Search alternatives:
process optimization » model optimization (Expand Search)
based optimization » whale optimization (Expand Search)
binary match » binary data (Expand Search), binary mask (Expand Search)
match based » patches based (Expand Search), matrix based (Expand Search)
a process » _ process (Expand Search)
binary a » binary _ (Expand Search), binary b (Expand Search), hilary a (Expand Search)
process optimization » model optimization (Expand Search)
based optimization » whale optimization (Expand Search)
binary match » binary data (Expand Search), binary mask (Expand Search)
match based » patches based (Expand Search), matrix based (Expand Search)
a process » _ process (Expand Search)
binary a » binary _ (Expand Search), binary b (Expand Search), hilary a (Expand Search)
-
1
-
2
-
3
Schematic of iteration process of IDE-IIGA.
Published 2025“…In the experiments, optimization metrics such as kinematic optimization rate (calculated based on the shortest path and connectivity between functional areas), space utilization rate (calculated by the ratio of room area to total usable space), and functional fitness (based on the weighted sum of users’ subjective evaluations and functional matches) all perform well. …”
-
4
DE algorithm flow.
Published 2025“…In the experiments, optimization metrics such as kinematic optimization rate (calculated based on the shortest path and connectivity between functional areas), space utilization rate (calculated by the ratio of room area to total usable space), and functional fitness (based on the weighted sum of users’ subjective evaluations and functional matches) all perform well. …”
-
5
Test results of different algorithms.
Published 2025“…In the experiments, optimization metrics such as kinematic optimization rate (calculated based on the shortest path and connectivity between functional areas), space utilization rate (calculated by the ratio of room area to total usable space), and functional fitness (based on the weighted sum of users’ subjective evaluations and functional matches) all perform well. …”
-
6
-
7
-
8
-
9
-
10
-
11
Proposed Algorithm.
Published 2025“…To enhance the offloading decision-making process, the algorithm incorporates the Newton-Raphson method for fast and efficient optimization of the computation rate under energy constraints. …”
-
12
-
13
-
14
Comparisons between ADAM and NADAM optimizers.
Published 2025“…To enhance the offloading decision-making process, the algorithm incorporates the Newton-Raphson method for fast and efficient optimization of the computation rate under energy constraints. …”
-
15
A* Path-Finding Algorithm to Determine Cell Connections
Published 2025“…To address this, the research integrates a modified A* pathfinding algorithm with a U-Net convolutional neural network, a custom statistical binary classification method, and a personalized Min-Max connectivity threshold to automate the detection of astrocyte connectivity.…”
-
16
Python-Based Algorithm for Estimating NRTL Model Parameters with UNIFAC Model Simulation Results
Published 2025“…The percentage mean absolute residuals of the activity coefficients obtained using DEA, NMM, and the parameter estimation tool in Aspen Plus were in the ranges of 0.05–16.69, 0.05–16.69, and 0.09–326.77%, respectively. This in-house algorithm will be helpful for obtaining more accurate NRTL parameters in a timely manner and will facilitate the simulation of biochemical processes for process optimization, energy consumption estimation, and life cycle assessment.…”
-
17
Process flow diagram of CBFD.
Published 2024“…Noteworthy is CBFD’s recall value of 0.87 representing at the maximum of a 13.6% improvement over Superpoint, DITF, BRIEF, BRISK, SURF, and SIFT. Furthermore, the matching score for the test image is 0.975. The computation time for CBFD is 2.8 ms, which is at least 6.7% lower than that of other algorithms. …”
-
18
Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things
Published 2025“…Hence, Binary Black Widow Optimization Algorithm (BBWOA) is proposed in this manuscript to improve the BRBPNN classifier that detects intrusion precisely. …”
-
19
-
20