-
2001
Scatter and Blurring Compensation in Inhomogeneous Media Using a Postprocessing Method
Published 2008-01-01“…This method also offers an alternative to compensate for scatter and blurring in a more time efficient manner compared to the popular iterative methods. The execution time for this efficient postprocessing method is only a few minutes, which is within the clinically acceptable range.…”
Get full text
Article -
2002
Ordre, durée et fréquence : la narratologie genettienne à la rescousse des récits brefs ?
Published 2021-06-01“…Overall, there was some homogeneity: analepses and prolepses are somewhat undeveloped, there are few pauses, and beginnings are often iterative summaries. Nevertheless, some marked differences seem to show up there is no genre common to these texts. …”
Get full text
Article -
2003
Optimization Study of Excitation Trajectories for Dynamic Parameter Identification
Published 2024-11-01“…The improved snake optimization algorithm was applied to the optimization design of excitation trajectories in the process of robotic arm dynamic parameter identification. The iterative reweighted least squares algorithm was employed as the parameter identification technique. …”
Get full text
Article -
2004
Humans rationally balance detailed and temporally abstract world models
Published 2025-01-01“…One prominent approach, the Successor Representation (SR), takes advantage of temporal abstraction of future states: by aggregating trajectory predictions over multiple timesteps, the brain can avoid the costs of iterative, multi-step mental simulation. Human behavior broadly shows signatures of such temporal abstraction, but finer-grained characterization of individuals’ strategies and their dynamic adjustment remains an open question. …”
Get full text
Article -
2005
AEUR: authenticated encryption algorithm design based on uBlock round function
Published 2023-08-01“…In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR was designed.Firstly, based on the uBlock round function, with resistance to internal collision attacks as the security objective, a mixed integer linear programming approach was used to search for generic iterative component R(t,s) to meet the security objective.Secondly, the authenticated encryption algorithm AEUR was designed by using this component.AEUR consisted of two parts: authenticated encryption and decrypted verification, both of which performed the same process without the need to design additional operational sessions, reducing the algorithm’s resource consumption.In addition, the correctness of the algorithm was verified by comparing the corresponding round state values, and the security of the algorithm was analyzed using various analysis methods such as linear attacks and sliding attacks.Finally, the algorithm was implemented in C language to prove the AEUR has good performance.The results show that the proposed algorithm has a better overall performance in terms of software runtime, with efficiency improvements of 3% and 46% compared to AEGIS and ALE, and 74% and 92% compared to AES-GCM and ACORN, respectively.…”
Get full text
Article -
2006
Vortex-Induced Vibration Suppression of Bridges by Inerter-Based Dynamic Vibration Absorbers
Published 2021-01-01“…The performance indexes for the vertical displacement of six IDVA arrangements are obtained by using an iterative method, where the performance indexes for the vertical displacement are minimized by using the optimization toolbox in a commercial software. …”
Get full text
Article -
2007
Heteroclinic Bifurcation Behaviors of a Duffing Oscillator with Delayed Feedback
Published 2018-01-01“…In order to verify the correctness of the analytical conditions, the Duffing oscillator is also investigated by numerical iterative method. The bifurcation curves and the largest Lyapunov exponents are provided and compared. …”
Get full text
Article -
2008
Firefly Algorithm for Cardinality Constrained Mean-Variance Portfolio Optimization Problem with Entropy Diversity Constraint
Published 2014-01-01“…To overcome lack of exploration power during early iterations, we modified the algorithm and tested it on standard portfolio benchmark data sets used in the literature. …”
Get full text
Article -
2009
Qualitative and quantitative knowledge of metasynthesis based on fuzzy system
Published 2024-12-01“…The metasynthesis has been widely used to solve complex system problems, and its core is the combination of human and machine, from qualitative to quantitative iterative solving. But how to describe and integrate qualitative and quantitative knowledge effectively is still the urgent problem to be solved. …”
Get full text
Article -
2010
Solving Nonlinear Fourth-Order Boundary Value Problems Using a Numerical Approach: (m+1)th-Step Block Method
Published 2017-01-01“…The schemes obtained were combined to simultaneously produce solution to the fourth-order nonlinear BVPs at m+1 points iteratively. The derived block method showed improved accuracy in comparison to previously existing authors when solving the same problems. …”
Get full text
Article -
2011
Introduction to Mycelium Insulation as a Sustainable Insulation Material and Carbon Sink
Published 2025-01-01“…Results show that the current iteration of mycelium insulation may appeal to select individuals that are environmentally conscious, or for specialised cases. …”
Get full text
Article -
2012
Algorithms for partitioning logical circuits into subcircuits
Published 2020-09-01“…The brief review of partitioning methods and algorithms is given, and two groups of algorithms are identified: constructive and iterative one. The interpretation of a logical circuit in the form of a graph is presented. …”
Get full text
Article -
2013
Joint beam forming design for IRS-aided MIMO Internet of vehicles system
Published 2023-02-01“…A joint beamforming design method assisted by an IRS was proposed in MIMO Internet of vehicles system where the spectrum was shared by V2I and V2V users.Considering the constraints of V2V user’s data rate requirement, transmit power and IRS reflection phase shift, transmit precoding matrix at base station and reflective phase shift matrix of the IRS were jointly optimized to maximize channel capacity of the V2I user.The coupled non-convex optimization problem was decoupled and converted to be convex by using minimum mean square error, matrix analysis and inner approaching algorithm.An alternate iterative optimization algorithm was proposed to find the feasible solution.The performance comparisons of the proposed algorithm with several benchmarks were carried out and the impacts of the number of IRS reflective elements, IRS location and vehicle speed on spectrum efficiency were provided, respectively.The simulation results show that the proposed algorithm can converge quickly and the spectrum efficiency can be maximally improved by using the proposed method if the IRS is deployed near the base station.…”
Get full text
Article -
2014
MIMO With 1-b Pre/Postcoding Resolution: A Quantum Annealing Approach
Published 2024-01-01“…By using the principles of alternating optimization and quantum annealing (QA), an iterative QA-based algorithm is proposed that achieves near-optimal performance with polynomial complexity. …”
Get full text
Article -
2015
OPTIMIZATION DESIGN OF CABIN STRUT BASED ON ISIGHT AND PYTHON FOR CIVIL AIRCRAFT
Published 2021-01-01“…It utilizes multi-island genetic algorithm for optimization analysis,and an iterative optimization process for the follow-up strut analysis is established. …”
Get full text
Article -
2016
Adversarial sample generation algorithm for vertical federated learning
Published 2023-08-01“…To adapt to the scenario characteristics of vertical federated learning (VFL) applications regarding high communication cost, fast model iteration, and decentralized data storage, a generalized adversarial sample generation algorithm named VFL-GASG was proposed.Specifically, an adversarial sample generation framework was constructed for the VFL architecture.A white-box adversarial attack in the VFL was implemented by extending the centralized machine learning adversarial sample generation algorithm with different policies such as L-BFGS, FGSM, and C&W.By introducing deep convolutional generative adversarial network (DCGAN), an adversarial sample generation algorithm named VFL-GASG was designed to address the problem of universality in the generation of adversarial perturbations.Hidden layer vectors were utilized as local prior knowledge to train the adversarial perturbation generation model, and through a series of convolution-deconvolution network layers, finely crafted adversarial perturbations were produced.Experiments show that VFL-GASG can maintain a high attack success while achieving a higher generation efficiency, robustness, and generalization ability than the baseline algorithm, and further verify the impact of relevant settings for adversarial attacks.…”
Get full text
Article -
2017
Guiding Inspiratory Flow: Development of the In-Check DIAL G16, a Tool for Improving Inhaler Technique
Published 2017-01-01“…The current device (In-Check DIAL G16) is the third iteration of the original 1998 training tool, with detailed and ongoing assessments of all common inhaler resistances (including combination and breath-actuated inhaler types) summarised into resistance ranges that are preset within the device. …”
Get full text
Article -
2018
A New Way to Generate an Exponential Finite Difference Scheme for 2D Convection-Diffusion Equations
Published 2014-01-01“…During the derivation process, the higher order derivatives along y-direction are removed to the derivatives along x-direction iteratively using information given by the original differential equation (similarly from x-direction to y-direction) and then instead of keeping finite terms in the Taylor series expansion, infinite terms which constitute convergent series are kept on deriving the exponential coefficients of the scheme. …”
Get full text
Article -
2019
Smoothing and Regularization with Modified Sparse Approximate Inverses
Published 2010-01-01“…In combination with an iterative regularization method, it thus becomes possible to reconstruct the original information more accurately in many cases. …”
Get full text
Article -
2020
Qualitative Reasoning for Quantitative Simulation
Published 2018-01-01“…Using the proposed algorithm, the simulation is advanced instead of iterating simulation time for a predefined time step and checking whether or not there is any activity in the interval, directly to the time points that are qualitatively different.…”
Get full text
Article