Search alternatives:
coot » cost (Expand Search)
Showing 1,221 - 1,240 results of 1,851 for search '(improved OR improve) (((coot OR post) OR root) OR most) optimization algorithm', query time: 0.29s Refine Results
  1. 1221

    Intelligent library shelf management system for open-access environments: A CNN-based approach with enhanced image recognition and disorder detection by Xueqi Zhang

    Published 2025-12-01
    “…Experimental results demonstrated that the improved algorithm exhibited superior performance to convolutional neural networks and support vector machine algorithms. …”
    Get full text
    Article
  2. 1222
  3. 1223

    Research on subway settlement prediction based on the WTD-PSR combination and GSM-SVR model by Miren Rong, Chao Feng, Yinping Pang, Hailong Wang, Ying Yuan, Wensong Zhang, Lanxin Luo

    Published 2025-05-01
    “…Furthermore, Particle Swarm Optimization (PSO), Gray Wolf Optimization (GWO), Marine Predators Algorithm (MPA), and Whale Optimization Algorithm (WOA) are introduced to optimize the SVR model, and the prediction performance is compared with that of the Long Short-Term Memory (LSTM) model. …”
    Get full text
    Article
  4. 1224

    Prediction of COD Degradation in Fenton Oxidation Treatment of Kitchen Anaerobic Wastewater Based on IPSO-BP Neural Network by Tianpeng Zhang, Pengfei Ji, Dayong Tian, Rui Xu

    Published 2025-01-01
    “…The Fenton oxidation process is used to treat kitchen anaerobic wastewater, and the effects of H2O2 dosage, Fe2+ dosage, reaction time and pH value on chemical oxygen demand (COD) degradation efficiency are explored. The improved particle swarm optimization (IPSO) algorithm is used to optimize the back propagation (BP) neural network, and a prediction model of COD degradation is established based on IPSO-BP neural network. …”
    Get full text
    Article
  5. 1225

    Constrained total least squares localization using angle of arrival and time difference of arrival measurements in the presence of synchronization clock bias and sensor position er... by Ruirui Liu, Ding Wang, Jiexin Yin, Ying Wu

    Published 2019-07-01
    “…Based on measurements of angle of arrival and time difference of arrival, a method is proposed to improve the accuracy of localization with imperfect sensors. …”
    Get full text
    Article
  6. 1226
  7. 1227

    Machine learning analysis of pharmaceutical cocrystals solubility parameters in enhancing the drug properties for advanced pharmaceutical manufacturing by Tareq Nafea Alharby, Bader Huwaimel

    Published 2025-08-01
    “…Each model’s performance was assessed via measuring Root Mean Square Error (RMSE), R2, Mean Absolute Error (MAE), and Monte Carlo Cross-Validation (CV) scores using a Tabu Search method for optimization. …”
    Get full text
    Article
  8. 1228

    Orchard Navigation Method Based on RS-SC Loop Frame Search Method and SLAM Technology by Ning Xu, Qingshan Meng, Fengping Liu, Zhihe Li, Guangming Wang, Na Guo, Wenxuan Wu

    Published 2025-01-01
    “…In the loop frame matching, an optimization algorithm combining normal distribution transformation and iterative nearest point is used to reduce the cumulative error significantly. …”
    Get full text
    Article
  9. 1229

    Broad learning system based on attention mechanism and tracking differentiator by LIAO Lüchao, ZOU Weidong, YANG Jialong, LU Huihuang, XIA Yuanqing, GAO Jianlei

    Published 2024-09-01
    “…In terms of model structure, A-TD-BLS introduced self-attention mechanism to the original BLS, and further fused and transformed the extracted features through attention weighting to improve the feature learning ability.In terms of model training methods, a weight optimization algorithm based on tracking differentiator was designed.This method effectively alleviates the overfitting phenomenon of the original BLS by limiting the size of the weight values, significantly reduces the influence of the number of hidden layer nodes on model performance and makes the generalization performance more stable.Moreover, the training algorithm was extended to the BLS incremental learning framework, so that the model can improve performance by dynamically adding hidden layer nodes.Multiple experiments conducted on some benchmark datasets show that compared to the original BLS, the classification accuracy of A-TD-BLS is increased by 1.27% on average on classification datasets and the root mean square error of A-TD-BLS is reduced by 0.53 on average on regression datasets.Besides, A-TD-BLS is less affected by the number of hidden layer nodes and has more stable generalization performance. …”
    Get full text
    Article
  10. 1230

    2HR-Net VSLAM: Robust visual SLAM based on dual high-reliability feature matching in dynamic environments. by Wang Yang, Huang Chao, Zhang Yi, Tan Shuyi

    Published 2025-01-01
    “…Finally, the shared matching Siamese network with a unique dual-branch feature fusion strategy and similarity optimization algorithm is proposed to enhance the accuracy of feature matching. …”
    Get full text
    Article
  11. 1231

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  12. 1232

    Optimising the Selection of Input Variables to Increase the Predicting Accuracy of Shear Strength for Deep Beams by Mohammed Majeed Hameed, Faidhalrahman Khaleel, Mohamed Khalid AlOmar, Siti Fatin Mohd Razali, Mohammed Abdulhakim AlSaadi

    Published 2022-01-01
    “…The study found that all applied models were significantly improved by the presence of the GAITH algorithm, except for the MLR model. …”
    Get full text
    Article
  13. 1233

    Optimum Design Research on the Link Mechanism of the JP72 Lifting Jet Fire Truck Boom System by Guo Tong, Wang Jiawen, Liang Yingnan, Peng Buyu, Liu Tao, Liu Yiqun

    Published 2024-12-01
    “…The fmincon function was used to realize the sequential quadratic programming (SQP) algorithm, which is one of the most effective methods to solve the constrained nonlinear optimization problems, for the optimal design. …”
    Get full text
    Article
  14. 1234

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  15. 1235

    A Short-Term Load Forecasting Method Considering Multiple Factors Based on VAR and CEEMDAN-CNN-BILSTM by Bao Wang, Li Wang, Yanru Ma, Dengshan Hou, Wenwu Sun, Shenghu Li

    Published 2025-04-01
    “…Finally, the sine–cosine and Cauchy mutation sparrow search algorithm (SCSSA) is used to optimize the parameters of the combinative model to improve the forecasting accuracy. …”
    Get full text
    Article
  16. 1236
  17. 1237

    Spatio‐temporal dynamic navigation for electric vehicle charging using deep reinforcement learning by Ali Can Erüst, Fatma Yıldız Taşcıkaraoğlu

    Published 2024-12-01
    “…A recently proposed on‐policy actor–critic method, phasic policy gradient (PPG) which extends the proximal policy optimization algorithm with an auxiliary optimization phase to improve training by distilling features from the critic to the actor network, is used to make EVCS decisions on the network where EV travels through the optimal path from origin node to EVCS by considering dynamic traffic conditions, unit value of EV owner and time‐of‐use charging price. …”
    Get full text
    Article
  18. 1238

    Performance evaluation of an adopted model based on big-bang big-crunch and artificial neural network for cloud applications by Pradeep Rawat, Robin Singh Bhadoria, Punit Gupta, Priti Dimri, G. P. Saroha

    Published 2021-08-01
    “…The proposed model is inspired from Big-Bang Big-Crunch algorithm in astrology. The work has been compared with a genetic algorithm, Particle swarm optimization and TOPSIS algorithm. …”
    Get full text
    Article
  19. 1239

    Enhancing 4G/LTE Network Path Loss Prediction with PSO-GWO Hybrid Approach by Messaoud Garah, Nabil Boukhennoufa

    Published 2025-07-01
    “…Furthermore, a hybrid optimization model, PSO-GWO, is proposed to improve prediction accuracy. …”
    Get full text
    Article
  20. 1240

    Adaptive Variational Modal Decomposition–Dual Attention Mechanism Parallel Residual Network: A Tool Lifetime Prediction Method Based on Adaptive Noise Reduction by Jing Kang, Taiyong Wang, Yi Li, Ye Wei, Yaomin Zhang, Ying Tian

    Published 2024-12-01
    “…The method first adapts the parameters of the variational modal noise reduction algorithm using an improved sparrow optimization algorithm, and then reconstructs the original vibration signal with noise reduction. …”
    Get full text
    Article