Showing 281 - 300 results of 882 for search 'optimal path (difference OR different)', query time: 0.17s Refine Results
  1. 281
  2. 282

    Correlation of rice yield based on RILs population QTL analysis by Junrong Liu, Xinyi Lou, Lin Zhang, Tiangang Hou, Xin Xin, Yan Wang, Shu Wang, Yuancai Huang, Chanchan Zhou, Baoyan Jia, Yue Feng

    Published 2025-04-01
    “…Additionally, multiple regression analysis and path analysis were employed to investigate the relationship between different agronomic traits and rice yield in the F7 population. …”
    Get full text
    Article
  3. 283

    Improving lifetime of WSN using modified Moth Flame Optimization by Methaq Mahdi Ali, Razieh Asgarnezhad

    Published 2023-09-01
    “…WSNs face difficulties in reducing energy output and shortening life cycles, including node configuration, leader selection, and optimal routing selection. The provisioning of nodes, selection of cluster leaders, and optimal paths have all been recommended using many current methods. …”
    Get full text
    Article
  4. 284

    A Framework for Autonomous UAV Navigation Based on Monocular Depth Estimation by Jonas Gaigalas, Linas Perkauskas, Henrikas Gricius, Tomas Kanapickas, Andrius Kriščiūnas

    Published 2025-03-01
    “…The solution utilizes a depth image estimation model to create an occupancy grid map of the surrounding area and uses an A* path planning algorithm to find optimal paths to end goals while navigating around the obstacles. …”
    Get full text
    Article
  5. 285

    A directed greybox fuzzer for windows applications by Xin Ren, Peng-fei Wang, Xu Zhou, Kai Lu

    Published 2025-07-01
    “…By flexibly selecting the appropriate mode, users can optimize their testing strategies based on different objectives, enhancing the effectiveness and efficiency of the tests. …”
    Get full text
    Article
  6. 286

    A review on planning and control of space robots for on-orbit capture by Qian SUN, Linshuo ZHENG, Yingmin JIA

    Published 2025-04-01
    “…The manipulators could be equipped with different end-effectors to capture space objects and perform various operations. …”
    Get full text
    Article
  7. 287

    Interleaving between Ant Colony Optimization and Tabu Search for Image Matching by Ghusoon Basheer

    Published 2007-12-01
    “…The matching problem consists of determining the unknown transform parameters required to map one image to match the other image(20). Different non – traditional   methods are  used for solving this kind of  problem. …”
    Get full text
    Article
  8. 288
  9. 289

    An effective branch and bound method to find the optimal solution of an assignment problem with maximization objective function by Jairos Kahuru Shinzeh, Halidi Ally Lyeme

    Published 2025-01-01
    “…The constructed method calculates the upper boundary values and selects the maximum value for every row, which qualifies for further branching on a tree diagram. The optimal solution is the sum of the assignment values through the optimal path of a tree diagram by referring to the assignments on the original matrix. …”
    Get full text
    Article
  10. 290

    Optimization of Electricity Consumption using Dielectric Barrier Discharge Method (DBD) by Noushin Dadashzadeh

    Published 2023-03-01
    “…By changing different discharge gaps, the gap has been optimized and as a result, optimized power consumption has been achieved.…”
    Get full text
    Article
  11. 291

    Energy optimization and digitization of the PV energy balance between production and consumption by Abdellatif Hraich, Ali Haddi

    Published 2025-03-01
    “…This study offers solutions to optimize photovoltaic energy production by passing from experimentation using a solar tracking system and a Sun Astronomic Position Algorithm, that incorporates three different degrees of freedom photovoltaic panels mounted in mobile bracket and artificial intelligence optimization using stochastic algorithms. …”
    Get full text
    Article
  12. 292
  13. 293

    Reinforcement learning for process Mining: Business process optimization with avoiding bottlenecks by Ghada Soliman, Kareem Mostafa, Omar Younis

    Published 2025-03-01
    “…In our study, we have implemented Process Mining Environment in OpenAI gym format aimed at enhancing the development of reinforcement learning algorithms for process optimization tasks. The capabilities of these approaches of reinforcement learning using the Q-learning and Deep Q-network (DQN) techniques to identify the optimal path. …”
    Get full text
    Article
  14. 294

    Fuzzy-Logic-Based Energy Optimized Routing for Wireless Sensor Networks by Haifeng Jiang, Yanjing Sun, Renke Sun, Hongli Xu

    Published 2013-08-01
    “…We adopt the social welfare function to predict inequality of residual energy of neighbors after selecting different next hop nodes. Based on energy inequality, the method is designed to compute the degree of energy balance. …”
    Get full text
    Article
  15. 295

    The Path Tracking Control of Unmanned Surface Vehicles Based on an Improved Non-Dominated Sorting Genetic Algorithm II-Based Multi-Objective Nonlinear Model Predictive Control Meth... by Yunzhe Guo, Qidan Zhu, Jinyou Mou

    Published 2024-11-01
    “…Simulations conducted in two different scenarios demonstrate that the nonlinear MPC method based on the improved NSGAII successfully tracks the desired path; it achieved an improvement of approximately 41% in time performance and about 5% in path-tracking error performance, exhibiting strong control performance and robustness.…”
    Get full text
    Article
  16. 296

    Binary program taint analysis optimization method based on function summary by Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU

    Published 2023-04-01
    “…Taint analysis is a popular software analysis method, which has been widely used in the field of information security.Most of the existing binary program dynamic taint analysis frameworks use instruction-level instrumentation analysis methods, which usually generate huge performance overhead and reduce the program execution efficiency by several times or even dozens of times.This limits taint analysis technology’s wide usage in complex malicious samples and commercial software analysis.An optimization method of taint analysis based on function summary was proposed, to improve the efficiency of taint analysis, reduce the performance loss caused by instruction-level instrumentation analysis, and make taint analysis to be more widely used in software analysis.The taint analysis method based on function summary used function taint propagation rules instead of instruction taint propagation rules to reduce the number of data stream propagation analysis and effectively improve the efficiency of taint analysis.For function summary, the definition of function summary was proposed.And the summary generation algorithms of different function structures were studied.Inside the function, a path-sensitive analysis method was designed for acyclic structures.For cyclic structures, a finite iteration method was designed.Moreover, the two analysis methods were combined to solve the function summary generation of mixed structure functions.Based on this research, a general taint analysis framework called FSTaint was designed and implemented, consisting of a function summary generation module, a data flow recording module, and a taint analysis module.The efficiency of FSTaint was evaluated in the analysis of real APT malicious samples, where the taint analysis efficiency of FSTaint was found to be 7.75 times that of libdft, and the analysis efficiency was higher.In terms of accuracy, FSTaint has more accurate and complete propagation rules than libdft.…”
    Get full text
    Article
  17. 297
  18. 298

    Source-detector trajectory optimization for FOV extension in dental CBCT imaging by S M Ragib Shahriar Islam, Ander Biguri, Claudio Landi, Giovanni Di Domenico, Benedikt Schneider, Pascal Grün, Cristina Sarti, Ramona Woitek, Andrea Delmiglio, Carola-Bibiane Schönlieb, Dritan Turhani, Gernot Kronreif, Wolfgang Birkfellner, Sepideh Hatamikia

    Published 2024-12-01
    “…However, these small systems have the limitation of a small field of view (FOV) as the source and detector move at a limited angle in a circular path. This often limits the FOV size. In this study, we addressed this issue by modifying the source-detector trajectory of the small dental device. …”
    Get full text
    Article
  19. 299

    Optimal Scheduling of Hydro-photovoltaic Complementary Systems Based on Multi-objective Moth-flame Algorithm by LI Ze-hong, YUAN Xiao-feng, XIAO Peng, ZHANG Tai-heng, QIN Hui

    Published 2025-06-01
    “…This enabled scheduling operators to select more appropriate solutions based on their prioritization of different objectives. [Conclusions] The proposed multi-objective optimization model effectively coordinates the relationship between power generation benefits and capacity benefits in hydro-photovoltaic complementary systems, providing data support for decision-making in multi-objective optimal scheduling.…”
    Get full text
    Article
  20. 300

    Adaptive Real-Time Transmission in Large-Scale Satellite Networks Through Software-Defined-Networking-Based Domain Clustering and Random Linear Network Coding by Shangpeng Wang, Chenyuan Zhang, Yuchen Wu, Limin Liu, Jun Long

    Published 2025-03-01
    “…It also integrates real-time network state monitoring with optimization algorithms, within a multi-path scheduling strategy, enabling the dynamic selection of optimal transmission paths to accommodate frequent network topology changes and traffic variations. …”
    Get full text
    Article