Showing 3,721 - 3,740 results of 12,475 for search '"algorithms"', query time: 0.27s Refine Results
  1. 3721

    Analysing Topology Control Protocols in Wireless Sensor Network Using Network Evolution Model by Chiranjib Patra, Samiran Chattopadhyay, Matangini Chattopadhyay, Parama Bhaumik

    Published 2015-10-01
    “…In the study of wireless ad hoc and sensor networks, clustering is an important research problem as it aims at maximizing network lifetime and minimizing latency. A large number of algorithms have been devised to compute “good” clusters in a WSN but few papers have tried to characterize these algorithms in an analytical manner. …”
    Get full text
    Article
  2. 3722

    The Information Theoretic Approach to Signal Anomaly Detection for Cognitive Radio by Mostafa Afgani, Sinan Sinanović, Harald Haas

    Published 2010-01-01
    “…Additionally, neither of the algorithms require demodulation of the signal.…”
    Get full text
    Article
  3. 3723

    Efficient Hybrid Iterative Method for Signal Detection in Massive MIMO Uplink System over AWGN Channel by Zelalem Melak Gebeyehu, Ram Sewak Singh, Satyasis Mishra, Davinder Singh Rathee

    Published 2022-01-01
    “…Although the OCD, CG, and GS algorithms have less computational complexity than the MMSE algorithm, they perform poorly in comparison. …”
    Get full text
    Article
  4. 3724

    Objects outline delineation by nonliniear filtration methods for boundary pixels by D. V. Zaerko, V. A. Lipnitski, N. L. Bobrova, Dm. V. Zaerko

    Published 2022-12-01
    “…A processing of border pixel from pixel map originate problem while work with outline objects segmentation algorithm on bitmap images, which are based on 2D convolution operation. …”
    Get full text
    Article
  5. 3725

    A Survey of Post-Quantum Cryptography Migration in Vehicles by Nils Lohmiller, Sabrina Kaniewski, Michael Menth, Tobias Heer

    Published 2025-01-01
    “…The advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography (PQC) algorithms. …”
    Get full text
    Article
  6. 3726

    Efficient Boundary Extraction from Orthogonal Pseudo-Polytopes: An Approach Based on the 𝑛D-EVM by Ricardo Pérez-Aguila

    Published 2011-01-01
    “…This work is devoted to contribute with two algorithms for performing, in an efficient way, connected components labeling and boundary extraction from orthogonal pseudo-polytopes. …”
    Get full text
    Article
  7. 3727

    Multi-level high utility-itemset hiding. by Loan T T Nguyen, Hoa Duong, An Mai, Bay Vo

    Published 2025-01-01
    “…To address this issue, this work suggests two PPUM algorithms, namely MLHProtector and FMLHProtector, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …”
    Get full text
    Article
  8. 3728

    Recognition and Localization of Target Images for Robot Vision Navigation Control by Muji Chen

    Published 2022-01-01
    “…The application of RANSAC algorithm and improved Hough algorithm was analyzed in visual navigation control, and the two navigation line detection algorithms based on the image characteristics of the target image were improved in the optical detection area of the navigation line for the shortcomings of the two algorithms in visual navigation control, and the algorithms before and after the improvement were compared.…”
    Get full text
    Article
  9. 3729
  10. 3730

    Mining Conditional Functional Dependency Rules on Big Data by Mingda Li, Hongzhi Wang, Jianzhong Li

    Published 2020-03-01
    “…Current Conditional Functional Dependency (CFD) discovery algorithms always need a well-prepared training dataset. …”
    Get full text
    Article
  11. 3731

    Conditions for Existence, Representations, and Computation of Matrix Generalized Inverses by Predrag S. Stanimirović, Miroslav Ćirić, Igor Stojanović, Dimitrios Gerontitis

    Published 2017-01-01
    “…Particularly, these algorithms can be used to compute the Moore-Penrose inverse, the Drazin inverse, and the usual matrix inverse. …”
    Get full text
    Article
  12. 3732

    Effects of Taxon Sampling in Reconstructions of Intron Evolution by Mikhail A. Nikitin, Vladimir V. Aleoshin

    Published 2013-01-01
    “…Interpretation of these differences is hindered because different algorithms and taxon sampling strategies were used. …”
    Get full text
    Article
  13. 3733

    Hybrid Time Series Method for Long-Time Temperature Series Analysis by Guangdong Huang, Jiahong Li

    Published 2021-01-01
    “…This paper combines discrete wavelet transform (DWT), autoregressive moving average (ARMA), and XGBoost algorithm to propose a weighted hybrid algorithm named DWTs-ARMA-XGBoost (DAX) on long-time temperature series analysis. …”
    Get full text
    Article
  14. 3734

    Modified Grey Wolf Optimizer for Global Engineering Optimization by Nitin Mittal, Urvinder Singh, Balwinder Singh Sohi

    Published 2016-01-01
    “…Nature-inspired algorithms are becoming popular among researchers due to their simplicity and flexibility. …”
    Get full text
    Article
  15. 3735

    TOPPER: Topology Prediction of Transmembrane Protein Based on Evidential Reasoning by Xinyang Deng, Qi Liu, Yong Hu, Yong Deng

    Published 2013-01-01
    “…Usually, these individual prediction algorithms depend on various principles such as the hydrophobicity or charges of residues. …”
    Get full text
    Article
  16. 3736

    Enabling Super-Resolution for Automotive Imaging Radars in the Presence of Antenna Calibration Errors by Ionela-Cristina Voicu, Filip Rosu

    Published 2025-01-01
    “…In this paper we address the issues faced when applying such algorithms in a radar application and offer a solution based on linear prediction and spatial smoothing to enhance the performance of such algorithms.…”
    Get full text
    Article
  17. 3737

    An Analytical Study on Two High-Order Hybrid Methods to Solve Systems of Nonlinear Equations by Hooman Darvishi, M. T. Darvishi

    Published 2023-01-01
    “…Furthermore, the stability analysis of both algorithms is investigated. These algorithms are applied for solving two real stiff systems of ordinary differential equations. …”
    Get full text
    Article
  18. 3738

    Novel machine learning-driven comparative analysis of CSP, STFT, and CSP-STFT fusion for EEG data classification across multiple meditation and non-meditation sessions in BCI pipel... by Nalinda D. Liyanagedera, Corinne A. Bareham, Heather Kempton, Hans W. Guesgen

    Published 2025-02-01
    “…While testing different feature extraction algorithms, a common neural network structure was used as the classification algorithm to compare the performance of the feature extraction algorithms. …”
    Get full text
    Article
  19. 3739

    Some Graph-Based Encryption Schemes by Baizhu Ni, Rabiha Qazi, Shafiq Ur Rehman, Ghulam Farid

    Published 2021-01-01
    “…There exist many encryption algorithms in cryptography for data security. The need of new nonstandard encryption algorithms has been raised to prevent the communication from traditional attacks. …”
    Get full text
    Article
  20. 3740

    A Comparative Study on Qualification Criteria of Nonlinear Solvers with Introducing Some New Ones by R. H. AL-Obaidi, M. T. Darvishi

    Published 2022-01-01
    “…To achieve the criteria, different algorithms to solve nonlinear systems are categorised to three kinds. …”
    Get full text
    Article