Search alternatives:
coot » cost (Expand Search)
Showing 561 - 580 results of 2,044 for search 'improve (((coot OR post) OR root) OR most) optimization algorithm', query time: 0.32s Refine Results
  1. 561

    Algorithm for Selection Equipment to Reduce the Technogenic Effect on the Environment by Kozii I.S., Plyatsuk L.D., Koval V.V.

    Published 2022-03-01
    “…The proposed algorithm, in contrast to the approaches used in practice, was characterized by the work flexibility due to the possibility of supplementing and improving the databases of pollutants and equipment.…”
    Get full text
    Article
  2. 562

    Hybrid Raft-PoW Blockchain Consensus Algorithm by Mehtap Kose Ulukok, Irfan Sariyildiz, Vesile Evrim

    Published 2025-01-01
    “…The Raft consensus algorithm’s voting mechanism performs well in reliable and well-planned networks with optimized timeouts. …”
    Get full text
    Article
  3. 563

    A Novel Tornado Detection Algorithm Based on XGBoost by Qiangyu Zeng, Guoxiu Zhang, Shangdan Huang, Wenwen Song, Jianxin He, Hao Wang, Yin Liu

    Published 2025-01-01
    “…In addition, the TDA-XGB algorithm combines artificial intelligence-assisted learning to optimize the traditional algorithm based on the tornado vortex signature (TVS) and tornado debris signature (TDS), further improving the detection effect. …”
    Get full text
    Article
  4. 564

    Algorithms for Integrated Object Detection in Wireless Sensor Networks by V. I. Parfenov, T. T. Bui

    Published 2025-05-01
    “…Wireless sensor networks can be used to solve various economic problems, including detection of objects (phenomena) of interest. Most of the well-known information processing algorithms in such networks are built according to a radial architecture. …”
    Get full text
    Article
  5. 565
  6. 566

    The Application of PSO in Structural Damage Detection: An Analysis of the Previously Released Publications (2005–2020) by Parsa Ghannadi, Seyed Sina Kourehli, Seyedali Mirjalili

    Published 2022-09-01
    “…Among different algorithms, the particle swarm optimization (PSO) approach has been of the most popular ones. …”
    Get full text
    Article
  7. 567

    THE ALGORITHM FOR THE TREATMENT OF PATIENTS WITH TREATMENT-RESISTANT HYPERTENSION AT THE OUTPATIENT STAGE by O. S. Kulbachuk, E. V. Sid, O. V. Soloviov, A. V. Piskun

    Published 2023-03-01
    “…Optimization of pharmacotherapy by prescribing drugs with fixed combinations can improve control of drug administration. …”
    Get full text
    Article
  8. 568
  9. 569

    Optimal Design of Integrating Two‐Level Artificial Intelligent With Three Degrees of Freedom‐PDF (TLNF‐3DOFPDF) Controller for AGC of Three‐Area Multi‐Sources Power System... by Getaneh Mesfin Meseret, Rajesh Kumhar, Tarkesh Kumar Mahato, Nishant Kumar, Poonam Lakra, M. D. Mofeed Alam

    Published 2025-04-01
    “…Controller parameters are fine‐tuned using a novel metaheuristic method called the Skill Optimization Algorithm (SOA). The research assesses controller performance using multiple indices Integral of Time‐weighted Squared Error (ITSE), Integral of Squared Error (ISE), Integral of Time‐weighted Absolute Error (ITAE), and Integral of Absolute Error (IAE) and finds that ISE yields the most optimal results. …”
    Get full text
    Article
  10. 570

    Application of Artificial Intelligence Computer Intelligent Heuristic Search Algorithm by Fanghai Gong

    Published 2022-01-01
    “…After 231 iterations of particle swarm optimization algorithm, the optimal value is 6.83650785e-001. …”
    Get full text
    Article
  11. 571

    Multi-objective optimization of HESS control for optimal frequency regulation in a power system with RE penetration by Ousama M.T. Ajami, Rodney H.G. Tan, Mithulan Nadarajah, Farah Adilah Jamaludin, Adlan Bagus Pradana

    Published 2024-12-01
    “…The findings indicate that the Independently Optimized Virtual Synchronous Generator HESS (IO VSG-HESS) achieves the best settling time post-contingency but offers the least improvement in frequency nadir with an average of 0.31 %. …”
    Get full text
    Article
  12. 572

    AI-Driven Optimization of Blockchain Scalability, Security, and Privacy Protection by Fujiang Yuan, Zihao Zuo, Yang Jiang, Wenzhou Shu, Zhen Tian, Chenxi Ye, Junye Yang, Zebing Mao, Xia Huang, Shaojie Gu, Yanhong Peng

    Published 2025-05-01
    “…Artificial intelligence, with its powerful data processing capability, pattern recognition ability, and adaptive optimization algorithms, can improve the transaction processing efficiency of blockchain, enhance the security mechanism, and optimize the privacy protection strategy, thus effectively alleviating the limitations of blockchain in terms of scalability and security. …”
    Get full text
    Article
  13. 573

    Research on SBMPC Algorithm for Path Planning of Rescue and Detection Robot by Lin-Lin Wang, Li-Xin Pan

    Published 2020-01-01
    “…This research aims to improve autonomous navigation of coal mine rescue and detection robot, eliminate the danger for rescuers, and enhance the security of rescue work. …”
    Get full text
    Article
  14. 574

    Timing synchronization algorithm based on clock skew estimation for WSN by Yi SUN, Lu-kun ZENG, Xin WU, Jun LU, Yue SUN

    Published 2015-09-01
    “…In order to solve the problem of poor synchronization stability on classical synchronization algorithm,high overhead on joint clock offset and skew correction synchronization algorithm in wireless sensor network,a timing syn-chronization algorithm based on clock skew estimation for WSN (CSMS) was proposed.The algorithm adopted low-overhead clock offset and skew estimation method to improve the synchronization precision and stability of paired node.At the same time of guaranteeing the stability and accuracy,it realized synchronization with the root node and the neighbors,and optimized synchronization overhead by using the combination of hierarchical network structure and radio listening.The experimental results show that the CSMS algorithm balances energy consumption,accuracy and stability of synchronization.…”
    Get full text
    Article
  15. 575

    Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution by Don Roosan, Rubayat Khan, Saif Nirzhor, Fahmida Hai

    Published 2025-05-01
    “…Context The study proposes and evaluates a novel cybersecurity architecture for telehealth, resilient against future quantum computing cyber threats. By integrating Post-Quantum Cryptography (PQC) with Quantum Key Distribution (QKD) and privacy-preserving mechanisms, data confidentiality and immutability for patient records in a post-quantum era are ensured. …”
    Get full text
    Article
  16. 576

    A Global Path Planning Algorithm Based on Bidirectional SVGA by Taizhi Lv, Chunxia Zhao, Jiancheng Bao

    Published 2017-01-01
    “…This algorithm does not construct a visibility graph before the path optimization. …”
    Get full text
    Article
  17. 577
  18. 578

    Advances in Digital Signature Algorithms: Performance, Security and Future Prospects by Lyu Shuhan

    Published 2025-01-01
    “…The results show that while optimizations improve computational efficiency, challenges persist, especially with potential quantum threats that could undermine these algorithms' security. …”
    Get full text
    Article
  19. 579
  20. 580

    Adaptive Top-K Algorithm for Medical Conversational Diagnostic Model by Yiqing Yang, Guoyin Zhang, Yanxia Wu, Zhixiang Zhao, Yan Fu

    Published 2024-08-01
    “…To improve the efficiency and accuracy of telemedicine diagnostic systems, this study developed an optimized algorithm for the Top-K algorithm. …”
    Get full text
    Article