Risultati della ricerca - arithmetic optimization algorithm
-
1
MAOA: A Swift and Effective Optimization Algorithm for Linear Antenna Array Design
Pubblicazione 2025-05-01Soggetti: TestoThis paper presents the modified arithmetic optimization algorithm (MAOA), a swift and effective optimization algorithm specifically designed for electromagnetic applications. Its primary advantage is its ability to avoid local minima by striking a balance between global exploration and local exploi...
Articolo -
2
Arithmetic coder optimization for compressing images obtained through remote probing of water bodies
Pubblicazione 2019-04-01“...In the course of work, the most computationally complex parts of the arithmetic coder algorithm are determined. Performance optimization of their software implementation is carried out. ...”Introduction. The fast program algorithm of arithmetic coding proposed in the paper is for the compression of digital images. It is shown how the complexity of the arithmetic coder algorithm depends on the complexity measures (the input size is not considered). In the course of work, the most comput...
Testo
Articolo -
3
A Note on the Perturbation of arithmetic expressions
Pubblicazione 2016-03-01“...In this paper we present the theoretical foundation of forward error analysis of numerical algorithms under;• Approximations in "built-in" functions.• Rounding errors in arithmetic floating-point operations.• Perturbations of data.The error analysis is based on linearization method. ...”In this paper we present the theoretical foundation of forward error analysis of numerical algorithms under;• Approximations in "built-in" functions.• Rounding errors in arithmetic floating-point operations.• Perturbations of data.The error analysis is based on linearization method. The fu...
Testo
Articolo -
4
A Dual-Strategy Framework for Cyber Threat Detection in Imbalanced, High-Dimensional Data Across Heterogeneous Networks
Pubblicazione 2025-01-01Soggetti: TestoAs cyber threats grow in complexity, ensuring robust network security has become increasingly critical. Intrusion Detection Systems (IDS) serve as a key defense mechanism, detecting potential threats and unauthorized activities that may evade traditional firewalls. Intrusion Detection Systems (IDS)...
Articolo -
5
Optimizing diabetes prediction with MLP neural networks and feature selection algorithm
Pubblicazione 2025-01-01“... In this research, the goal was to improve diabetes prediction by combining Multilayer Perceptron Neural Network (MLPNN) with Memetic Algorithm (MA) and Arithmetic Optimization Algorithm (AOA). ...”In this research, the goal was to improve diabetes prediction by combining Multilayer Perceptron Neural Network (MLPNN) with Memetic Algorithm (MA) and Arithmetic Optimization Algorithm (AOA). The method suggested used a preprocessing step to choose a representative subset of attributes from th...
Testo
Articolo -
6
An efficient algorithmic framework to minimize the summand matrix in binary multiplication
Pubblicazione 2025-10-01TestoBinary multiplication is a key operation in digital systems, often limited by the complexity of generating and summing numerous partial products. Traditional methods, like Booth’s algorithm, produce a summand matrix proportional to the operand bit-length, increasing computational load, hardware usag...
Articolo -
7
A Small-Sample Scenario Optimization Scheduling Method Based on Multidimensional Data Expansion
Pubblicazione 2025-06-01“...Firstly, based on spatial correlation, the daily power curves of PV power plants with measured power are screened, and the meteorological similarity is calculated using multicore maximum mean difference (MK-MMD) to generate new energy output historical data of the target distributed PV system through the capacity conversion method; secondly, based on the existing daily load data of different types, the load historical data are generated using the stochastic and simultaneous sampling methods to construct the full historical dataset; subsequently, for the sample imbalance problem in the small-sample scenario, an oversampling method is used to enhance the data for the scarce samples, and the XGBoost PV output prediction model is established; finally, the optimal scheduling model is transformed into a Markovian decision-making process, which is solved by using the Deep Deterministic Policy Gradient (DDPG) algorithm. ...”Currently, deep reinforcement learning has been widely applied to energy system optimization and scheduling, and the DRL method relies more heavily on historical data. The lack of historical operation data in new integrated energy systems leads to insufficient DRL training samples, which easily trig...
Testo
Articolo -
8
Magnitude Comparison and Sign Detection based on the 4-Moduli Set {2n+1, 2nâ1, 2n+3, 2nâ3}
Pubblicazione 2024-02-01TestoThe 4-moduli set residue number system (RNS),{2n+1, 2nâ1, 2n+3, 2nâ3}, with a wide dynamic range, has recently been proposed as a balanced 4-moduli set for utilizing the cases that demand fast calculations such as deep learning and implementation of asymmetric cryptographic algorithms. Up to now, on...
Articolo -
9
Collaborative optimal operation control of HVAC systems based on multi-agent
Pubblicazione 2025-07-01“...As a consequence, the computing efficiency of optimization algorithms is relatively low, posing challenges for real-time optimal operation control. ...”The HVAC system of public buildings, as a thermostatically controlled load, accounting for a relatively significant proportion of building energy consumption. Therefore, it is necessary to optimize energy efficient of HVAC systems in public buildings. Nevertheless, the complication of HVAC systems i...
Testo
Articolo -
10
Method for designing specialized computing systems based on hardware and software co-optimization
Pubblicazione 2024-05-01“...The proposed design methodology based on a register transfer level (RTL) representation synthesizer of a computing device is limited to individual computing architectures for which the relevant circuit is synthesized and optimized based on a high-level input description of the algorithm. ...”Objectives. Following the completion of development stages due to transistor scaling (Dennard’s law) and an increased number of general-purpose processor cores (limited by Amdahl’s law), further improvements in the performance of computing systems naturally proceeds to the stage of developing specia...
Testo
Articolo -
11
Enhancing Security for Resource-Constrained Smart Cities IoT Applications: Optimizing Cryptographic Techniques with Effective Field Multipliers
Pubblicazione 2025-06-01TestoThe broadening adoption of interconnected systems within smart city environments is fundamental for the progression of digitally driven economies, enabling the refinement of city administration, the enhancement of public service delivery, and the fostering of ecologically sustainable progress, there...
Articolo -
12
Research on the Operation Optimisation of Integrated Energy System Based on Multiple Thermal Inertia
Pubblicazione 2025-07-01“...The optimal algorithm for the day-ahead phase is GA, and the optimal algorithm for the intraday phase is PSO, which is able to produce optimization results in a few minutes....”Addressing the problem that energy supply and load demand cannot be matched due to the difference in inertia effects among multiple energy sources, and taking into account the thermoelectric load, this paper designs a two-stage operation optimization model of IES considering multi-dimensional therma...
Testo
Articolo -
13
Intelligent Cyber-Attack Detection in IoT Networks Using IDAOA-Based Wrapper Feature Selection
Pubblicazione 2025-06-01“...This study presents an innovative framework that integrates the Improved Dynamic Arithmetic Optimization Algorithm (IDAOA) with a Bagging technique to enhance the performance of intelligent cyber intrusion detection systems. ...”ABSTRACT: In the realm of cybersecurity, the increasing sophistication of cyber-attacks demands the creation of sophisticated intrusion detection systems (IDS) designed to accurately detect and counteract threats in real-time. This study presents an innovative framework that integrates the Improved...
Testo
Articolo -
14
Low latency Montgomery multiplier for cryptographic applications
Pubblicazione 2021-07-01“...Montgomery multiplication algorithm facilitates faster MM operation without the division operation. ...”In this modern era, data protection is very important. To achieve this, the data must be secured using either public-key or private-key cryptography (PKC). PKC eliminates the need of sharing key at the beginning of communication. PKC systems such as ECC and RSA is implemented for different security...
Testo
Articolo -
15
Direction-of-Arrival Estimation for Wideband Chirps via Multi-Line Fitting in the Fractional Fourier Domain
Pubblicazione 2025-01-01“...In this context, we also introduce the so-called local discrete SmFrFT, an algorithm for computing partial points of the (discrete) SmFrFT with a further reduction in the number of involved arithmetic operations. ...”Estimating the direction-of-arrival (DoA) of a wideband chirp signal is an important topic in several modern systems. The referred estimation can be carried out using array signal processing in the fractional Fourier transform (FrFT) domain, which involves searching for peak amplitude in order to se...
Testo
Articolo