Showing 1,341 - 1,360 results of 3,205 for search '(improved OR improve) ((((coot OR cost) OR post) OR root) OR most) optimization algorithm', query time: 0.36s Refine Results
  1. 1341

    Dynamic scheduling for flexible job shop based on MachineRank algorithm and reinforcement learning by Fujie Ren, Haibin Liu

    Published 2024-11-01
    “…To improve the quality of the model solutions, a MachineRank algorithm (MR) is proposed, and based on the MR algorithm, seven composite scheduling rules are introduced. …”
    Get full text
    Article
  2. 1342

    Cable Force Optimization of Circular Ring Pylon Cable-Stayed Bridges Based on Response Surface Methodology and Multi-Objective Particle Swarm Optimization by Shengdong Liu, Fei Chen, Qingfu Li, Xiyu Ma

    Published 2025-07-01
    “…Engineers are thereby equipped with a rapid and reliable optimization framework for geometrically complex cable-stayed bridges, delivering significant improvements in structural safety and construction feasibility. …”
    Get full text
    Article
  3. 1343

    Modelling and optimization for cognitive radio networks with preemption backoff mechanism by Yuan Zhao, Zhiyu Xiang, Kang Chen, Zhisheng Ye, Qi Lu

    Published 2022-11-01
    “…To assess the comprehensive performance of our proposed mechanism, we deduce various important expressions of performance indices and get the corresponding performance figures. At last, we design a cost function by compromising various performance indices and find the optimum parameter combination under the lowest system cost through the Transient Search Optimization (TSO) algorithm. …”
    Get full text
    Article
  4. 1344

    Private Stochastic Optimization with Large Worst-Case Lipschitz Parameter by Andrew Lowy, Meisam Razaviyayn

    Published 2025-03-01
    “…To do so, we develop novel algorithmic and stability-based proof techniques, which we believe will be useful for future work in obtaining optimal excess risk. …”
    Get full text
    Article
  5. 1345

    A Cellular Automata-Based Crossover Operator for Binary Chromosome Population Genetic Algorithms by Doru Constantin, Costel Bălcău

    Published 2025-08-01
    “…After presenting the fundamental elements regarding cellular automata with specific examples for one- and two- dimensional cases, the the most widely used crossover operators in applications with genetic algorithms are described, and the crossover operator based on cellular automata is defined. …”
    Get full text
    Article
  6. 1346
  7. 1347

    Third or fourth branchial pouch sinus lesions: a case series and management algorithm by Yun Li, Kexing Lyu, Yihui Wen, Yang Xu, Fanqin Wei, Haocheng Tang, Siyu Chen, Zhangfeng Wang, Xiaolin Zhu, Weiping Wen, Wenbin Lei

    Published 2019-11-01
    “…Conclusion Refining fistula subtypes and adopting corresponding treatment measures can reduce the recurrence rate and improve curative effects. We propose and advocate this treatment algorithm for all third and fourth branchial pouch lesions.…”
    Get full text
    Article
  8. 1348

    LI-YOLO: An Object Detection Algorithm for UAV Aerial Images in Low-Illumination Scenes by Songwen Liu, Hao He, Zhichao Zhang, Yatong Zhou

    Published 2024-11-01
    “…Compared with other current algorithms, LI-YOLO improves the mAP 50 by 3.1% on the DroneVehicle dataset and 6.9% on the LLVIP dataset. …”
    Get full text
    Article
  9. 1349

    Predicting the Likelihood of Operational Risk Occurrence in the Banking Industry Using Machine Learning Algorithms by Hamed Naderi, Mohammad Ali Rastegar Sorkhe, Bakhtiar Ostadi, Mehrdad Kargari

    Published 2025-12-01
    “…Specifically, the RF algorithm achieved an accuracy of 0.9690, while the SVM algorithm attained an accuracy of 0.9587 in State 1, making them the most effective models in this setting. …”
    Get full text
    Article
  10. 1350

    Evaluation of Traditional and Data-Driven Algorithms for Energy Disaggregation Under Sampling and Filtering Conditions by Carlos Rodriguez-Navarro, Francisco Portillo, Isabel Robalo, Alfredo Alcayde

    Published 2025-06-01
    “…Non-intrusive load monitoring (NILM) enables the disaggregation of appliance-level energy consumption from aggregate electrical signals, offering a scalable solution for improving efficiency. This study compared the performance of traditional NILM algorithms (Mean, CO, Hart85, FHMM) and deep neural network-based approaches (DAE, RNN, Seq2Point, Seq2Seq, WindowGRU) under various experimental conditions. …”
    Get full text
    Article
  11. 1351

    DP-YOLO: A Lightweight Real-Time Detection Algorithm for Rail Fastener Defects by Lihua Chen, Qi Sun, Ziyang Han, Fengwen Zhai

    Published 2025-03-01
    “…To enable accurate and efficient real-time detection of rail fastener defects under resource-constrained environments, we propose DP-YOLO, an advanced lightweight algorithm based on YOLOv5s with four key optimizations. …”
    Get full text
    Article
  12. 1352

    Traffic environment perception algorithm based on multi-task feature fusion and orthogonal attention by Zhengfeng LI, Mingen ZHONG, Yihong ZHANG, Kang FAN, Zhiying DENG, Jiawei TAN

    Published 2025-06-01
    “…In the realm of autonomous driving, the design and implementation of collaborative multi-task perception algorithms pose significant challenges. These challenges are primarily rooted in the need for real-time processing speeds, effective feature sharing among diverse tasks, and seamless information fusion. …”
    Get full text
    Article
  13. 1353

    Two-Dimensional Beam Selection by Multiarmed Bandit Algorithm Based on a Quantum Walk by Maki Arai, Tomoki Yamagami, Takatomo Mihana, Ryoichi Horisaki, Mikio Hasegawa

    Published 2025-01-01
    “…Therefore, we formulate a systematic process for beam selection employing the MAB algorithm rooted in QW principles. We derive the optimal parameters of this method to maximize achievable channel capacity. …”
    Get full text
    Article
  14. 1354

    An optimization-inspired intrusion detection model for software-defined networking by Hui Xu, Longtan Bai, Wei Huang

    Published 2025-01-01
    “…The experimental results show that the ESWO-IDM achieves the best performance in all the metrics in both binary classification and multiclassification and has the most prominent effect on the detection of normal, denial of service (DoS), distributed DoS, and Brute Force Attack types, which effectively improves SDN intrusion detection from the viewpoint of optimization.…”
    Get full text
    Article
  15. 1355

    Deep Reinforcement Learning for Optimal Replenishment in Stochastic Assembly Systems by Lativa Sid Ahmed Abdellahi, Zeinebou Zoubeir, Yahya Mohamed, Ahmedou Haouba, Sidi Hmetty

    Published 2025-07-01
    “…This study presents a reinforcement learning–based approach to optimize replenishment policies in the presence of uncertainty, with the objective of minimizing total costs, including inventory holding, shortage, and ordering costs. …”
    Get full text
    Article
  16. 1356
  17. 1357

    Dynamic Node Management for Energy Optimization in Cognitive Radio Systems by Tangsen Huang, Haibing Yin, Xiangdong Yin, Huijun Xiao

    Published 2024-01-01
    “…Compared to traditional algorithms, the dynamic grouping algorithm significantly enhances spectrum sensing performance and improves energy efficiency. …”
    Get full text
    Article
  18. 1358

    Swarm intelligence for energy-efficient heating, ventilation, and air conditioning (HVAC) systems: A case study in smart buildings by Vinoth Kanna I, Raja Subramani, Maher Ali Rusho, Shubham Sharma, Ramachandran T, Abinash Mahapatro, Deepak Gupta, Jasmina Lozanovic

    Published 2025-10-01
    “…This research utilizes swarm intelligence algorithms—Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), and hybrid PSO-ACO-to optimize energy efficiency and thermal comfort in smart building HVAC systems. …”
    Get full text
    Article
  19. 1359

    A Biologically Inspired Cost-Efficient Zero-Trust Security Approach for Attacker Detection and Classification in Inter-Satellite Communication Networks by Sridhar Varadala, Hao Xu

    Published 2025-07-01
    “…The Manta Ray Foraging Optimization (MRFO) algorithm is used to minimize this cost, enabling effective classification of nodes as either trusted or malicious based on historical authentication records and real-time behavior. …”
    Get full text
    Article
  20. 1360

    Two-Stage Energy Storage Allocation Considering Voltage Management and Loss Reduction Requirements in Unbalanced Distribution Networks by Hu Cao, Lingling Ma, Guoying Liu, Zhijian Liu, Hang Dong

    Published 2024-12-01
    “…Finally, simulations are conducted using a modified IEEE-33-node system, and the results obtained using the improved beluga whale optimization algorithm show that the peak-to-valley difference of the system after the addition of energy storage decreased by 43.7% and 51.1% compared to the original system and the system with EV and PV resources added, respectively. …”
    Get full text
    Article