Showing 1,401 - 1,420 results of 3,433 for search 'improve ((cost OR most) OR post) optimization algorithm', query time: 0.31s Refine Results
  1. 1401

    A Heuristic Optical Flow Scheduling Algorithm for Low-Delay Vehicular Visible Light Communication by Zhengying Cai, Shumeng Lei, Jingyi Li, Chen Yu, Junyu Liu, Guoqiang Gong

    Published 2025-07-01
    “…The cost of this algorithm is very low, and it is suitable for deployment on edge computing platforms such as vehicles.…”
    Get full text
    Article
  2. 1402

    Multi-Objective Optimization for Green BTS Site Selection in Telecommunication Networks Using NSGA-II and MOPSO by Salar Babaei, Mehran Khalaj, Mehdi Keramatpour, Ramin Enayati

    Published 2025-01-01
    “…These algorithms were chosen due to their proven efficiency in handling NP-hard optimization problems and their ability to balance exploration and exploitation in search spaces.…”
    Get full text
    Article
  3. 1403

    Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm by Saite CHEN, Weihai LI, Yuanzhi YAO, Nenghai YU

    Published 2023-06-01
    “…The use of location-based service brings convenience to people’s daily lives, but it also raises concerns about users’ location privacy.In the k-nearest neighbor query problem, constructing K-anonymizing spatial regions is a method used to protects users’ location privacy, but it results in a large waste of communication overhead.The SpaceTwist scheme is an alternative method that uses an anchor point instead of the real location to complete the k-nearest neighbor query,which is simple to implement and has less waste of communication overhead.However,it cannot guarantee K-anonymous security, and the specific selection method of the anchor point is not provided.To address these shortcomings in SpaceTwist, some schemes calculate the user’s K-anonymity group by introducing a trusted anonymous server or using the way of user collaboration, and then enhance the end condition of the query algorithm to achieve K-anonymity security.Other schemes propose the anchor point optimization method based on the approximate distribution of interest points, which can further reduce the average communication overhead.A lightweight K-anonymity incremental nearest neighbor (LKINN) location privacy protection algorithm was proposed to improve SpaceTwist.LKINN used convex hull mathematical tool to calculate the key points of K-anonymity group, and proposed an anchor selection method based on it, achieving K-anonymity security with low computational and communication costs.LKINN was based on a hybrid location privacy protection architecture, making only semi-trusted security assumptions for all members of the system, which had lax security assumptions compared to some existing research schemes.Simulation results show that LKINN can prevent semi-trusted users from stealing the location privacy of normal users and has smaller query response time and communication overhead compare to some existing schemes.…”
    Get full text
    Article
  4. 1404

    Comprehensive Comparison and Validation of Forest Disturbance Monitoring Algorithms Based on Landsat Time Series in China by Yunjian Liang, Rong Shang, Jing M. Chen, Xudong Lin, Peng Li, Ziyi Yang, Lingyun Fan, Shengwei Xu, Yingzheng Lin, Yao Chen

    Published 2025-02-01
    “…When considering different forest disturbance types, COLD achieved the highest accuracies for Fire, Harvest, and Other disturbances, while CCDC was most accurate for Forestation. These findings highlight the necessity of region-specific calibration and parameter optimization tailored to specific disturbance types to improve forest disturbance monitoring accuracy, and also provide a solid foundation for future studies on algorithm modifications and ensembles.…”
    Get full text
    Article
  5. 1405

    Stability Analysis and Construction Parameter Optimization of Tunnels in the Fractured Zone of Faults by Banma Huang, Haibo Chen, Chenglong Duan, Wenhu Li

    Published 2022-01-01
    “…In order to improve the construction method of highway tunnel fault, improve the excavation level, improve the construction efficiency, reduce the project cost, and shorten the construction period, so as to find a specific road, this paper puts forward the research method of tunnel stability analysis and construction parameter optimization in the fault fracture zone. …”
    Get full text
    Article
  6. 1406
  7. 1407

    An investigation on energy-saving scheduling algorithm of wireless monitoring sensors in oil and gas pipeline networks by Zhifeng Ma, Zhanjun Hao, Zhenya Zhao

    Published 2024-10-01
    “…Therefore, this paper proposes an energy-saving scheduling algorithm based on transformer networks, aimed at optimizing energy consumption and data transmission efficiency of wireless monitoring sensors in oil and gas pipelines. …”
    Get full text
    Article
  8. 1408

    Marine Voyage Optimization and Weather Routing with Deep Reinforcement Learning by Charilaos Latinopoulos, Efstathios Zavvos, Dimitrios Kaklis, Veerle Leemen, Aristides Halatsis

    Published 2025-04-01
    “…These algorithms are computationally costly, so we split optimization into an offline phase (costly pre-training for a route) and an online phase where the algorithms are fine-tuned as updated weather data become available. …”
    Get full text
    Article
  9. 1409

    Improving the System of Mandatory Requirements to Business under the Digital Transformation of Economy by S. A. Minich

    Published 2023-08-01
    “…Objective: to elaborate scientifically substantiated proposals for improving the system of mandatory requirements in the sphere of business and other economic activity under formation of digital economy, taking into account the foreign experience of eliminating barriers for business and the available practice of legislation optimization in this sphere.Methods: the research methodological basis consists of traditional general and specific methods of scientific cognition: dialectical, formal-logical, historical-comparative, systematic, terminological, general logic methods (analysis, synthesis, generalization, induction, deduction, etc.), as well as special methods: historical-legal, formal-legal, and method of comparative jurisprudence.Results: the author investigated and systematized theoretical approaches and experience of improving the system of mandatory requirements in foreign countries and the Russian Federation; the possibilities of introducing the most successful innovative legal instruments and practices to improve the regulation of economic relations were considered. …”
    Get full text
    Article
  10. 1410

    Post-Quantum Cryptographic Frameworks for Internet of Things (IoT) and Internet of Medical Things (IoMT) Authentication Systems by Thomas L Barna, Samson Isaac, Christopher Habu, Saratu Habu, Abimbola A Joseph

    Published 2025-06-01
    “…This work contributes three key advancements: (1) an optimized NTRU implementation for medical IoT devices, (2) a novel integration of metaheuristic optimization with post-quantum cryptography, and (3) comprehensive validation across IoMT device classes. …”
    Get full text
    Article
  11. 1411

    Multi-objective Optimization Design of Component Cooling System in HPR1000 by ZHAO Weiguang1, 2, YU Pei1, 3, ZENG Xiaobo1, 2, FAN Guangming1, 2, YAN Changqi1, 2

    Published 2025-03-01
    “…To manage this complexity, a novel optimization algorithm was implemented to perform multi-objective optimization. …”
    Get full text
    Article
  12. 1412

    An ensemble agglomerative hierarchical clustering algorithm based on clusters clustering technique and the novel similarity measurement by Teng Li, Amin Rezaeipanah, ElSayed M. Tag El Din

    Published 2022-06-01
    “…Simulations have been performed on some datasets from the UCI repository to evaluate MCEMS scheme compared to state-of-the-art algorithms. Extensive experiments clearly prove the superiority of MCEMS over HMM, DSPA and WHAC algorithms based on Wilcoxon test and Cophenetic correlation coefficient.…”
    Get full text
    Article
  13. 1413

    A Review of Smart Camera Sensor Placement in Construction by Wei Tian, Hao Li, Hao Zhu, Yongwei Wang, Xianda Liu, Rongzheng Yang, Yujun Xie, Meng Zhang, Jun Zhu, Xiangyu Wang

    Published 2024-12-01
    “…This comprehensive review navigates through the complexities of camera and environment models, advocating for advanced optimization techniques like genetic algorithms, greedy algorithms, Swarm Intelligence, and Markov Chain Monte Carlo to refine CSP strategies. …”
    Get full text
    Article
  14. 1414

    Investigating the performance of random oversampling and genetic algorithm integration in meteorological drought forecasting with machine learning by Tahsin Baykal, Özlem Terzi, Gülsün Yıldırım, Emine Dilek Taylan

    Published 2025-05-01
    “…Therefore, this study aims to evaluate the effectiveness of machine learning methods for meteorological drought estimation and to integrate Random Oversampling (ROS) and Genetic Algorithm (GA) methods to improve estimation accuracy. …”
    Get full text
    Article
  15. 1415

    A Two-Stage Bin Packing Algorithm for Minimizing Machines and Operators in Cyclic Production Systems by Yossi Hadad, Baruch Keren

    Published 2025-06-01
    “…The results of our algorithm led to significant cost savings and improved scheduling performance. …”
    Get full text
    Article
  16. 1416

    Non-Vertical Well Trajectory Design Based on Multi-Objective Optimization by Xiaowei Li, Yu Li, Yang Wu, Zhaokai Hou, Haipeng Gu

    Published 2025-07-01
    “…The optimization and control of the wellbore trajectory is one of the important technologies to improve drilling efficiency, reduce drilling cost, and ensure drilling safety in the process of modern oil and gas exploration and development. …”
    Get full text
    Article
  17. 1417

    Critical Component Overheating Monitoring Algorithm Integrating Temperature-sensing Patches and Computer Vision Trains by SHU Dong, ZHANG Beijia, YANG Hongtai

    Published 2025-03-01
    “…In the test on a real dataset, the improved algorithm achieves an accuracy rate of 99.30%.…”
    Get full text
    Article
  18. 1418

    Social Network Analysis: A Novel Paradigm for Improving Community Detection by Rodrigo Hernández, Inmaculada Gutiérrez, Javier Castro

    Published 2025-04-01
    “…One of the most considered philosophies when defining this type of technique is the use of the graph’s adjacency matrix as input and the consideration of modularity as the function to be optimized. …”
    Get full text
    Article
  19. 1419

    Improvement of RT-DETR model for ground glass pulmonary nodule detection. by Siyuan Tang, Qiangqiang Bao, Qingyu Ji, Tong Wang, Naiyu Wang, Min Yang, Yu Gu, Jinliang Zhao, Yuhan Qu, Siriguleng Wang

    Published 2025-01-01
    “…This article proposed an algorithm based on RT-DETR model with the following enhancement: 1) optimize the backbone network with FCGE blocks to increase the detection accuracy of small-sized and blurred edge nodules; 2) replace the AIFI module with HiLo-AIFI module to reduce redundant computation and improve the detection accuracy of pure ground glass pulmonary nodules and mixed ground glass pulmonary nodules; 3) replace the DGAK module with CCFF module to address the issue of capturing complex features and recognition of irregularly shaped ground glass nodules. …”
    Get full text
    Article
  20. 1420

    Development and Comparison of Interrupt-Based and Analog-to-Digital Converter Algorithms for Seed Counting in Precision Planters by A. Ghaffarnezhad, H. Navid, H. Karimi

    Published 2024-12-01
    “…Both developed circuits featured the deployment of the STM32F103C8T6 microcontroller, renowned for its robust capabilities and cost efficiency.In the interrupt-based algorithm's development, the microcontroller's external interrupt was used, selecting its sensitivity to detect both rising and falling edges. …”
    Get full text
    Article