Search alternatives:
selection » detection (Expand Search)
Showing 1,121 - 1,140 results of 3,601 for search 'complex (reflection OR selection) efficiency', query time: 0.20s Refine Results
  1. 1121
  2. 1122
  3. 1123
  4. 1124
  5. 1125

    Intrusion Detection System to Advance Internet of Things Infrastructure-Based Deep Learning Algorithms by Hasan Alkahtani, Theyazn H. H. Aldhyani

    Published 2021-01-01
    “…In this framework, three advanced deep learning algorithms were applied to classify the intrusion: a convolution neural network (CNN), a long short-term memory (LSTM), and a hybrid convolution neural network with the long short-term memory (CNN-LSTM) model. The complexity of the network dataset was dimensionality reduced, and to improve the proposed system, the particle swarm optimization method (PSO) was used to select relevant features from the network dataset. …”
    Get full text
    Article
  6. 1126
  7. 1127
  8. 1128

    Two-stage deep reinforcement learning method for agile optical satellite scheduling problem by Zheng Liu, Wei Xiong, Zhuoya Jia, Chi Han

    Published 2024-11-01
    “…First, the scheduling process is decomposed into a task sequencing stage and an observation scheduling stage, and a mathematical model with complex constraints and two-stage optimization objectives is established to describe the problem. …”
    Get full text
    Article
  9. 1129
  10. 1130

    VTformer: a novel multiscale linear transformer forecaster with variate-temporal dependency for multivariate time series by Rui Dai, Zheng Wang, Jing Jie, Wanliang Wang, Qianlin Ye

    Published 2025-04-01
    “…To this end, we reflect on the competence of Transformer components and present an efficient lightweight Transformer forecaster named VTformer. …”
    Get full text
    Article
  11. 1131
  12. 1132
  13. 1133
  14. 1134
  15. 1135
  16. 1136
  17. 1137

    Target pursuit for multi-AUV system: zero-sum stochastic game with WoLF-PHC assisted by Le Hong, Weicheng Cui

    Published 2025-03-01
    “…Under this framework, a relay-pursuit mechanism is adopted by the pursuit system to form the action set in an energy-efficient way. Then, to reflect the pursuit goals of capturing the invading vehicle as soon as possible and avoid it from reaching its point of attack, two corresponding pursuit factors are considered in the designed reward function. …”
    Get full text
    Article
  18. 1138

    Suitability of Blockchain for Storing Private Data from IoT Devices by Marija Cekuš, János Simon

    Published 2024-12-01
    “…Concurrently, blockchain technology has rapidly evolved, providing new avenues for storing data securely, efficiently, and in near real-time. This article investigates the suitability of various blockchain platforms for Internet of Things data storage, selecting seven platforms – namely, IOTA, Signum, Ethereum, Solana, Polygon, Stellar, and Hyperledger Sawtooth. …”
    Get full text
    Article
  19. 1139

    A multiobjective evolutionary algorithm incorporating neighborhood detection for the vehicle routing problem with soft time windows by Hao Jiang, Zhiwei Zhang, Chao Wang, Xiaoshu Xiang

    Published 2025-08-01
    “…However, existing research mainly focuses on improving solution quality within large and diverse neighborhoods, often resulting in increased computational complexity and the risk of getting trapped in local optima. …”
    Get full text
    Article
  20. 1140