Risultati della ricerca - arithmetic optimization algorithm

  • Mostra 1 - 15 risultati su 15
Raffina i risultati
  1. 1

    MAOA: A Swift and Effective Optimization Algorithm for Linear Antenna Array Design di Anoop Raghuvanshi, Abhinav Sharma, Abhishek Kumar Awasthi, Abhishek Sharma, Rahul Singhal, Kim Soon Chong, Sew Sun Tiang, Wei Hong Lim

    Pubblicazione 2025-05-01

    This paper presents the modified arithmetic optimization algorithm (MAOA), a swift and effective optimization algorithm specifically designed for electromagnetic applications. Its primary advantage is its ability to avoid local minima by striking a balance between global exploration and local exploi...

    Descrizione completa

    Soggetti: Testo
    Articolo
  2. 2

    Arithmetic coder optimization for compressing images obtained through remote probing of water bodies di R. V. Arzumanyan

    Pubblicazione 2019-04-01

    Introduction. The fast program algorithm of arithmetic coding proposed in the paper is for the compression of digital images. It is shown how the complexity of the arithmetic coder algorithm depends on the complexity measures (the input size is not considered). In the course of work, the most comput...

    Descrizione completa

    “...In the course of work, the most computationally complex parts of the arithmetic coder algorithm are determined. Performance optimization of their software implementation is carried out. ...”
    Testo
    Articolo
  3. 3

    A Note on the Perturbation of arithmetic expressions di Baghdad Science Journal

    Pubblicazione 2016-03-01

    In this paper we present the theoretical foundation of forward error analysis of numerical algorithms under;• Approximations in "built-in" functions.• Rounding errors in arithmetic floating-point operations.• Perturbations of data.The error analysis is based on linearization method. The fu...

    Descrizione completa

    “...In this paper we present the theoretical foundation of forward error analysis of numerical algorithms under;• Approximations in "built-in" functions.• Rounding errors in arithmetic floating-point operations.• Perturbations of data.The error analysis is based on linearization method. ...”
    Testo
    Articolo
  4. 4

    A Dual-Strategy Framework for Cyber Threat Detection in Imbalanced, High-Dimensional Data Across Heterogeneous Networks di T. Saranya, S. Indra Priyadharshini

    Pubblicazione 2025-01-01

    As cyber threats grow in complexity, ensuring robust network security has become increasingly critical. Intrusion Detection Systems (IDS) serve as a key defense mechanism, detecting potential threats and unauthorized activities that may evade traditional firewalls. Intrusion Detection Systems (IDS)...

    Descrizione completa

    Soggetti: Testo
    Articolo
  5. 5

    Optimizing diabetes prediction with MLP neural networks and feature selection algorithm di Majd Mohammad A. Al-Hawamdeh

    Pubblicazione 2025-01-01

    In this research, the goal was to improve diabetes prediction by combining Multilayer Perceptron Neural Network (MLPNN) with Memetic Algorithm (MA) and Arithmetic Optimization Algorithm (AOA). The method suggested used a preprocessing step to choose a representative subset of attributes from th...

    Descrizione completa

    “... In this research, the goal was to improve diabetes prediction by combining Multilayer Perceptron Neural Network (MLPNN) with Memetic Algorithm (MA) and Arithmetic Optimization Algorithm (AOA). ...”
    Testo
    Articolo
  6. 6

    An efficient algorithmic framework to minimize the summand matrix in binary multiplication di Amit Verma, Manish Prateek, Shiv Naresh Shivhare, Thipendra P. Singh, Anuj Kumar, Rakesh Ranjan, Rahul Priyadarshi

    Pubblicazione 2025-10-01

    Binary multiplication is a key operation in digital systems, often limited by the complexity of generating and summing numerous partial products. Traditional methods, like Booth’s algorithm, produce a summand matrix proportional to the operand bit-length, increasing computational load, hardware usag...

    Descrizione completa

    Testo
    Articolo
  7. 7

    A Small-Sample Scenario Optimization Scheduling Method Based on Multidimensional Data Expansion di Yaoxian Liu, Kaixin Zhang, Yue Sun, Jingwen Chen, Junshuo Chen

    Pubblicazione 2025-06-01

    Currently, deep reinforcement learning has been widely applied to energy system optimization and scheduling, and the DRL method relies more heavily on historical data. The lack of historical operation data in new integrated energy systems leads to insufficient DRL training samples, which easily trig...

    Descrizione completa

    “...Firstly, based on spatial correlation, the daily power curves of PV power plants with measured power are screened, and the meteorological similarity is calculated using multicore maximum mean difference (MK-MMD) to generate new energy output historical data of the target distributed PV system through the capacity conversion method; secondly, based on the existing daily load data of different types, the load historical data are generated using the stochastic and simultaneous sampling methods to construct the full historical dataset; subsequently, for the sample imbalance problem in the small-sample scenario, an oversampling method is used to enhance the data for the scarce samples, and the XGBoost PV output prediction model is established; finally, the optimal scheduling model is transformed into a Markovian decision-making process, which is solved by using the Deep Deterministic Policy Gradient (DDPG) algorithm. ...”
    Testo
    Articolo
  8. 8

    Magnitude Comparison and Sign Detection based on the 4-Moduli Set {2n+1, 2nâ1, 2n+3, 2nâ3} di Mohsen Mojahed, Amir Sabbagh, Azadeh Emrani

    Pubblicazione 2024-02-01

    The 4-moduli set residue number system (RNS),{2n+1, 2nâ1, 2n+3, 2nâ3}, with a wide dynamic range, has recently been proposed as a balanced 4-moduli set for utilizing the cases that demand fast calculations such as deep learning and implementation of asymmetric cryptographic algorithms. Up to now, on...

    Descrizione completa

    Testo
    Articolo
  9. 9

    Collaborative optimal operation control of HVAC systems based on multi-agent di Chen Fu, Kaipeng Chen, Yan Xu, Dongyue Ming, Ruiwen Ye, Yingjun Wu, Lixia Sun

    Pubblicazione 2025-07-01

    The HVAC system of public buildings, as a thermostatically controlled load, accounting for a relatively significant proportion of building energy consumption. Therefore, it is necessary to optimize energy efficient of HVAC systems in public buildings. Nevertheless, the complication of HVAC systems i...

    Descrizione completa

    “...As a consequence, the computing efficiency of optimization algorithms is relatively low, posing challenges for real-time optimal operation control. ...”
    Testo
    Articolo
  10. 10

    Method for designing specialized computing systems based on hardware and software co-optimization di I. Е. Tarasov, P. N. Sovietov, D. V. Lulyava, D. I. Mirzoyan

    Pubblicazione 2024-05-01

    Objectives. Following the completion of development stages due to transistor scaling (Dennard’s law) and an increased number of general-purpose processor cores (limited by Amdahl’s law), further improvements in the performance of computing systems naturally proceeds to the stage of developing specia...

    Descrizione completa

    “...The proposed design methodology based on a register transfer level (RTL) representation synthesizer of a computing device is limited to individual computing architectures for which the relevant circuit is synthesized and optimized based on a high-level input description of the algorithm. ...”
    Testo
    Articolo
  11. 11

    Enhancing Security for Resource-Constrained Smart Cities IoT Applications: Optimizing Cryptographic Techniques with Effective Field Multipliers di Atef Ibrahim, Fayez Gebali

    Pubblicazione 2025-06-01

    The broadening adoption of interconnected systems within smart city environments is fundamental for the progression of digitally driven economies, enabling the refinement of city administration, the enhancement of public service delivery, and the fostering of ecologically sustainable progress, there...

    Descrizione completa

    Testo
    Articolo
  12. 12

    Research on the Operation Optimisation of Integrated Energy System Based on Multiple Thermal Inertia di Huiqiang Zhi, Min Zhang, Xiao Chang, Rui Fan, Huipeng Li, Le Gao, Jinge Song

    Pubblicazione 2025-07-01

    Addressing the problem that energy supply and load demand cannot be matched due to the difference in inertia effects among multiple energy sources, and taking into account the thermoelectric load, this paper designs a two-stage operation optimization model of IES considering multi-dimensional therma...

    Descrizione completa

    “...The optimal algorithm for the day-ahead phase is GA, and the optimal algorithm for the intraday phase is PSO, which is able to produce optimization results in a few minutes....”
    Testo
    Articolo
  13. 13

    Intelligent Cyber-Attack Detection in IoT Networks Using IDAOA-Based Wrapper Feature Selection di Mohammed Abdullah, Ryna Svyd

    Pubblicazione 2025-06-01

    ABSTRACT: In the realm of cybersecurity, the increasing sophistication of cyber-attacks demands the creation of sophisticated intrusion detection systems (IDS) designed to accurately detect and counteract threats in real-time. This study presents an innovative framework that integrates the Improved...

    Descrizione completa

    “...This study presents an innovative framework that integrates the Improved Dynamic Arithmetic Optimization Algorithm (IDAOA) with a Bagging technique to enhance the performance of intelligent cyber intrusion detection systems. ...”
    Testo
    Articolo
  14. 14

    Low latency Montgomery multiplier for cryptographic applications di khalid javeed, Muhammad Huzaifa, Safiullah Khan, Atif Raza Jafri

    Pubblicazione 2021-07-01

    In this modern era, data protection is very important. To achieve this, the data must be secured using either public-key or private-key cryptography (PKC). PKC eliminates the need of sharing key at the beginning of communication. PKC systems such as ECC and RSA is implemented for different security...

    Descrizione completa

    “...Montgomery multiplication algorithm facilitates faster MM operation without the division operation. ...”
    Testo
    Articolo
  15. 15

    Direction-of-Arrival Estimation for Wideband Chirps via Multi-Line Fitting in the Fractional Fourier Domain di Eulogio G. Huampo, Juliano B. Lima, Jose R. de Oliveira Neto

    Pubblicazione 2025-01-01

    Estimating the direction-of-arrival (DoA) of a wideband chirp signal is an important topic in several modern systems. The referred estimation can be carried out using array signal processing in the fractional Fourier transform (FrFT) domain, which involves searching for peak amplitude in order to se...

    Descrizione completa

    “...In this context, we also introduce the so-called local discrete SmFrFT, an algorithm for computing partial points of the (discrete) SmFrFT with a further reduction in the number of involved arithmetic operations. ...”
    Testo
    Articolo