Showing 241 - 260 results of 495 for search 'while share algorithm', query time: 0.08s Refine Results
  1. 241

    Multi task detection method for operating status of belt conveyor based on DR-YOLOM by Yongan LI, Tengjie CHEN, Hongwei WANG, Zhihao ZHANG

    Published 2025-06-01
    “…The results show that compared to mainstream single detection algorithms, DR-YOLOM multi task detection algorithm has better comprehensive detection ability, and this algorithm can ensure high target recognition accuracy, segmentation accuracy, and appropriate inference speed with a small number of parameters. …”
    Get full text
    Article
  2. 242

    Determinants of depressive symptoms in multinational middle-aged and older adults by Can Lu, Shenwei Wan, Zhiyong Liu

    Published 2025-08-01
    “…Abstract This study harnesses machine learning to dissect the complex socioeconomic determinants of depression risk among older adults across five international cohorts (HRS, ELSA, SHARE, CHARLS, MHAS). Evaluating six predictive algorithms, XGBoost demonstrated superior performance in four cohorts (AUC 0.7677–0.8771), while LightGBM excelled in ELSA (AUC 0.9011). …”
    Get full text
    Article
  3. 243

    Control strategy of robotic manipulator based on multi-task reinforcement learning by Tao Wang, Ziming Ruan, Yuyan Wang, Chong Chen

    Published 2025-02-01
    “…To tackle this issue, instead of uniform parameter sharing, we propose an adjudicate reconfiguration network model, which we integrate into the Soft Actor-Critic (SAC) algorithm to address the optimization problems brought about by parameter sharing in multi-task reinforcement learning algorithms. …”
    Get full text
    Article
  4. 244

    Fog Service Placement Optimization: A Survey of State-of-the-Art Strategies and Techniques by Hemant Kumar Apat, Veena Goswami, Bibhudatta Sahoo, Rabindra K. Barik, Manob Jyoti Saikia

    Published 2025-03-01
    “…To process these data, it requires substantial computing and storage resources for smooth implementation and execution. While centralized cloud computing offers scalability, flexibility, and resource sharing, it faces significant limitations in IoT-based applications, especially in terms of latency, bandwidth, security, and cost. …”
    Get full text
    Article
  5. 245

    Detection of water surface targets based on improved Deformable DETR by Pengjiu WANG, Junbin Gong, Wei LUO, Xiao HUANG, Junjie GUO

    Published 2025-06-01
    “…The algorithm is designed to significantly enhance the inference and training speed of the model while improving detection accuracy, thus achieving more efficient and robust detection of water surface targets. …”
    Get full text
    Article
  6. 246

    A novel approach for music genre identification using ZFNet, ELM, and modified electric eel foraging optimizer by Shuang Zhang, Zhiyong Sun, Hasan Jafari

    Published 2025-04-01
    “…The present research suggests a new method for music genre identification via integrating deep learning models with a metaheuristic algorithm. The proposed model uses a pre-trained Zeiler and Fergus Network (ZFNet) to extract high-level features from audio signals, while an Extreme Learning Machines (ELM) is utilized for efficient classification. …”
    Get full text
    Article
  7. 247

    Low latency Montgomery multiplier for cryptographic applications by khalid javeed, Muhammad Huzaifa, Safiullah Khan, Atif Raza Jafri

    Published 2021-07-01
    “…The proposed Montgomery multiplier is based on school-book multiplier, Karatsuba-Ofman algorithm and fast adders techniques. The Karatsuba-Ofman algorithm and school-book multiplier recommends cutting down the operands into smaller chunks while adders facilitate fast addition for large size operands. …”
    Get full text
    Article
  8. 248

    Injustice épistémique et démocratie délibérative à l’ère du numérique : l’envers du mouvement #BalanceTaStartUp by Coline Sénac

    Published 2024-12-01
    “…I point out that anonymity, while allowing victims to share their experiences, becomes a weapon for online trolls and detractors, seeking to discredit these testimonies. …”
    Get full text
    Article
  9. 249

    Machine learning based on pangenome-wide association studies reveals the impact of host source on the zoonotic potential of closely related bacterial pathogens by Cheng Han, Shiying Lu, Pan Hu, Jiang Chang, Deying Zou, Feng Li, Yansong Li, Qiang Lu, Honglin Ren

    Published 2025-08-01
    “…Integrating these genes into an ML model based on the support vector machine (SVM) algorithm allows us to predict the zoonotic potential of various Brucella strains with high accuracy. …”
    Get full text
    Article
  10. 250

    Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices by Gabriela Cagua, Valerie Gauthier-Umana, Carlos Lozano-Garzon

    Published 2025-01-01
    “…The Internet of Things (IoT) is growing rapidly, enabling interconnected devices to communicate and share data seamlessly. While this expansion drives significant advancements across industries, it also introduces critical challenges in ensuring secure device communication. …”
    Get full text
    Article
  11. 251

    HSimulator: Hybrid Stochastic/Deterministic Simulation of Biochemical Reaction Networks by Luca Marchetti, Rosario Lombardo, Corrado Priami

    Published 2017-01-01
    “…HSimulator provides optimized implementation of a set of widespread state-of-the-art stochastic, deterministic, and hybrid simulation strategies including the first publicly available implementation of the Hybrid Rejection-based Stochastic Simulation Algorithm (HRSSA). HRSSA, the fastest hybrid algorithm to date, allows for an efficient simulation of the models while ensuring the exact simulation of a subset of the reaction network modeling slow reactions. …”
    Get full text
    Article
  12. 252

    Data augmentation scheme for federated learning with non-IID data by Lingtao TANG, Di WANG, Shengyun LIU

    Published 2023-01-01
    “…To solve the problem that the model accuracy remains low when the data are not independent and identically distributed (non-IID) across different clients in federated learning, a privacy-preserving data augmentation scheme was proposed.Firstly, a data augmentation framework for federated learning scenarios was designed.All clients generated synthetic samples locally and shared them with each other, which eased the problem of client drift caused by the difference of clients’ data distributions.Secondly, based on generative adversarial network and differential privacy, a private sample generation algorithm was proposed.It helped clients to generate informative samples while preserving the privacy of clients’ local data.Finally, a differentially private label selection algorithm was proposed to ensure the labels of synthetic samples will not leak information.Simulation results demonstrate that under multiple non-IID data partition strategies, the proposed scheme can consistently improve the model accuracy and make the model converge faster.Compared with the benchmark approaches, the proposed scheme can achieve at least 25% accuracy improvement when each client has only one class of samples.…”
    Get full text
    Article
  13. 253

    Detection of Crack Sealant in the Pretreatment Process of Hot In-Place Recycling of Asphalt Pavement via Deep Learning Method by Kai Zhao, Tianzhen Liu, Xu Xia, Yongli Zhao

    Published 2025-05-01
    “…This algorithm integrates the RepViT (Representation Learning with Visual Tokens) network to reduce computational complexity while capturing the global context of images. …”
    Get full text
    Article
  14. 254

    Transceiver Design for an FDA-MIMO Radar and MIMO Communication Spectral Coexistence System by Qihang XU, Lan LAN, Guisheng LIAO, Kewei WANG, Tongxing ZHENG

    Published 2025-08-01
    “…In addition, the communication transmission codebook is approximated using an inequality theorem, and the radar transmission waveform is optimized using Taylor expansion and relaxation algorithms. Simulation results reveal that this joint design method can effectively improve the SINR of the radar system while ensuring communication throughput, thereby considerably enhancing the performance of the FDA-MIMO radar and MIMO communication spectral coexistence system under mainlobe jamming conditions.…”
    Get full text
    Article
  15. 255

    Artificial Intelligence Approaches to Energy Management in HVAC Systems: A Systematic Review by Seyed Abolfazl Aghili, Amin Haji Mohammad Rezaei, Mohammadsoroush Tafazzoli, Mostafa Khanzadi, Morteza Rahbar

    Published 2025-03-01
    “…Heating, Ventilation, and Air Conditioning (HVAC) systems contribute a considerable share of total global energy consumption and carbon dioxide emissions, putting them at the heart of the issues of decarbonization and removing barriers to achieving net-zero emissions and sustainable development goals. …”
    Get full text
    Article
  16. 256

    Hybrid Optimization Machine Learning Framework for Enhancing Trust and Security in Cloud Network by Himani Saini, Gopal Singh, Amrinder Kaur, Sunil Saini, Niyaz Ahmad Wani, Vikram Chopra, Zahid Akhtar, Shahid Ahmad Bhat

    Published 2024-01-01
    “…For resource allocation, the framework employs the Time-aware modified best fit decreasing (T-MBFD) algorithm, which adapts to fluctuating workloads. Key input parameters for T-MBFD include available resources, job size, and time constraints, while output parameters focus on optimized resource distribution and minimizing wastage. …”
    Get full text
    Article
  17. 257

    Information Bottleneck-Based Domain Adaptation for Hybrid Deep Learning in Scalable Network Slicing by Tianlun Hu, Qi Liao, Qiang Liu, Georg Carle

    Published 2024-01-01
    “…We propose pre-training a variational information bottleneck (VIB)-based Quality of Service (QoS) estimator, using slice-specific inputs shared across all source domain slices. Each target domain slice can deploy this estimator to predict its QoS and optimize slice resource allocation using the IDLA algorithm. …”
    Get full text
    Article
  18. 258

    A Comparison of Generalized Hyperbolic Distribution Models for Equity Returns by Virginie Konlack Socgnia, Diane Wilcox

    Published 2014-01-01
    “…To better understand the dependence structure of the stocks, we fit the MGHD and subclasses to both the stock returns and the two leading principal components derived from the price data. While the MGHD could fit both data subsets, we observed that the multivariate normality of the stock return residuals, computed by removing shared components, suggests that the departure from normality can be explained by the structure in the common factors.…”
    Get full text
    Article
  19. 259

    Leather Defect Detection Based on Improved YOLOv8 Model by Zirui Peng, Chen Zhang, Wei Wei

    Published 2024-12-01
    “…Addressing the low accuracy and slow detection speed experienced by algorithms based on deep learning for a leather defect detection task, a lightweight and improved leather defect detection algorithm, dubbed YOLOv8-AGE, has been proposed based on YOLOv8n. …”
    Get full text
    Article
  20. 260