Showing 18,001 - 18,020 results of 19,511 for search '"algorithms"', query time: 0.10s Refine Results
  1. 18001

    Compressive SAR Imaging Based on Modified Low-Rank and Sparse Decomposition by Jeong-Il Byeon, Wookyung Lee, Jihoon Choi

    Published 2025-01-01
    “…For the CS-MLRSD scheme, an iterative thresholding algorithm is derived to separately reconstruct the low-rank and sparse components. …”
    Get full text
    Article
  2. 18002

    A Design Procedure and Control Method for Improving Efficiency of a Family of Resonant Converters Over Wide Operating Conditions by Jasem Shahsevani, Reza Beiranvand

    Published 2025-01-01
    “…Here, a novel design procedure and control method are proposed for the resonant converters, which have parallel components in their resonant tank circuits to address their light-load or no-load low-efficiency issues. This control algorithm is based on the frequency modulation method and utilizes a variable capacitor or inductor in the resonant tank circuit, simultaneously. …”
    Get full text
    Article
  3. 18003

    Initialization Methods for FPGA-Based EMT Simulations by Xin Ma, Xiao-Ping Zhang

    Published 2024-01-01
    “…To accelerate initialization, software-to-hardware algorithm and structure are developed to automate initialization data sources for different topologies. …”
    Get full text
    Article
  4. 18004

    Development of an AI-Enabled Q-Agent for Making Data Offloading Decisions in a Multi-RAT Wireless Network by Murk Marvi, Adnan Aijaz, Anam Qureshi, Muhammad Khurram

    Published 2024-01-01
    “…We employ a model-free Q-learning algorithm for training of the Q-agent. We use stochastic geometry as a tool for estimating the average data rate offered by the network in a given region by considering the effect of interference. …”
    Get full text
    Article
  5. 18005

    Complexity Analysis of New Future Video Coding (FVC) Standard Technology by Soulef Bouaafia, Randa Khemiri, Seifeddine Messaoud, Fatma Elzahra Sayadi

    Published 2021-01-01
    “…In this paper, we provide a fast FVC algorithm to achieve better performance and to reduce encoding complexity. …”
    Get full text
    Article
  6. 18006

    Intelligent Traffic Management System Based on the Internet of Vehicles (IoV) by Samir A. Elsagheer Mohamed, Khaled A. AlShalfan

    Published 2021-01-01
    “…Our proposed adaptive algorithm not only significantly reduces the average waiting time (delay) but also increases the number of serviced vehicles. …”
    Get full text
    Article
  7. 18007

    Fermentasi biji durian khas Kalimantan sebagai pengganti tepung terigu dengan metode perendaman berseri by Jefri Pandu Hidayat, Siti Munfarida, Asful Hariyadi

    Published 2025-01-01
    “…Runge-Kutta (RK) third-order method used the kinetic modeling algorithm. The RK solver was completed using the optimization solver in Ms. …”
    Get full text
    Article
  8. 18008

    Runoff Prediction and Uncertainty Analysis for Xijiang River Basin Based on CMIP6 Climate Scenarios by WU Huiming, YAN Meng, ZHOU Shuai

    Published 2025-01-01
    “…Based on this, the Xin'anjiang hydrological model (XAJ) is built, and the particle swarm optimization (PSO) algorithm is employed to calibrate and validate the model parameters. …”
    Get full text
    Article
  9. 18009

    Cascaded H-Bridge MLI and Three-Phase Cascaded VSI Topologies for Grid-Connected PV Systems with Distributed MPPT by Abdullah M. Noman, Khaled E. Addoweesh, Ayman A. Alabduljabbar, Abdulrahman I. Alolah

    Published 2019-01-01
    “…Distributed maximum power point tracking (MPPT) of PV modules using perturbation and observation algorithm is used for all presented topologies. In all presented configurations, each PV module is connected to one DC-DC isolated Ćuk converter for best MPPT achievement. …”
    Get full text
    Article
  10. 18010

    Fatigue Driving Prediction on Commercial Dangerous Goods Truck Using Location Data: The Relationship between Fatigue Driving and Driving Environment by Shifeng Niu, Guiqiang Li

    Published 2020-01-01
    “…The driver’s yawn data are used as a proxy for ground truth for the classification algorithm. From the six different categories of the predictor set, we obtain a set of 17 predictor variables to train logistic regression, neural network, and random forest classifiers. …”
    Get full text
    Article
  11. 18011

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  12. 18012

    Revisiting the trading activity of high-frequency trading firms around ultra-fast flash events by Christophe Desagre, Floris Laly, Mikael Petitjean

    Published 2025-01-01
    “…We compare our sample of SFEs with both the so-called “mini flash crashes”, as identified by the Nanex detection algorithm, and the so-called EPMs, as identified by Brogaard et al. (2018). …”
    Get full text
    Article
  13. 18013

    AI-Based Screening Method for Early Identification of Invasive Ductal Carcinoma in Breast Cancer by Dominik Jánošík, Sila Yavuz

    Published 2024-06-01
    “…To achieve this, we utilized a deep learning neural network algorithm, employing histopathological microscopic datasets and histological microscopic images from 124 and 576 patients with ductal carcinoma of the breast, respectively. …”
    Get full text
    Article
  14. 18014

    Construction of a 5G Wireless Semantic Web-Assisted English Digital Learning Resource Query System by Lili Liu

    Published 2021-01-01
    “…We propose a quality algorithm for 5G wireless networks, which not only captures the characteristics of 5G wireless networks such as local broadcast and node movement but also combines quality predicates as guards with broadcast reception actions, which are used to portray that a node can continue to execute subsequent processes only when the node reception actions satisfy certain conditions, which works together with the node default value mechanism to reduce the impact caused by unreliable links. …”
    Get full text
    Article
  15. 18015

    Active Vibration Control of Helicopter Maneuvering Flight Using Feedforward-Robust Hybrid Control Based on Reference Signal Reconstruction by Yifan Qin, Yang Lu, Jinchao Ma, Huiyu Yue

    Published 2021-01-01
    “…Numerical and experimental results reveal that the proposed algorithm is practical for suppressing transient disturbance and multifrequency helicopter vibration response during maneuvering flight with faster convergence speed and better robustness.…”
    Get full text
    Article
  16. 18016

    Uplink Scheduling and Adjacent-Channel Coupling Loss Analysis for TD-LTE Deployment by Woon-Young Yeo, Sung Ho Moon, Jae-Hoon Kim

    Published 2014-01-01
    “…Second, an uplink scheduling algorithm is proposed to utilize a leakage pattern of ACI in synchronized operations. …”
    Get full text
    Article
  17. 18017

    Improving myocardial infarction diagnosis with Siamese network-based ECG analysis. by Vaibhav Gadag, Simrat Singh, Anshul Harish Khatri, Shruti Mishra, Sandeep Kumar Satapathy, Sung-Bae Cho, Abishi Chowdhury, Amrit Pal, Sachi Nandan Mohanty

    Published 2025-01-01
    “…<h4>Results</h4>The classification accuracy comes out to be 98%. The algorithm works excellently with datasets having class imbalance by taking pair of images as input. …”
    Get full text
    Article
  18. 18018

    Airport Emergency Rescue Model Establishment and Performance Analysis Using Colored Petri Nets and CPN Tools by Qingkun Yu, Liangcai Cai, Xiao Tan

    Published 2018-01-01
    “…We draw the basic flow chart of AER and, on this basis, propose the basic algorithm of establishing an AER colored Petri net. …”
    Get full text
    Article
  19. 18019

    Legitimate expectations in civil proceedings: traditional legal understanding and synergetic approach by O. H. Bortnik

    Published 2021-09-01
    “…The main result of the study is to join a synergetic approach to legal understanding, which provides a complex but clear algorithm for comparing formal and substantive legal phenomena in civil proceedings, which is a multi-stage test of proportionality as a universal tool which provides an opportunity to take into account the diversity of certain law enforcement circumstances in the case, ensuring the legitimate expectations of the person of substantive and procedural nature. …”
    Get full text
    Article
  20. 18020

    Reinforced Cost-Sensitive Graph Network for Detecting Fraud Leaders in Telecom Fraud by Peiwen Gao, Zhihua Li, Dibin Zhou, Liang Zhang

    Published 2024-01-01
    “…Finally, weight coefficients are dynamically optimized using the Deep Deterministic Policy Gradient (DDPG) algorithm, and the prediction results of the three base classifiers are combined to produce the final classification outcomes. …”
    Get full text
    Article