Showing 1,041 - 1,060 results of 2,763 for search '(cooperation OR composition) algorithm', query time: 0.13s Refine Results
  1. 1041

    Method for Choosing a Balanced Set of Fault Tolerance Techniques for Distributed Computer Cystems by D. Yu. Volkanov

    Published 2016-04-01
    “…The applied method is an evolutionary algorithm with an adaptive logic control procedure. …”
    Get full text
    Article
  2. 1042
  3. 1043

    Bio-inspired swarm intelligence for enhanced real-time aerial tracking: integrating whale optimization and grey wolf optimizer algorithms by GaoFeng Han

    Published 2025-02-01
    “…The UAV swarm optimizes its flight paths using the spiral predation strategy of the WOA (Whale Optimization Algorithm) while employing a Kalman filter to process sensor data. …”
    Get full text
    Article
  4. 1044

    A new model of Fleet Size and Mix Green Inventory Routing Problem, Solution: Multi-Objective Quantum Evolutionary Algorithm by Mohsen Zamani, Mahdi Alinaghian

    Published 2022-09-01
    “…Due to the NP-hard nature of the assessed problem, a meta-heuristic algorithm based on Quantum Evolutionary Algorithm (QEA) is proposed. …”
    Get full text
    Article
  5. 1045

    For a Semiotic Approach to Generative Image AI by Enzo D'Armenio, Maria Giulia Dondero, Adrien Deliège, Alessandro Sarti

    Published 2025-04-01
    “…Here, they will be used as principles of composition and parameters for controlling the results. …”
    Get full text
    Article
  6. 1046

    Land Surface Condition-Driven Emissivity Variation and Its Impact on Diurnal Land Surface Temperature Retrieval Uncertainty by Lijuan Wang, Ping Yue, Yang Yang, Sha Sha, Die Hu, Xueyuan Ren, Xiaoping Wang, Hui Han, Xiaoyu Jiang

    Published 2025-07-01
    “…These findings deepen the understanding of LSE characteristics and provide a scientific basis for refining LST/LSE separation algorithms in thermal infrared remote sensing and for optimizing LSE parameterization schemes in land surface process models for climate and hydrological simulations.…”
    Get full text
    Article
  7. 1047

    An interpretable deep learning framework using FCT-SMOTE and BO-TabNet algorithms for reservoir water sensitivity damage prediction by Yin-bo He, Ke-ming Sheng, Ming-liang Du, Guan-cheng Jiang, Teng-fei Dong, Lei Guo, Bo-tao Xu

    Published 2025-05-01
    “…The proposed framework offers a versatile and reliable solution for precise predictive modeling in complex drilling and completion scenarios reliant on tabular data, thereby providing a robust theoretical foundation and algorithmic support for accurate forecasting in the oil and gas industry.…”
    Get full text
    Article
  8. 1048

    Location privacy-preserving method in LBS based on Voronoi division by AChun-guang M, HOUChang-li Z, ANGSong-tao Y, HAOYun-long Z

    Published 2015-05-01
    “…In view of low efficiency when the anonymous server faces a large number of users,a cooperative anonymous method is proposed for static and dynamic users respectively.Based on the Voronoi division of the global area,a central server organizes the users in its region to achieve cooperative anonymity,the server needn't construct anonymous region alone for each user,and the burden of the server is reduced.In view of providing actual location when users query from a LBS server,a decrease nearest neighbor query algorithm is proposed.A user's actual location is replaced with a stationary anchor location and gets the points of interest candidate set from the LBS server gradually.By running the algorithm,pre-cise results can be got and avoiding exposure to a user's location privacy.The algorithm can also help to reduce the possi-bility of location inference when the anchor chooses closely to the user.Experiments show that our method can guarantee the user's location privacy,and provide a good working efficiency.…”
    Get full text
    Article
  9. 1049

    Hybrid-Pursuit Strategies in Multiple Pursuer-Evader Games Using Reinforcement Learning by Yacun Guan, Wang Xu, Guohua Liu

    Published 2024-01-01
    “…Utilizing a variational autoencoder framework for effective obstacle detection, we integrate the multiagent twin delayed deep deterministic policy gradient algorithm for training pursuers and the proximal policy optimization algorithm for evaders, forming a complete pursuit-evasion strategy. …”
    Get full text
    Article
  10. 1050

    Elastic constants identification for laminated composites using laser doppler vibrometry and an inversion method based on legendre orthogonal polynomial expansion by Hongye Liu, Lei Wang, Xuan Li, Liang Shen, Chongpeng Qiu, Zenghua Liu, Zhenhua Tian

    Published 2025-07-01
    “…This paper presents an ultrasonic guided wave-based inversion approach, which leverages (i) noncontact laser Doppler vibrometry, (ii) frequency-wavenumber analysis, as well as (iii) an inversion algorithm with a unique objective function based on Legendre orthogonal polynomial expansion (LOPE) and genetic algorithm (GA) optimization, for determining the elastic constants of laminated composites. …”
    Get full text
    Article
  11. 1051

    Location privacy-preserving method in LBS based on Voronoi division by AChun-guang M, HOUChang-li Z, ANGSong-tao Y, HAOYun-long Z

    Published 2015-05-01
    “…In view of low efficiency when the anonymous server faces a large number of users,a cooperative anonymous method is proposed for static and dynamic users respectively.Based on the Voronoi division of the global area,a central server organizes the users in its region to achieve cooperative anonymity,the server needn't construct anonymous region alone for each user,and the burden of the server is reduced.In view of providing actual location when users query from a LBS server,a decrease nearest neighbor query algorithm is proposed.A user's actual location is replaced with a stationary anchor location and gets the points of interest candidate set from the LBS server gradually.By running the algorithm,pre-cise results can be got and avoiding exposure to a user's location privacy.The algorithm can also help to reduce the possi-bility of location inference when the anchor chooses closely to the user.Experiments show that our method can guarantee the user's location privacy,and provide a good working efficiency.…”
    Get full text
    Article
  12. 1052

    Optimization Strategy for Building Electrical Devices Considering Multi-Comfort and Economic Virtual Game Players by Xiyong Bao, Zhen Feng, Qiao Yan, Ruiqi Wang

    Published 2025-02-01
    “…Finally, the optimization strategy is solved by using a particle swarm optimization algorithm. The simulation results show that the proposed solution increased comfort by 31.45% and reduced economic costs by 3.89% in comparison to the multi-objective optimization algorithm.…”
    Get full text
    Article
  13. 1053

    Approaches to Interstate Interaction of Circumpolar Countries in the Development of the Arctic by N. I. Didenko, D. F. Skripnuk, N. A. Konakhina

    Published 2021-10-01
    “…Purpose: is to suggest recommendations on the problems of cooperation of circumpolar countries in the Arctic based on the analysis and accumulates the existing economic concepts of interstate interaction.Methods: the work used the methods of classification, induction and deduction, generalization, structuring, statistical and logical analysis, system analysis, algorithmization. …”
    Get full text
    Article
  14. 1054

    Increasing the efficiency of teaching the topic "Burns, frostbites, electric traumas" by means of modern educational technology by Nor N.N.

    Published 2013-12-01
    “…After the discussion the proper decision on the common features of the first aid, treatment, and the algorithm of action is made. Stage 3: the groups share results of the previous clinical experience, sum up, solve situational tasks and tests of level III. …”
    Get full text
    Article
  15. 1055

    Game-Theory-Based Multi-Objective Optimization for Enhancing Environmental and Social Life Cycle Assessment in Steel–Concrete Composite Bridges by David Martínez-Muñoz, Jose V. Martí, Víctor Yepes

    Published 2025-01-01
    “…The optimization process considered four criteria simultaneously, using a discrete version of the SCA algorithm and a transfer function for discretization. …”
    Get full text
    Article
  16. 1056

    Heat Transfer and Ablation Prediction of Carbon/Carbon Composites in a Hypersonic Environment Using Fluid-Thermal-Ablation Multiphysical Coupling by Xuewen Sun, Haibo Yang, Tao Mi

    Published 2020-01-01
    “…Carbon/carbon composites are usually used as a thermal protection material in the nose cap and leading edge of hypersonic vehicles. …”
    Get full text
    Article
  17. 1057

    Parameter Optimization and Bending Performance Analysis of a Corrugated Steel Plate-UHPC Composite Bridge Deck with PZ Shear Connectors by Anhua Wang, Xiaobo Zheng, Wei Hou, Shuanhai He

    Published 2022-01-01
    “…This paper presents a methodology to optimize the parameters and mechanical performance of a corrugated steel plate-ultrahigh-performance concrete (UHPC) composite bridge deck with panel zone (PZ) shear connectors using the improved non-dominated sorting genetic algorithm (NSGA-II). …”
    Get full text
    Article
  18. 1058
  19. 1059

    IHDETBO: A Novel Optimization Method of Multi-Batch Subtasks Parallel-Hybrid Execution Cloud Service Composition for Cloud Manufacturing by Li-Nan Zhu, Peng-Hang Li, Xiao-Long Zhou

    Published 2019-01-01
    “…In this paper, a new manufacturing service composition scheme named as Multi-Batch Subtasks Parallel-Hybrid Execution Cloud Service Composition for Cloud Manufacturing (MBSPHE-CSCCM) is proposed, and such composition is one of the most difficult combination optimization problems with NP-hard complexity. …”
    Get full text
    Article
  20. 1060

    Cost-Based Optimal Allocation of Shunt Capacitors in Radial Distribution Networks Considering Load Types Using Crow Search Algorithm by Stephen W. Mathenge, Edwell. T. Mharakurwa, Lucas Mogaka

    Published 2025-01-01
    “…This included evaluating the impact of varying capacitor sizing ranges, system sizes, load compositions, and algorithm initialization conditions. …”
    Get full text
    Article