Search alternatives:
cost » post (Expand Search)
Showing 2,361 - 2,380 results of 2,763 for search '(improved OR improve) (((coot OR cost) OR most) OR root) optimization algorithm', query time: 0.30s Refine Results
  1. 2361

    Lightweight security architecture design for wireless sensor network by Chao WANG, Guang-yue HU, Huan-guo ZHANG

    Published 2012-02-01
    “…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
    Get full text
    Article
  2. 2362

    A Cross-Stage Focused Small Object Detection Network for Unmanned Aerial Vehicle Assisted Maritime Applications by Gege Ding, Jiayue Liu, Dongsheng Li, Xiaming Fu, Yucheng Zhou, Mingrui Zhang, Wantong Li, Yanjuan Wang, Chunxu Li, Xiongfei Geng

    Published 2025-01-01
    “…The CFSD-UAVNet model was evaluated on the publicly available SeaDronesSee maritime dataset and compared with other cutting-edge algorithms. The experimental results showed that the CFSD-UAVNet model achieved an mAP@50 of 80.1% with only 1.7 M parameters and a computational cost of 10.2 G, marking a 12.1% improvement over YOLOv8 and a 4.6% increase compared to DETR. …”
    Get full text
    Article
  3. 2363

    Edge-Fog Computing-Based Blockchain for Networked Microgrid Frequency Support by Ying-Yi Hong, Francisco I. Alano, Yih-der Lee, Chia-Yu Han

    Published 2025-01-01
    “…The parameters and hyperparameters of the LSTM-MFPC are optimized using the Bayesian Adaptive Direct Search (BADS) algorithm. …”
    Get full text
    Article
  4. 2364

    Selective Cleaning Enhances Machine Learning Accuracy for Drug Repurposing: Multiscale Discovery of MDM2 Inhibitors by Mohammad Firdaus Akmal, Ming Wah Wong

    Published 2025-07-01
    “…Cancer remains one of the most formidable challenges to human health; hence, developing effective treatments is critical for saving lives. …”
    Get full text
    Article
  5. 2365

    Comparison of Machine Learning Methods for Predicting Electrical Energy Consumption by Retno Wahyusari, Sunardi Sunardi, Abdul Fadlil

    Published 2025-02-01
    “…Data pre-processing, specifically min-max normalization, is crucial for improving the accuracy of distance-based algorithms like KNN. …”
    Get full text
    Article
  6. 2366

    Intracardiac abscess in the clinical course of infective endocarditis complicated by acute heart failure by Собіров Барно Бобір огли

    Published 2024-12-01
    “…Objective: to determine the optimal diagnostic and treatment algorithm for patients with infective endocarditis complicated by acute heart failure (AHF) and intracardiac abscess. …”
    Get full text
    Article
  7. 2367

    Intelligent Data Reduction for IoT: A Context-Driven Framework by Laercio Pioli, Douglas D. J. De Macedo, Daniel G. Costa, Mario A. R. Dantas

    Published 2025-01-01
    “…With these predictions based on existing datasets, a selector algorithm module is adopted to identify the most suitable data reduction approach for specific IoT applications. …”
    Get full text
    Article
  8. 2368

    Research on Urban Traffic Signal Control Systems Based on Cyber Physical Systems by Li-li Zhang, Qi Zhao, Li Wang, Ling-yu Zhang

    Published 2020-01-01
    “…Finally, considering China, the system designs a general control strategy API to separate data from control strategy. Most of the popular communication protocols between signal controllers and detectors are private protocols. …”
    Get full text
    Article
  9. 2369

    DS-AdaptNet: An Efficient Retinal Vessel Segmentation Framework With Adaptive Enhancement and Depthwise Separable Convolutions by Shuting Chen, Chengxi Hong, Hong Jia

    Published 2025-01-01
    “…Second, we develop a Context-Aware Adaptive Threshold Optimization (CA-ATO) algorithm that dynamically determines optimal thresholds by integrating multi-scale contextual information and uncertainty estimates, substantially improving boundary delineation accuracy and fine structure preservation. …”
    Get full text
    Article
  10. 2370

    Using machine vision to determine the rotational forces of electric motors by O.O. Shelukha, K.V. Molchanova, I.H. Babichev

    Published 2024-06-01
    “…The system has a user interface and allows visualizing the received data. To improve the dynamic characteristics of the system, it is proposed to optimize image processing algorithms, use more powerful computing resources, implement hardware acceleration, and optimize the transmission of the video stream.…”
    Get full text
    Article
  11. 2371

    Deep Mining on the Formation Cycle Features for Concurrent SOH Estimation and RUL Prognostication in Lithium-Ion Batteries by Dongchen Yang, Weilin He, Xin He

    Published 2025-04-01
    “…Models that integrate all formation-related data yielded the lowest root mean square error (RMSE) of 2.928% for capacity estimation and 16 cycles for RUL prediction, highlighting the significant role of surface-level physical features in improving accuracy. …”
    Get full text
    Article
  12. 2372
  13. 2373

    A Fault Detection Framework for Rotating Machinery with a Spectrogram and Convolutional Autoencoder by Hoyeon Lee, Jaehong Yu

    Published 2025-07-01
    “…In modern industrial systems, establishing the optimal maintenance policy for rotating machinery is essential to improve productivity and prevent catastrophic accidents. …”
    Get full text
    Article
  14. 2374

    Intelligent Trust Evaluation Method for Underwater Sensor Networks Based on Fuzzy Clustering and Dynamic Weight Allocation by Zhaohui WANG, Guangjie HAN, Jiaxin DU, Chuan LIN, Lei WANG

    Published 2025-04-01
    “…Then, the unsupervised machine learning algorithm, namely fuzzy C-means clustering, was employed to enable adaptive node trust decision-making. …”
    Get full text
    Article
  15. 2375

    A Pythagorean fuzzy MCDM model for evaluating career happiness in sports by selecting a suitable sport by JiaYan Zhu, Zeng Jiao

    Published 2025-07-01
    “…We present the MCDM algorithm for AHP and the derived AOs, offering solutions to practical numerical examples and identifying optimal sports options that improve career happiness. …”
    Get full text
    Article
  16. 2376

    A Lightweight YOLO-Based Architecture for Apple Detection on Embedded Systems by Juan Carlos Olguín-Rojas, Juan Irving Vasquez, Gilberto de Jesús López-Canteñs, Juan Carlos Herrera-Lozada, Canek Mota-Delfin

    Published 2025-04-01
    “…In Mexico, the manual detection of damaged apples has led to inconsistencies in product quality, a problem that can be addressed by integrating vision systems with machine learning algorithms. The YOLO (You Only Look Once) neural network has significantly improved fruit detection through image processing and has automated several related tasks. …”
    Get full text
    Article
  17. 2377
  18. 2378

    Intelligent Data Processing Methods for the Atypical Values Correction of Stock Quotes by T. V. Zolotova, D. A. Volkova

    Published 2022-05-01
    “…The multiple imputation method creates for each missing value not one, but many imputations, which avoids a systematic error, but at the expense of high computational costs. For the initial data used in the work, the best result was shown by the implementation of the multiple imputation algorithm based on the detected outliers by the support vector method.Conclusion. …”
    Get full text
    Article
  19. 2379

    Notice of Violation of IEEE Publication Principles: Dynamic Embedding and Scheduling of Service Function Chains for Future SDN/NFV-Enabled Networks by Haotong Cao, Hongbo Zhu, Longxiang Yang

    Published 2019-01-01
    “…If the resource and QoS requirements of the VNFs are not satisfied, a re-embedding and re-scheduling scheme will be triggered in order to optimize certain existing VNFs. The dynamic embedding and scheduling algorithm has flexible network function placement and improves the underlying resource utilization. …”
    Get full text
    Article
  20. 2380

    Rapid Quality Assessment of Polygoni Multiflori Radix Based on Near-Infrared Spectroscopy by Bin Jia, Ziying Mai, Chaoqun Xiang, Qiwen Chen, Min Cheng, Longkai Zhang, Xue Xiao

    Published 2024-01-01
    “…After optimizing the model using CARS, R2C increased by 0.15%, 0.41%, and 0.34%, RMSECV decreased by 0.53%, 0.32%, and 0.24%, R2P increased by 0.21%, 0.63%, and 0.35%, RMSEP decreased by 0.36%, 0.41%, and 0.31%, and RPD increased by 1.1, 0.9, and 0.6, significantly improving the predictive capacity of the model. …”
    Get full text
    Article