Showing 4,201 - 4,220 results of 5,620 for search 'while (optimizer OR optimize) algorithm', query time: 0.20s Refine Results
  1. 4201

    Selecting the Strategic Port of “the Belt and Road” Based on the Global Network by Zihui Yang, Qingchun Meng, Chanjuan Li

    Published 2021-01-01
    “…Under “the Belt and Road” initiative, China promoted cooperation between domestic enterprises and international ports vigorously, which brought back fruitful results, while the rational selection of strategic pivots ports and the optimization of the layout of the port network are important guarantees to a further promotion to the economic development of “the Belt and Road” ports and give full play to the driving and radiation role of strategic pivots ports. …”
    Get full text
    Article
  2. 4202

    Subsystem-Based Fault Detection in Robotics via <italic>L2</italic> Norm and Random Forest Models by Elham Abdullah Alamoudi

    Published 2024-01-01
    “…Our approach involves dividing the system into subsystems, processing signals from a single sensor type, and using optimal features derived from the <inline-formula> <tex-math notation="LaTeX">$L2$ </tex-math></inline-formula> norm for prediction via a random forest model for detection. …”
    Get full text
    Article
  3. 4203

    Enhancing Lifetime and Reliability in WSNs: Complementary of Dual-Battery Systems Energy Management Strategy by Mehrshad Eskandarpour, Hossein Soleimani

    Published 2025-01-01
    “…Unlike previous approaches, this system enables simultaneous charging and load powering and is specifically optimized for energy-harvesting WSN environments. Simulation results in MATLAB/Simulink demonstrate that the system improves battery lifespan by up to 25% compared to conventional single-battery configurations, while ensuring stable voltage regulation and improved reliability under variable loads. …”
    Get full text
    Article
  4. 4204

    Linear adaptive filtering of random sequences on basis of deterministic approach by V. A. Artemiev, A. O. Naumov, L. L. Kokhan

    Published 2018-09-01
    “…The optimal current estimate is based on both measurement results and extrapolated values. …”
    Get full text
    Article
  5. 4205

    An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs by Jing Wang, Xue Yuan, Yingjie Xu, Yudi Zhang

    Published 2024-01-01
    “…When compared with some related schemes, this optimization speeds up both the key generation and signing phases with constant rounds while maintaining security against malicious adversaries.…”
    Get full text
    Article
  6. 4206

    Energy-Efficient Adaptive Routing and Context-Aware Lifetime Maximization in Wireless Sensor Networks by Shaohua Wan

    Published 2014-11-01
    “…We design and implement a Bezier-based multipath routing algorithm that allows a given source node to send samples of data to a given sink node in large scale sensor networks. …”
    Get full text
    Article
  7. 4207

    Hydrofoil Installation and Performance Optimisation for Ship Resistance Reduction in Trimaran Through Particle Swarm Optimisation Method by Ghadimi Aliakbar, Ghadimi Parviz, Ghassemi Hassan

    Published 2025-03-01
    “…The primary aim of this hydrofoil is to reduce the overall resistance while the ship is moving. This study focuses on minimising the ship’s total resistance. …”
    Get full text
    Article
  8. 4208

    CBID: A Scalable Method for Distributed Data Aggregation in WSNs by Aristides Mpitziopoulos, Damianos Gavalas, Charalampos Konstantopoulos, Grammati Pantziou

    Published 2010-07-01
    “…Herein we present CBID, a novel algorithm that calculates near-optimal routes for MAs that incrementally fuse the data as they visit the Sensor Nodes (SNs) while also enabling fast updates on the designed itineraries upon changes of network topology. …”
    Get full text
    Article
  9. 4209

    Intelligent resource scheduling scheme for UAV swarm collaborative sensing by ZHAO Pengcheng, LI Tianyang, LENG Supeng, XIONG Kai

    Published 2025-03-01
    “…Furthermore, a multi-agent reinforcement learning (MARL) algorithm with an attention mechanism was employed to solve the optimization problem, enabling agents to extract critical environmental features more effectively. …”
    Get full text
    Article
  10. 4210

    Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage by ZHANG Kejun, WANG Wenbin, XU Shaofei, YU Xinying, WANG Jun, LI Pengcheng, QIAN Rong

    Published 2024-09-01
    “…The keyword encryption process was optimized for trapdoor indistinguishability and restricted user search capabilities. …”
    Get full text
    Article
  11. 4211

    Variational Quantum Simulation: A Case Study for Understanding Warm Starts by Ricard Puig, Marc Drudis, Supanut Thanasilp, Zoë Holmes

    Published 2025-01-01
    “…While our main focus is on this case study of variational quantum simulation, we end by discussing how our results work in other iterative settings.…”
    Get full text
    Article
  12. 4212

    A grid-based reliable multi-hop routing protocol for energy-efficient wireless sensor networks by Zhansheng Chen, Hong Shen

    Published 2018-03-01
    “…In order to minimize and balance the energy consumption, our proposed protocol, grid-based reliable multi-hop routing protocol, optimizes the cluster head election process by combining individual ability which consists of node’s residual energy and node’s location, and local cognition which can balance energy consumption among clusters via a consultative mechanism based on cluster head’s lifetime expectancy, while considering data forwarding delay and reliable transmission of data. …”
    Get full text
    Article
  13. 4213

    Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage by ZHANG Kejun, WANG Wenbin, XU Shaofei, YU Xinying, WANG Jun, LI Pengcheng, QIAN Rong

    Published 2024-09-01
    “…The keyword encryption process was optimized for trapdoor indistinguishability and restricted user search capabilities. …”
    Get full text
    Article
  14. 4214

    Physical Activity Recognition Utilizing the Built-In Kinematic Sensors of a Smartphone by Yi He, Ye Li

    Published 2013-04-01
    “…A hierarchical classifiers system including fourteen classifiers was proposed and employed to recognize fifteen activities. The optimal features derived from the built-in kinematic sensors of the smartphone were selected from 140 features. …”
    Get full text
    Article
  15. 4215

    Vehicle Routing Problem for Collaborative Multidepot Petrol Replenishment under Emergency Conditions by Guangcan Xu, Qiguang Lyu

    Published 2021-01-01
    “…Meanwhile, usage of distribution trucks is optimized in the distribution network, that is, usage of single- and double-compartment trucks is reduced while that of three-compartment trucks is increased. …”
    Get full text
    Article
  16. 4216

    Enhancing water saturation predictions from conventional well logs in a carbonate gas reservoir with a hybrid CNN-LSTM model by Ali Gohari Nezhad, Mohammad Emami Niri

    Published 2025-04-01
    “…The methodology includes data pre-processing to de-noise and transform data into a proper format, feature engineering followed by feature selection based on domain knowledge, models’ training, testing, and optimizing. XGBoost hyperparameters were tuned using grid search, and each neural network model was optimized using a genetic algorithm. …”
    Get full text
    Article
  17. 4217
  18. 4218

    Impacts of inter-train distances on aerodynamic drag reduction in heavy-haul train groups by LYU Jun, XIANG Tao, SONG Zongying, GAO Guangjun

    Published 2024-09-01
    “…In summary, optimization of aerodynamic characteristics for trailing trains in group operation occurs at spacings of less than 700 meters, achieving the optimal drag reduction effect when the spacing is reduced to 200 meters.…”
    Get full text
    Article
  19. 4219
  20. 4220

    SMART DShot: Secure Machine-Learning-Based Adaptive Real-Time Timing Correction by Hyunmin Kim, Zahid Basha Shaik Kadu, Kyusuk Han

    Published 2025-08-01
    “…Our approach addresses critical vulnerabilities in Electronic Speed Controller (ESC) interfaces by deploying four synergistic algorithms—Kalman Filter Timing Correction (KFTC), Recursive Least Squares Timing Correction (RLSTC), Fuzzy Logic Timing Correction (FLTC), and Hybrid Adaptive Timing Correction (HATC)—each optimized for specific error characteristics and attack scenarios. …”
    Get full text
    Article