnav Pathak, Victor Norrefeldt

    Published 2025-03-01
    “…The interfacing reveals that some optimization of the control algorithm is possible for the hybrid ECS, while some operational points already perform as intended. …”
    Get full text
    Article
  9. 4109

    Stochastic Potential Game-Based Target Tracking and Encirclement Approach for Multiple Unmanned Aerial Vehicles System by Kejie Yang, Ming Zhu, Xiao Guo, Yifei Zhang, Yuting Zhou

    Published 2025-01-01
    “…Utilizing fully distributed intelligent control algorithms has enabled the gradual adoption of the multiple unmanned aerial vehicles system for executing Target Tracking and Encirclement missions in industrial and civil applications. …”
    Get full text
    Article
  10. 4110

    Accelerating and Compressing Transformer-Based PLMs for Enhanced Comprehension of Computer Terminology by Jian Peng, Kai Zhong

    Published 2024-10-01
    “…Our method involves a pipeline parallelism algorithm designed to accelerate training. It is paired with an innovative mixed compression strategy that combines pruning and knowledge distillation to effectively reduce the model size while preserving its performance. …”
    Get full text
    Article
  11. 4111

    Secondary Intraocular Lens Options in Intraocular Lens Dislocation: A Review by Alexander Maloof, Ava James, Nicholas Pavic, Shane Zhang, Stephanie Wu, Christopher Go

    Published 2024-12-01
    “…While there are numerous IOL techniques and lens options for addressing IOL dislocation, there is currently no consensus on the optimal method. …”
    Get full text
    Article
  12. 4112

    Design of Asymmetrical Relay Resonators for Maximum Efficiency of Wireless Power Transfer by Bo-Hee Choi, Jeong-Hae Lee

    Published 2016-01-01
    “…The optimum placement is found by scanning the positions of the relays and optimum capacitance can be found by using genetic algorithm (GA). The PTEs are enhanced when capacitance is optimally designed by GA according to the position of relays, respectively, and then maximum efficiency is obtained at the optimum placement of relays. …”
    Get full text
    Article
  13. 4113

    Design of nodes importance assessment method for complex network based on neighborhood information by Xing LI, Jie ZHAN, Baoquan REN, Siqi ZHU

    Published 2024-03-01
    “…Accurate identification of influential nodes in complex networks is crucial for network management and network security.The local centrality method is concise and easy to use, but ignores the topological relationship between neighboring nodes and cannot provide globally optimal results.A node importance assessment method was proposed to correlate the node edge relationship and topology, which firstly applied the H-index and information entropy to assess the nodes, then combined the structural holes of the nodes with the structural characteristics of the nodes, and took into account the attribute of “bridging” while focusing on the node’s own quality and the amount of information about the neighboring nodes.The algorithm was validated by simulating the propagation process using the SIR model, and the Kendall correlation coefficient, complementary cumulative distribution function and propagation influence were applied to validate the validity and applicability of the method.Comparison of the experimental results on six real network datasets shows that the proposed method is more accurate than the traditional centrality methods in identifying and ordering the key nodes in the network.…”
    Get full text
    Article
  14. 4114

    Unveiling connectivity patterns of railway timetables through complex network theory and Infomap clustering. by Fabio Lamanna, Michele Prisma, Giorgio Medeossi

    Published 2025-01-01
    “…Comparative analysis of the two scenarios highlights improvements in physical infrastructure and travel time efficiency by 2033, while also identifying areas where service frequency distribution and transfer effectiveness may require further optimization. …”
    Get full text
    Article
  15. 4115

    Design and Analysis of Parallel Adjusting Equipment of Vertical Drilling by Zhou Bin, Zeng Yishan, Zi Bin

    Published 2015-01-01
    “…Focusing on the current limited vertical adjustment technique of large-scale drillings,a 6-DOF parallel adjustment equipment with 12 inputs is designed for the working condition of vertical drilling.The equipment mechanism consists of 6branched chains with redundancy which are symmetrical in structure.Each of the chains is composed by a compound of rotate joint and a compound of spherical joint,while the two pairs are connected by two prismatic pairs.The modal analysis is carried out on the body which is based on ANSYS software,first six order frequency distribution and modal vibration mode,and along the X、Y、Zdirection of the displacement frequency response about the moving platform are got.The analysis consequence shows that the most sensitive of external forces to the moving platform is 46 Hz frequency.Otherwise,the working space of the 6-DOF platform is obtained by using the 3-D searching algorithm.The results have significant meanings in the further research on the correlation between the parameters and the whole mechanism,as well as the optimization of the parameter.…”
    Get full text
    Article
  16. 4116

    Skip-Connected CNN Exploiting BNN Surrogate for Antenna Modelling by Yubo Tian, Jinlong Sun, Zhiwei Zhu

    Published 2025-01-01
    “…The combination of evolutionary algorithms with full-wave electromagnetic (EM) simulation software is an effective method for antenna optimal design. …”
    Get full text
    Article
  17. 4117

    Saliency Detection via Fusing Color Contrast and Hash Fingerprint by Yin Lv, Xuanrui Zhang, Yong Wang

    Published 2022-01-01
    “…In our solution, the input image is segmented into nonoverlapping superpixels, so as to perform the saliency detection at the region level to reduce computational complexity. A background optimization selection is used to construct an accurate background template. …”
    Get full text
    Article
  18. 4118

    A hybrid unsupervised machine learning model with spectral clustering and semi-supervised support vector machine for credit risk assessment. by Tao Yu, Wei Huang, Xin Tang, Duosi Zheng

    Published 2025-01-01
    “…The effectiveness, efficiency, and robustness of the proposed TSC-SVM model are demonstrated through various real-world applications. The proposed algorithm is anticipated to expand the customer base for financial institutions while reducing economic losses.…”
    Get full text
    Article
  19. 4119

    Robust Mainlobe Interference Suppression Based on Joint Oblique Projection for Dual Polarization Conformal Array by Chao Liu, Xiaoyuan Zhang, Junjie Qian, Lei Zhang

    Published 2023-01-01
    “…In this paper, a robust mainlobe interference suppression algorithm is proposed in a space-polarization joint domain based on a dual-polarized conformal array. …”
    Get full text
    Article
  20. 4120

    The Role of Artificial Intelligence in Aviation Construction Projects in the United Arab Emirates: Insights from Construction Professionals by Mariam Abdalla Alketbi, Fikri Dweiri, Doraid Dalalah

    Published 2024-12-01
    “…AI tools can predict delays, optimize workflows, and enhance safety through real-time data analytics and machine learning algorithms, reducing risks and human error. …”
    Get full text
    Article