Search alternatives:
optimizer » optimize (Expand Search)
Showing 4,361 - 4,380 results of 5,620 for search 'while optimizer algorithm', query time: 0.19s Refine Results
  1. 4361

    I-YOLOv11n: A Lightweight and Efficient Small Target Detection Framework for UAV Aerial Images by Yukai Ma, Caiping Xi, Ting Ma, Han Sun, Huiyang Lu, Xiang Xu, Chen Xu

    Published 2025-08-01
    “…However, existing detection algorithms still have weak small target representation ability, extensive computational resource overhead, and poor deployment adaptability. …”
    Get full text
    Article
  2. 4362

    Implementing Blockchain Technology for Secure Data Transactions in Cloud Computing Environments Challenges and Solutions by Dandu Varalakshmi, N Shirisha, K Suresh, Saidhbi Shaik, V Venkatesh, C F Theresa Cenate

    Published 2025-01-01
    “…It also includes quantum-resilient cryptographic algorithms, which provide protection against potential future quantum attacks. …”
    Get full text
    Article
  3. 4363

    SCL-YOLOv11: A Lightweight Object Detection Network for Low-Illumination Environments by Shulong Zhuo, Hao Bai, Lifeng Jiang, Xiaojian Zhou, Xu Duan, Yiqun Ma, Zihan Zhou

    Published 2025-01-01
    “…Experimental results on the ExDark dataset demonstrate that the proposed algorithm achieves 67.6% mAP@0.5 and 42.4% mAP@0.5:0.95, while reducing parameter count by 38.5% and computational cost by 25.4%. …”
    Get full text
    Article
  4. 4364

    Wavenumber-Domain Joint Estimation of Rotation Parameters and Scene Center Offset for Large-Angle ISAR Cross-Range Scaling by Bakun Zhu, Weigang Zhu, Hongfeng Pang, Chenxuan Li, Lei Qui, Jinhai Yan, Fanyin Ma, Yijia Liu

    Published 2025-05-01
    “…Utilizing this model and the sensitivity of wavenumber-domain imaging to SCO, a joint estimation algorithm that combines particle swarm optimization (PSO) and image entropy evaluation is proposed, achieving accurate parameter estimation. …”
    Get full text
    Article
  5. 4365

    Generalized BER Performance Analysis for SIC-Based Uplink NOMA by Mahmoud AlaaEldin, Emad Alsusa, Mohammad Al-Jarrah, Karim G. Seddik, Michail Matthaiou

    Published 2025-01-01
    “…It is shown that these expressions are essential for designing optimal uplink power allocation (PA) strategies and mitigating SIC error floors, as evidenced by the proposed PA algorithm which achieves significant performance gains. …”
    Get full text
    Article
  6. 4366

    Deep Reinforcement Learning for Efficient Scheduling of Ground-based Astronomical Observations by Hai Cao, Shaoming Hu, Junju Du, Xu Chen, Shuqi Liu, Shuai Feng, Bo Zhang, Yuchen Jiang

    Published 2025-01-01
    “…To support the training of the deep neural network, we propose a scoring mechanism to evaluate the effectiveness of the observations, which is optimized through a refined REINFORCE algorithm with a baseline. …”
    Get full text
    Article
  7. 4367

    Improving parking availability prediction in smart cities with IoT and ensemble-based model by Stéphane Cédric Koumetio Tekouabou, El Arbi Abdellaoui Alaoui, Walid Cherif, Hassan Silkan

    Published 2022-03-01
    “…The tests that we carried out on the Birmingham parking data set allowed to reach a Mean Absolute Error (MAE) of 0.06% on average with the algorithm of Bagging Regression (BR). This results have thus improved the best existing performance by over 6.6% while dramatically reducing system complexity.…”
    Get full text
    Article
  8. 4368

    Ubiquitous memory augmentation via mobile multimodal embedding system by Dongqi Cai, Shangguang Wang, Chen Peng, Zeling Zhang, Zhenyan Lu, Tao Qi, Nicholas D. Lane, Mengwei Xu

    Published 2025-06-01
    “…The core design draws inspiration from the memory functions of the human brain, utilizing coarse-grained embeddings to identify likely candidates, which are then refined through query-driven fine-grained retrieval. A series of algorithm-hardware orchestrated optimizations automatically navigates this process and strengthen the embedding quality. …”
    Get full text
    Article
  9. 4369

    Double Deep Q-Network-Based Solution to a Dynamic, Energy-Efficient Hybrid Flow Shop Scheduling System with the Transport Process by Qinglei Zhang, Huaqiang Si, Jiyun Qin, Jianguo Duan, Ying Zhou, Huaixia Shi, Liang Nie

    Published 2025-02-01
    “…In addition, 36 test instances of varying sizes, simplified from the excavator boom manufacturing process, are designed for comparative experiments with traditional algorithms. The experimental results demonstrate that DDQCE achieves 40% more Pareto-optimal solutions compared to NSGA-II and MOEA/D while requiring 10% less computational time, confirming that this algorithm efficiently solves the TDEHFSP problem.…”
    Get full text
    Article
  10. 4370

    Enhanced Inverse Model Predictive Control for EV Chargers: Solution for Rectifier-Side by Ali Sharida, Abdullah Berkay Bayindir, Sertac Bayhan, Haitham Abu-Rub

    Published 2024-01-01
    “…Then, an adaptive estimation strategy employing a recursive least square algorithm is proposed for online dynamic model estimation, which is then used by the IMPC for optimal switching states prediction. …”
    Get full text
    Article
  11. 4371

    Model‐Free Deep Reinforcement Learning with Multiple Line‐of‐Sight Guidance Laws for Autonomous Underwater Vehicles Full‐Attitude and Velocity Control by Chengren Yuan, Changgeng Shuai, Zhanshuo Zhang, Jianguo Ma, Yuan Fang, YuChen Sun

    Published 2025-08-01
    “…This framework enables seamless switching among guidance modes, such as waypoint following, path following, and trajectory tracking, to achieve optimal attitude control. For comprehensive control of roll, pitch, yaw, and longitudinal velocity, an augmented‐twin delayed deep deterministic policy gradient (A‐TD3) algorithm streamlines the training of the control agent. …”
    Get full text
    Article
  12. 4372

    Toward edge-computing-enabled collision-free scheduling management for autonomous vehicles at unsignalized intersections by Ziyi Lu, Tianxiong Wu, Jinshan Su, Yunting Xu, Bo Qian, Tianqi Zhang, Haibo Zhou

    Published 2024-12-01
    “…Second, this problem is solved with low complexity by the Edge Intelligence Optimal Entry Time (EI-OET) algorithm based on edge-cloud computing power support. …”
    Get full text
    Article
  13. 4373

    Deep Reinforcement Learning-Based Active Disturbance Rejection Control for Trajectory Tracking of Autonomous Ground Electric Vehicles by Xianjian Jin, Huaizhen Lv, Yinchen Tao, Jianning Lu, Jianbo Lv, Nonsly Valerienne Opinat Ikiela

    Published 2025-06-01
    “…The framework integrates active disturbance rejection control (ADRC) for real-time disturbance estimation and compensation with a deep deterministic policy gradient (DDPG)-based deep reinforcement learning (DRL) algorithm for dynamic optimization of controller parameters to improve tracking accuracy and robustness. …”
    Get full text
    Article
  14. 4374

    Inhomogeneous Illumination Image Enhancement Under Extremely Low Visibility Condition by Libang Chen, Jinyan Lin, Qihang Bian, Yikun Liu, Jianying Zhou

    Published 2024-11-01
    “…The grayscale banding is eliminated by incorporating a visual optimization strategy based on image gradients. Maximum Histogram Equalization (MHE) is used to achieve high contrast while maintaining fidelity to the original content. …”
    Get full text
    Article
  15. 4375

    Deep learning-based phase demodulation for distributed acoustic sensor by Yiming Tang, Kewei Liu, Chen Liu, Haiyong Wu, Rugang Wang, Mengmeng Chen, Fei Xu

    Published 2025-08-01
    “…Experimental results demonstrate that the proposed method significantly enhances processing speed while maintaining accuracy comparable to traditional demodulation algorithms. …”
    Get full text
    Article
  16. 4376

    Robust Drone Video Analysis for Occluded Urban Traffic Monitoring Based on Deep Learning by Carlos Gellida-Coutino, Reyes Rios-Cabrera, Alan Maldonado-Ramirez, Anand Sanchez-Orta

    Published 2025-01-01
    “…The results enable precise input for traffic simulators (e.g., PTV-Vissim), supporting data-driven UTM decisions while minimizing costly real-world experimentation.…”
    Get full text
    Article
  17. 4377

    A Novel PAPR in OTFS Systems Through ISSA-PTS and ISPR Techniques by Gerges Mansour Salama, Amira A. Mohamed, Aziza I. Hussein, M. Mourad Mabrook

    Published 2024-01-01
    “…The hybrid ISSA-PTS approach optimizes phase rotations to reduce PAPR, while the ISPR technique further enhances PAPR reduction by iteratively rotating sub-block phases without compromising BER. …”
    Get full text
    Article
  18. 4378

    Nonlinear Model Predictive Control for Trajectory Tracking of Omnidirectional Robot Using Resilient Propagation by Mahmoud El-Sayyah, Mohamad R. Saad, Maarouf Saad

    Published 2025-01-01
    “…This paper proposes an enhanced Nonlinear Model Predictive Control (NMPC) framework that incorporates a robust, convergent variant of the resilient propagation (RPROP) algorithm to efficiently solve the Nonlinear Optimization Problem (NOP) in real time. …”
    Get full text
    Article
  19. 4379

    Research on Iterative Learning Method for Lower Limb Exoskeleton Rehabilitation Robot Based on RBF Neural Network by Jing Li, Huimin Jiang, Moyao Gao, Shuang Li, Zhanli Wang, Zaixiang Pang, Yang Zhang, Yang Jiao

    Published 2025-05-01
    “…MATLAB 2021 simulations demonstrate the proposed algorithm’s superior trajectory tracking performance compared to conventional sliding mode control, effectively eliminating control chattering. …”
    Get full text
    Article
  20. 4380

    A Blockchain-Based Secure Distributed Authentication Scheme for Internet of Vehicles by Zhanfei Ma, Jing Jiang, Hui Wei, Bisheng Wang, Wenli Luo, Haoye Luo, Dongxiang Liu

    Published 2024-01-01
    “…Second, in the IoV authentication process, smart contract technology is used to achieve automatic triggering of the authentication process, and an optimized Practical Byzantine Fault Tolerant Consensus (PBFT) algorithm is designed to add the authentication information to the blockchain ledger so that the authentication results can be reused. …”
    Get full text
    Article