Showing 1,541 - 1,560 results of 3,764 for search 'improve (((coot OR (cost OR post)) OR most) OR root) optimization algorithm', query time: 0.46s Refine Results
  1. 1541

    Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm by Saite CHEN, Weihai LI, Yuanzhi YAO, Nenghai YU

    Published 2023-06-01
    “…The use of location-based service brings convenience to people’s daily lives, but it also raises concerns about users’ location privacy.In the k-nearest neighbor query problem, constructing K-anonymizing spatial regions is a method used to protects users’ location privacy, but it results in a large waste of communication overhead.The SpaceTwist scheme is an alternative method that uses an anchor point instead of the real location to complete the k-nearest neighbor query,which is simple to implement and has less waste of communication overhead.However,it cannot guarantee K-anonymous security, and the specific selection method of the anchor point is not provided.To address these shortcomings in SpaceTwist, some schemes calculate the user’s K-anonymity group by introducing a trusted anonymous server or using the way of user collaboration, and then enhance the end condition of the query algorithm to achieve K-anonymity security.Other schemes propose the anchor point optimization method based on the approximate distribution of interest points, which can further reduce the average communication overhead.A lightweight K-anonymity incremental nearest neighbor (LKINN) location privacy protection algorithm was proposed to improve SpaceTwist.LKINN used convex hull mathematical tool to calculate the key points of K-anonymity group, and proposed an anchor selection method based on it, achieving K-anonymity security with low computational and communication costs.LKINN was based on a hybrid location privacy protection architecture, making only semi-trusted security assumptions for all members of the system, which had lax security assumptions compared to some existing research schemes.Simulation results show that LKINN can prevent semi-trusted users from stealing the location privacy of normal users and has smaller query response time and communication overhead compare to some existing schemes.…”
    Get full text
    Article
  2. 1542

    Comprehensive Comparison and Validation of Forest Disturbance Monitoring Algorithms Based on Landsat Time Series in China by Yunjian Liang, Rong Shang, Jing M. Chen, Xudong Lin, Peng Li, Ziyi Yang, Lingyun Fan, Shengwei Xu, Yingzheng Lin, Yao Chen

    Published 2025-02-01
    “…When considering different forest disturbance types, COLD achieved the highest accuracies for Fire, Harvest, and Other disturbances, while CCDC was most accurate for Forestation. These findings highlight the necessity of region-specific calibration and parameter optimization tailored to specific disturbance types to improve forest disturbance monitoring accuracy, and also provide a solid foundation for future studies on algorithm modifications and ensembles.…”
    Get full text
    Article
  3. 1543

    Stability Analysis and Construction Parameter Optimization of Tunnels in the Fractured Zone of Faults by Banma Huang, Haibo Chen, Chenglong Duan, Wenhu Li

    Published 2022-01-01
    “…In order to improve the construction method of highway tunnel fault, improve the excavation level, improve the construction efficiency, reduce the project cost, and shorten the construction period, so as to find a specific road, this paper puts forward the research method of tunnel stability analysis and construction parameter optimization in the fault fracture zone. …”
    Get full text
    Article
  4. 1544

    An investigation on energy-saving scheduling algorithm of wireless monitoring sensors in oil and gas pipeline networks by Zhifeng Ma, Zhanjun Hao, Zhenya Zhao

    Published 2024-10-01
    “…Therefore, this paper proposes an energy-saving scheduling algorithm based on transformer networks, aimed at optimizing energy consumption and data transmission efficiency of wireless monitoring sensors in oil and gas pipelines. …”
    Get full text
    Article
  5. 1545

    Marine Voyage Optimization and Weather Routing with Deep Reinforcement Learning by Charilaos Latinopoulos, Efstathios Zavvos, Dimitrios Kaklis, Veerle Leemen, Aristides Halatsis

    Published 2025-04-01
    “…These algorithms are computationally costly, so we split optimization into an offline phase (costly pre-training for a route) and an online phase where the algorithms are fine-tuned as updated weather data become available. …”
    Get full text
    Article
  6. 1546

    Creation of a Custom 3D Algorithm for Proper Alignment of Straight Nails in Tibiotalocalcaneal Arthrodesis by Omer Subasi PhD, Wei Shao Tung BS, Julian Hollander Bsc, Samir Ghandour MD, Atta Taseh MD, Nour Nassour MD, Adarsh Aratikatla, Alireza Ebrahimi MD, Bernard Burgesson MD, Soheil Ashkani-Esfahani MD, John Y. Kwon MD

    Published 2024-12-01
    “…Conclusion: A straight nail passing through the sustentaculum tali places surrounding neurovascular structures at risk and can also compromise the biomechanical stability of the implant. Our novel 3D algorithm shows that intraoperative adjustment of the starting point lateral to the central tibial axis is required to obtain optimal alignment of the hindfoot nail. …”
    Get full text
    Article
  7. 1547

    Improving the System of Mandatory Requirements to Business under the Digital Transformation of Economy by S. A. Minich

    Published 2023-08-01
    “…Objective: to elaborate scientifically substantiated proposals for improving the system of mandatory requirements in the sphere of business and other economic activity under formation of digital economy, taking into account the foreign experience of eliminating barriers for business and the available practice of legislation optimization in this sphere.Methods: the research methodological basis consists of traditional general and specific methods of scientific cognition: dialectical, formal-logical, historical-comparative, systematic, terminological, general logic methods (analysis, synthesis, generalization, induction, deduction, etc.), as well as special methods: historical-legal, formal-legal, and method of comparative jurisprudence.Results: the author investigated and systematized theoretical approaches and experience of improving the system of mandatory requirements in foreign countries and the Russian Federation; the possibilities of introducing the most successful innovative legal instruments and practices to improve the regulation of economic relations were considered. …”
    Get full text
    Article
  8. 1548
  9. 1549

    Post-Quantum Cryptographic Frameworks for Internet of Things (IoT) and Internet of Medical Things (IoMT) Authentication Systems by Thomas L Barna, Samson Isaac, Christopher Habu, Saratu Habu, Abimbola A Joseph

    Published 2025-06-01
    “…This work contributes three key advancements: (1) an optimized NTRU implementation for medical IoT devices, (2) a novel integration of metaheuristic optimization with post-quantum cryptography, and (3) comprehensive validation across IoMT device classes. …”
    Get full text
    Article
  10. 1550

    Multi-objective Optimization Design of Component Cooling System in HPR1000 by ZHAO Weiguang1, 2, YU Pei1, 3, ZENG Xiaobo1, 2, FAN Guangming1, 2, YAN Changqi1, 2

    Published 2025-03-01
    “…To manage this complexity, a novel optimization algorithm was implemented to perform multi-objective optimization. …”
    Get full text
    Article
  11. 1551

    An ensemble agglomerative hierarchical clustering algorithm based on clusters clustering technique and the novel similarity measurement by Teng Li, Amin Rezaeipanah, ElSayed M. Tag El Din

    Published 2022-06-01
    “…Simulations have been performed on some datasets from the UCI repository to evaluate MCEMS scheme compared to state-of-the-art algorithms. Extensive experiments clearly prove the superiority of MCEMS over HMM, DSPA and WHAC algorithms based on Wilcoxon test and Cophenetic correlation coefficient.…”
    Get full text
    Article
  12. 1552

    A Review of Smart Camera Sensor Placement in Construction by Wei Tian, Hao Li, Hao Zhu, Yongwei Wang, Xianda Liu, Rongzheng Yang, Yujun Xie, Meng Zhang, Jun Zhu, Xiangyu Wang

    Published 2024-12-01
    “…This comprehensive review navigates through the complexities of camera and environment models, advocating for advanced optimization techniques like genetic algorithms, greedy algorithms, Swarm Intelligence, and Markov Chain Monte Carlo to refine CSP strategies. …”
    Get full text
    Article
  13. 1553

    Investigating the performance of random oversampling and genetic algorithm integration in meteorological drought forecasting with machine learning by Tahsin Baykal, Özlem Terzi, Gülsün Yıldırım, Emine Dilek Taylan

    Published 2025-05-01
    “…Therefore, this study aims to evaluate the effectiveness of machine learning methods for meteorological drought estimation and to integrate Random Oversampling (ROS) and Genetic Algorithm (GA) methods to improve estimation accuracy. …”
    Get full text
    Article
  14. 1554

    A Two-Stage Bin Packing Algorithm for Minimizing Machines and Operators in Cyclic Production Systems by Yossi Hadad, Baruch Keren

    Published 2025-06-01
    “…The results of our algorithm led to significant cost savings and improved scheduling performance. …”
    Get full text
    Article
  15. 1555

    Optimizing concrete strength: How nanomaterials and AI redefine mix design by Dan Huang, Guangshuai Han, Ziyang Tang

    Published 2025-07-01
    “…XGB was identified as the most effective ML algorithm for predicting compressive strength among others in this study (R2=0.974). …”
    Get full text
    Article
  16. 1556
  17. 1557

    Non-Vertical Well Trajectory Design Based on Multi-Objective Optimization by Xiaowei Li, Yu Li, Yang Wu, Zhaokai Hou, Haipeng Gu

    Published 2025-07-01
    “…The optimization and control of the wellbore trajectory is one of the important technologies to improve drilling efficiency, reduce drilling cost, and ensure drilling safety in the process of modern oil and gas exploration and development. …”
    Get full text
    Article
  18. 1558

    Critical Component Overheating Monitoring Algorithm Integrating Temperature-sensing Patches and Computer Vision Trains by SHU Dong, ZHANG Beijia, YANG Hongtai

    Published 2025-03-01
    “…In the test on a real dataset, the improved algorithm achieves an accuracy rate of 99.30%.…”
    Get full text
    Article
  19. 1559

    Social Network Analysis: A Novel Paradigm for Improving Community Detection by Rodrigo Hernández, Inmaculada Gutiérrez, Javier Castro

    Published 2025-04-01
    “…One of the most considered philosophies when defining this type of technique is the use of the graph’s adjacency matrix as input and the consideration of modularity as the function to be optimized. …”
    Get full text
    Article
  20. 1560

    A Novel Two-Stage Learning-Based Phase Unwrapping Algorithm via Multimodel Fusion by Chao Yan, Tao Li, Yandong Gao, Shijin Li, Xiang Zhang, Xuefei Zhang, Di Zhang, Huiqin Liu

    Published 2025-01-01
    “…To solve this problem, this paper combines a deep neural network model with the traditional PhU model and proposes a novel two-stage learning-based phase unwrapping (TLPU) algorithm via multimodel fusion. The major advantages of TLPU are as follows: 1) A high-resolution U-Net (HRU-Net) model trained on a dataset constructed according to InSAR interferometric geometry is utilized for the PhU for the first time, which effectively improves the performance of the DLPU. 2) TLPU utilizes the traditional PhU method to optimize the results of DLPU, addressing the issue of weak generalization ability of a single DLPU, while improving accuracy in areas with large-gradient changes. …”
    Get full text
    Article