-
481
Optimized PID controller and model order reduction of reheated turbine for load frequency control using teaching learning-based optimization
Published 2025-01-01“…Abstract Load frequency control (LFC) systems in power grids face challenges in maintaining stability while managing computational complexity. This research presents an optimized approach combining model order reduction techniques with Teaching Learning-Based Optimization (TLBO) for PID controller tuning in single-area LFC systems. …”
Get full text
Article -
482
Joint Active/Passive Beamforming Optimization via RWMMSE and Gradient Projection for Downlink IRS-Aided MU-MISO Systems
Published 2025-01-01“…The proper reconfiguration of its elements, which is the primary task towards achieving these prospects, has been previously explored by many researchers, where most proposals are characterized by high computational complexity. This study builds upon previous research on downlink IRS-assisted multi-user multiple-input single-output (MISO) systems by introducing innovative methods to accelerate their operations. …”
Get full text
Article -
483
Retracted: Computer Medical Image Segmentation Based on Neural Network
Published 2020-01-01“…This method introduces a non-linear template and data quantization on the basis of a basic network model, which greatly reduces the computational complexity while maintaining the accuracy of image segmentation. …”
Get full text
Article -
484
TBF-YOLOv8n: A Lightweight Tea Bud Detection Model Based on YOLOv8n Improvements
Published 2025-01-01“…To solve the problem of the high computational complexity of deep learning detection models, we developed the Tea Bud DSCF-YOLOv8n (TBF-YOLOv8n)lightweight detection model. …”
Get full text
Article -
485
A Modified WASPAS Method for the Evaluation of E-Commerce Websites Based on Pythagorean Fuzzy Information
Published 2025-01-01“…The proposed approach significantly enhanced performance and reduced computational complexity, making it a promising tool for real-time detection and prediction of the efficiency of employees in various organizations and a tool for growth.…”
Get full text
Article -
486
Autonomous security analysis and penetration testing model based on attack graph and deep Q-learning network
Published 2023-12-01“…With the continuous development and widespread application of network technology, network security issues have become increasingly prominent.Penetration testing has emerged as an important method for assessing and enhancing network security.However, traditional manual penetration testing methods suffer from inefficiency,human error, and tester skills, leading to high uncertainty and poor evaluation results.To address these challenges, an autonomous security analysis and penetration testing framework called ASAPT was proposed, based on attack graphs and deep Q-learning networks (DQN).The ASAPT framework was consisted of two main components:training data construction and model training.In the training data construction phase, attack graphs were utilized to model the threats in the target network by representing vulnerabilities and possible attacker attack paths as nodes and edges.By integrating the common vulnerability scoring system (CVSS) vulnerability database, a “state-action”transition matrix was constructed, which depicted the attacker’s behavior and transition probabilities in different states.This matrix comprehensively captured the attacker’s capabilities and network security status.To reduce computational complexity, a depth-first search (DFS) algorithm was innovatively applied to simplify the transition matrix, identifying and preserving all attack paths that lead to the final goal for subsequent model training.In the model training phase, a deep reinforcement learning algorithm based on DQN was employed to determine the optimal attack path during penetration testing.The algorithm interacted continuously with the environment, updating the Q-value function to progressively optimize the selection of attack paths.Simulation results demonstrate that ASAPT achieves an accuracy of 84% in identifying the optimal path and exhibits fast convergence speed.Compared to traditional Q-learning, ASAPT demonstrates superior adaptability in dealing with large-scale network environments, which could provide guidance for practical penetration testing.…”
Get full text
Article -
487
Improving Industrial Quality Control: A Transfer Learning Approach to Surface Defect Detection
Published 2025-01-01“…The results revealed that the two illumination modes employed widened the type of defects that could be identified with this system, while maintaining its lower computational complexity by performing multi-modal fusion at the decision level. …”
Get full text
Article -
488
Improved printed circuit board defect detection scheme
Published 2025-01-01“…Furthermore, in order to further enhance the interaction and fusion of multi-scale features, we also add a SlimNeck module to the neck structure, which realizes efficient information transfer through streamlined design and reduces computational complexity at the same time. In addition, we draw on the advanced BiFPN structure, which enables the bidirectional flow of feature information between multiple layers and greatly improves the capture and integration of small target features. …”
Get full text
Article -
489
A multimodal multistream multilevel fusion network for finger joint angle estimation with hybrid sEMG and FMG sensing
Published 2025-01-01“…The experimental results suggest that the MMMFNet has higher estimation accuracy (RMSE: 6.225±0.276 vs. 6.953±0.282, R2: 0.879±0.019 vs 0.846±0.021), shorter training time (4.146±0.074 min vs. 16.536±0.430 min), and lower computational complexity (5.4×106 FLOPs vs 8.8×106 FLOPs) than state-of-the-art fusion methods. …”
Get full text
Article -
490
Hybrid optimization of EDLP and high-low pricing strategies
Published 2025-01-01“…However, as retail applications scale up, the computational complexity becomes more challenging, necessitating the use of the Grey Wolf Optimization (GWO) algorithm. …”
Get full text
Article -
491
Key frame extraction algorithm for surveillance videos using an evolutionary approach
Published 2025-01-01“…Furthermore, the computational complexity of the GA is intricately compared to that of DE and DL-based approaches, highlighting the distinct efficiencies and performance features.…”
Get full text
Article -
492
Devanagari Character Recognition: A Comprehensive Literature Review
Published 2025-01-01“…Hybrid approaches that combine multiple techniques have shown promising results, balancing accuracy and computational complexity. Challenges remain, including handwriting variability, noise, and the need for real-time performance. …”
Get full text
Article -
493
A Special Points and Neural Network-Based Dynamic Multi-Objective Optimization Algorithm
Published 2025-01-01“…SPNN-DMOA only needs to maintain non-dominated solutions in proximity to special points, which reduces the computational complexity in the dynamic evolution process. …”
Get full text
Article -
494
Fast Ways to Detect Outliers
Published 2021-03-01“…In this research, we aim to develop easy methods for detecting outliers in big data, as the problem that this research addresses is that many of the newly developed methods for detecting outliers suffer from computational complexity or are efficient when the sample size is small. …”
Get full text
Article -
495
Time-Efficient Contact Consistent Whole-Body Control Framework via Reduced-Dimension Dynamics Construction
Published 2025-01-01“…Whole-body control frameworks for highly redundant, floating-base robots like humanoids are challenging due to the increased computational complexity arising from their high degrees of freedom. …”
Get full text
Article -
496
Inference Attacks on Genomic Data Based on Probabilistic Graphical Models
Published 2020-09-01“…Existing genome inferences have relatively high computational complexity with the input of tens of millions of SNPs and human traits. …”
Get full text
Article -
497
An Improved Hierarchical Optimization Framework for Walking Control of Underactuated Humanoid Robots Using Model Predictive Control and Whole Body Planner and Controller
Published 2025-01-01“…At the high level, we employ a matrix exponential (ME)-based discretization of the MPC, ensuring numerical stability across a wide range of step sizes (5 to 100 ms), thereby reducing computational complexity without sacrificing control quality. …”
Get full text
Article -
498
Artificial molecular communication network based on DNA nanostructures recognition
Published 2025-01-01“…By the establishment of a node partition algorithm for path traversal based on DR-AMCN, the computational complexity of the seven-node Hamiltonian path problem is reduced with the final solution directly obtained through the rate-zonal centrifugation method, and scalability of this approach is also demonstrated. …”
Get full text
Article -
499
A Modified Salp Swarm Algorithm Based on the Perturbation Weight for Global Optimization Problems
Published 2020-01-01“…The proposed perturbation weight salp swarm algorithm has the advantages of a broad search scope and a strong balance between exploration and exploitation and retains a relatively low computational complexity when dealing with numerous large-scale problems. …”
Get full text
Article -
500
A novel transmission-augmented deep unfolding network with consideration of residual recovery
Published 2025-01-01“…Nevertheless, these iterative algorithms suffer from the high computational complexity. The fashionable deep network-based methods can achieve high-precision CS reconstruction with satisfactory speed but are short of theoretical analysis and interpretability. …”
Get full text
Article