Search alternatives:
improved » improve (Expand Search)
Showing 6,681 - 6,700 results of 7,642 for search '(( improved most optimization algorithm ) OR ( improved model optimization algorithm ))', query time: 0.33s Refine Results
  1. 6681

    Design of Low-Power, High-Precision, and Lightweight Image Recognition System for Multiple Scenes by Gangfeng Yang, Liming Chen, Jianhua Jiang, Chengying Chen, Xindong Huang

    Published 2025-01-01
    “…Aiming at the existing handwritten digit recognition systems with low recognition accuracy, high system power consumption, and high hardware resource consumption, this paper proposes a low-power, high-precision, and lightweight handwritten digit recognition hardware acceleration scheme for multiscenario based on FPGA. By optimizing the network structure of a convolutional neural network (CNN) and the number of parameters of the model, this scheme proposes a high-precision and lightweight network model, simplified CNN, and by optimizing the data access mode and memory usage, and by adopting the strategies of time-sharing and multiplexing, weights sharing, and parallel processing for the hardware acceleration of the algorithm, it effectively reduces the consumption of hardware resources and improves the performance of the system. …”
    Get full text
    Article
  2. 6682

    Research on Status Assessment and Operation and Maintenance of Electric Vehicle DC Charging Stations Based on XGboost by Hualiang Fang, Jiaqi Liao, Shuo Huang, Maojie Zhang

    Published 2024-10-01
    “…The training sample data are established using historical data, online monitoring data, and external environmental data, and the charging station status evaluation model is trained using the XGBoost algorithm. Based on the condition assessment results, a risk assessment model is established in combination with fault parameters. …”
    Get full text
    Article
  3. 6683

    A longan-picking sequence planning method for UAV system based on multi-target tracking by Kaixuan Wu, Meiqi Zhang, Linlin Shi, Hengxu Chen, Yuju Mai, Mingda Luo, Hengyi Lin, Jun Li

    Published 2025-12-01
    “…First, a specialized lightweight target detection algorithm, YOLOv8s-Longan, is developed to achieve high-precision target localization and facilitate lightweight model deployment. …”
    Get full text
    Article
  4. 6684

    Overhead line path planning based on deep reinforcement learning and geographical information system by Jiahui Chen, Yi Yang, Ling Peng, Lina Yang, Yinhui Han, Xingtong Ge

    Published 2025-04-01
    “…Experimental verification of real data shows that compared with existing algorithms, the DSOP method is not only more consistent with the manual line selection effect (improved by more than 3%), but also has a high success rate. …”
    Get full text
    Article
  5. 6685

    An Adaptive Weight Physics-Informed Neural Network for Vortex-Induced Vibration Problems by Ping Zhu, Zhonglin Liu, Ziqing Xu, Junxue Lv

    Published 2025-05-01
    “…In this study, a VIV dataset of a cylindrical body with different degrees of freedom is used to compare the performance of the PINN and three PINN optimization algorithms. The findings suggest that, compared to a standard PINN, the AW-PINN lowers the mean squared error (MSE) on the test set by 50%, significantly improving the prediction accuracy. …”
    Get full text
    Article
  6. 6686

    Intelligent Data Reduction for IoT: A Context-Driven Framework by Laercio Pioli, Douglas D. J. De Macedo, Daniel G. Costa, Mario A. R. Dantas

    Published 2025-01-01
    “…With these predictions based on existing datasets, a selector algorithm module is adopted to identify the most suitable data reduction approach for specific IoT applications. …”
    Get full text
    Article
  7. 6687

    Research on Urban Traffic Signal Control Systems Based on Cyber Physical Systems by Li-li Zhang, Qi Zhao, Li Wang, Ling-yu Zhang

    Published 2020-01-01
    “…Finally, considering China, the system designs a general control strategy API to separate data from control strategy. Most of the popular communication protocols between signal controllers and detectors are private protocols. …”
    Get full text
    Article
  8. 6688

    DS-AdaptNet: An Efficient Retinal Vessel Segmentation Framework With Adaptive Enhancement and Depthwise Separable Convolutions by Shuting Chen, Chengxi Hong, Hong Jia

    Published 2025-01-01
    “…Second, we develop a Context-Aware Adaptive Threshold Optimization (CA-ATO) algorithm that dynamically determines optimal thresholds by integrating multi-scale contextual information and uncertainty estimates, substantially improving boundary delineation accuracy and fine structure preservation. …”
    Get full text
    Article
  9. 6689

    Performance and emission analysis of CI engine fueled with Dunaliella salina biodiesel and TiO₂ nanoparticle additives: Experimental and ANN-based Predictive Approach by V Hariram, S Balamurugan, R Mohan, R Karthick, Nandagopal Kaliappan, K Barathiraja, J Godwin John, K Kamakshi Priya

    Published 2025-09-01
    “…An Artificial Neural Network (ANN) model was developed using the Levenberg-Marquardt algorithm, incorporating 27 datasets generated through a Response Surface Methodology (RSM)-based d-optimal design to predict engine performance and emission characteristics. …”
    Get full text
    Article
  10. 6690

    City-scale industrial tank detection using multi-source spatial data fusion by Zhibao Wang, Mingyuan Zhu, Lu Bai, Jinhua Tao, Mei Wang, Xiaoqing He, Anna Jurek-Loughrey, Liangfu Chen

    Published 2024-12-01
    “…To address this, high-resolution remote sensing images and deep learning algorithms are used to improve the accuracy of industrial storage tank detection at the city scale. …”
    Get full text
    Article
  11. 6691

    Lightweight security architecture design for wireless sensor network by Chao WANG, Guang-yue HU, Huan-guo ZHANG

    Published 2012-02-01
    “…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
    Get full text
    Article
  12. 6692

    Advancements in Herpes Zoster Diagnosis, Treatment, and Management: Systematic Review of Artificial Intelligence Applications by Dasheng Wu, Na Liu, Rui Ma, Peilong Wu

    Published 2025-06-01
    “…Medical images (9/26, 34.6%) and electronic medical records (7/26, 26.9%) were the most commonly used data types. Classification tasks (85.2%) dominated AI applications, with neural networks, particularly multilayer perceptron and convolutional neural networks being the most frequently used algorithms. …”
    Get full text
    Article
  13. 6693

    Space-time coding scheme for the paired weak user in MIMO-NOMA systems by Mingyan GONG, Zhen YANG

    Published 2018-06-01
    “…In view of the paired weak user’s poor outage performance in multiple-input multiple-output non-orthogonal multiple access (MIMO-NOMA) systems,Alamouti code was adopted to encode for the weak user in order to improve its outage performance by means of diversity,and the closed-form expression of the strong user’s ergodic capacity as well as the boundary-form expressions of the weak user’s ergodic capacity and outage probability was derived in the proposed model.Moreover,a power allocation algorithm for optimizing the system’s throughput was proposed.Finally,the numerical results show the accuracy of the derived expressions,the efficacy of the proposed algorithm,and that the weak user’s outage performance in the proposed coding scheme is far superior to that in the current coding scheme only adopting vertical Bell lab layered space-time (V-BLAST) code.…”
    Get full text
    Article
  14. 6694

    Heuristic thermal sensor allocation methods for overheating detection of real microprocessors by Xin Li, Xueting Wei, Wei Zhou

    Published 2017-11-01
    “…On this basis, a heuristic method based on genetic algorithm is proposed to find a near‐optimal thermal sensor allocation solution, which can make overheating detection probability significantly improved with a greatly reduced execution time. …”
    Get full text
    Article
  15. 6695

    Monitoring of Transformer Hotspot Temperature Using Support Vector Regression Combined with Wireless Mesh Networks by Naming Zhang, Guozhi Zhao, Liangshuai Zou, Shuhong Wang, Shuya Ning

    Published 2024-12-01
    “…Subsequently, this study employed a Support Vector Regression (SVR) algorithm to train the sample dataset, optimizing the SVR model using a grid search and cross-validation to enhance the predictive accuracy. …”
    Get full text
    Article
  16. 6696

    Combining Software-Defined and Delay-Tolerant Networking Concepts With Deep Reinforcement Learning Technology to Enhance Vehicular Networks by Olivia Nakayima, Mostafa I. Soliman, Kazunori Ueda, Samir A. Elsagheer Mohamed

    Published 2024-01-01
    “…The study assesses the performance of the multi-protocol approach using metrics: TTL, buffer management,link quality, delivery ratio, Latency and overhead scores for optimal network performance. Comparative analysis with single-protocol VANETs (simulated using the Opportunistic Network Environment (ONE)), demonstrate an improved performance of the proposed algorithm in all VANET scenarios.…”
    Get full text
    Article
  17. 6697

    RRBM-YOLO: Research on Efficient and Lightweight Convolutional Neural Networks for Underground Coal Gangue Identification by Yutong Wang, Ziming Kou, Cong Han, Yuchen Qin

    Published 2024-10-01
    “…The lightweight module RepGhost, the repeated weighted bi-directional feature extraction module BiFPN, and the multi-dimensional attention mechanism MCA were integrated, and different datasets were replaced to enhance the adaptability of the model and improve its generalization ability. The findings from the experiment indicate that the precision of the proposed model is as high as 0.988, the mAP@0.5(%) value and mAP@0.5:0.95(%) values increased by 10.49% and 36.62% compared to the original YOLOv8 model, and the inference speed reached 8.1GFLOPS. …”
    Get full text
    Article
  18. 6698

    Comparative Analysis of Machine Learning Techniques for Fault Diagnosis of Rolling Element Bearing with Wear Defects by Devendra Sahu, Ritesh Kumar Dewangan, Surendra Pal Singh Matharu

    Published 2025-03-01
    “…This optimization of the signal enhancement methodology significantly improved the fault diagnosis accuracy. …”
    Get full text
    Article
  19. 6699

    Predicting weather-related power outages in large scale distribution grids with deep learning ensembles by L. Prieto-Godino, C. Peláez-Rodríguez, J. Pérez-Aracil, J. Pastor-Soriano, S. Salcedo-Sanz

    Published 2025-09-01
    “…This approach not only enhances prediction accuracy compared to individual learners but also improves the generalization ability and robustness of standalone DL models. …”
    Get full text
    Article
  20. 6700

    Predicting Diabetic Retinopathy and Nephropathy Complications Using Machine Learning Techniques by D. R. Manjunath, J. J. Lohith, S. Selva Kumar, Abhijit Das

    Published 2025-01-01
    “…This paper shows the possibility of machine learning based frameworks in diabetic complication management by predicting accurately and in time. These models can be integrated into clinical decision support systems (CDSS) to give insights to clinicians, improve patient outcomes through personalized interventions and optimize resource allocation. …”
    Get full text
    Article