Showing 201 - 220 results of 13,928 for search '(( whole algorithm ) OR ( while algorithm ))', query time: 0.17s Refine Results
  1. 201

    Intelligent data collection algorithm research for WSNs by Zhong Weihe

    Published 2025-02-01
    “…The remaining algorithms in Scenario 4 dropped below 50% by 500 rounds, while the dynamic data collection algorithm was still close to 70% by 1,500 rounds. …”
    Get full text
    Article
  2. 202

    PFW-YOLO Lightweight Helmet Detection Algorithm by Yue Hong, Hao Wang, Shuo Guo

    Published 2025-01-01
    “…The final experimental results indicate that, compared to the original YOLOv8n algorithm, the PFW-YOLO algorithm achieves a 53% reduction in parameters, a 42% decrease in computational effort, and a 51% reduction in model size, while enhancing the mean average precision (mAP) by 0.4%.…”
    Get full text
    Article
  3. 203

    Multifactor Algorithm for Test Case Selection and Ordering by Atulya Gupta, Rajendra Prasad Mahapatra

    Published 2021-06-01
    “…Moreover, evolutionary algorithms such as the genetic process often help in depleting test cases, together with a concurrent decrease in computational runtime. …”
    Get full text
    Article
  4. 204

    Video watermarking algorithm for resisting collusion attacks by LIU Shao-hui, HAN Lu, YAO Hong-xun

    Published 2010-01-01
    “…A content dependent video watermark algorithm for resisting linear collusion attacks was presented. …”
    Get full text
    Article
  5. 205

    OPTIMISATION OF THE MACHINING PROCESS USING GENETIC ALGORITHM by Nadežda ČUBOŇOVÁ, Tomáš DODOK, Zuzana SÁGOVÁ

    Published 2019-09-01
    “…Tool path verification and optimisation are two best ways of dramatically improving manufacturing operations while saving money with relatively little work. Genetic algorithms can be used for improvement of these operations and considerably reduce length of tool paths leading to the reduction of machine times and optimisation of cutting parameters. …”
    Get full text
    Article
  6. 206

    Video watermarking algorithm for resisting collusion attacks by LIU Shao-hui, HAN Lu, YAO Hong-xun

    Published 2010-01-01
    “…A content dependent video watermark algorithm for resisting linear collusion attacks was presented. …”
    Get full text
    Article
  7. 207

    Algorithm of blockchain data provenance based on ABE by Youliang TIAN, Kedi YANG, Zuan WANG, Tao FENG

    Published 2019-11-01
    “…To solve the problem that the blockchain-based traceability algorithm mainly used homomorphic encryption and zero-knowledge proof for privacy protection,making it difficult to achieve dynamic sharing of traceability information,a blockchain data traceability algorithm based on attribute encryption was proposed.In order to realize the dynamic protection of transaction privacy,the strategy update algorithm applicable to block chain was designed based on the CP-ABE scheme proposed by Waters to achieve dynamic protection of transaction privacy.In order to realize the dynamic update of the visibility about block content,based on the strategy update algorithm,the block structure was designed to achieve the dynamic update about the content visibility of the block.The security and experimental simulation analysis show that the proposed algorithm can realize the dynamic sharing of traceability information while completing the protection transaction privacy.…”
    Get full text
    Article
  8. 208

    Research of embedding algorithm for wireless network virtualization by Bin CAO, Shi-chao XIA, Fang HE, Yun LI

    Published 2017-01-01
    “…Wireless network virtualization has become one of the promising techniques in fifth generation mobile networks (5G),and the virtual network embedding plays a very important role.A model was formulated to describe the problem and a wireless virtual network embedding algorithm based on joint bandwidth and power allocation (WVNEA-JBP) was put forward,which selected the suitable node and path to serve the data transmission from virtual networks.In order to minimize the overhead while satisfy the higher capacity request,this algorithm considered the impact of interference of wireless links and supports path splitting.A case study was introduced to show how WVNEA-JBP to work.Furthermore,simulation results show that WVNEA-JBP is able to accomplish the efficient utilization of network resources and improve the accept rate of virtual network requests.…”
    Get full text
    Article
  9. 209

    Congestion control algorithm for unreliable unicast traffic by SONG Li-hua1, CHEN Ming1, WANG Hai-tao2, XIONG Huan1

    Published 2008-01-01
    “…To improve performance in high bandwidth networks when trying to retain fairness, a rate-based congestion control algorithm was proposed for unreliable unicast traffic. …”
    Get full text
    Article
  10. 210

    Influencer autonomy: Navigating authenticity, agencies, and algorithms by SUNDET VILDE SCHANKE, STEEN-JOHNSEN KARI, ANDERSEN MADS MØLLER TOMMERUP

    Published 2025-05-01
    “…Our findings reveal that while influencer autonomy is always limited and partial, it remains a compelling narrative.…”
    Get full text
    Article
  11. 211
  12. 212

    Research of embedding algorithm for wireless network virtualization by Bin CAO, Shi-chao XIA, Fang HE, Yun LI

    Published 2017-01-01
    “…Wireless network virtualization has become one of the promising techniques in fifth generation mobile networks (5G),and the virtual network embedding plays a very important role.A model was formulated to describe the problem and a wireless virtual network embedding algorithm based on joint bandwidth and power allocation (WVNEA-JBP) was put forward,which selected the suitable node and path to serve the data transmission from virtual networks.In order to minimize the overhead while satisfy the higher capacity request,this algorithm considered the impact of interference of wireless links and supports path splitting.A case study was introduced to show how WVNEA-JBP to work.Furthermore,simulation results show that WVNEA-JBP is able to accomplish the efficient utilization of network resources and improve the accept rate of virtual network requests.…”
    Get full text
    Article
  13. 213

    SOMO-m Optimization Algorithm with Multiple Winners by Wei Wu, Atlas Khan

    Published 2012-01-01
    “…More importantly, SOMO-m algorithm with m≥2 can be used to find two or more minimums simultaneously in a single learning iteration process, while the original SOM-based optimization (SOMO) algorithm has to fulfil the same task much less efficiently by restarting the learning iteration process twice or more times.…”
    Get full text
    Article
  14. 214

    Prediction of Hypertension Patients with Machine Learning Algorithm by Eko Priyono

    Published 2025-06-01
    “…These algorithms can predict hypertension risk based on clinical data, such as age, medical history, and lifestyle. …”
    Get full text
    Article
  15. 215

    Fuzzy Guiding of Roulette Selection in Evolutionary Algorithms by Krzysztof Pytel

    Published 2025-02-01
    “…The proposed system enhances the performance, efficiency, and robustness of evolutionary algorithms while reducing the risk of stagnation in suboptimal solutions. …”
    Get full text
    Article
  16. 216

    Parallelization of the Bison Algorithm Applied to Data Classification by Simone A. Ludwig, Jamil Al-Sawwa, Aaron Mackenzie Misquith

    Published 2024-11-01
    “…In data science and machine learning, efficient and scalable algorithms are paramount for handling large datasets and complex tasks. …”
    Get full text
    Article
  17. 217

    Algorithm of fire detection for multi-sensor system by R. A. Bagutdinov, M. F. Stepanov

    Published 2021-11-01
    “…The main scientific goal is for the system to work autonomously on certain segments of the monitoring process, while the three agents, to varying degrees, must interact with each other based on communication and decision-making algorithms.Method. …”
    Get full text
    Article
  18. 218

    Routing Algorithms for SDM Flexible Optical Networks by Ireneusz Olszewski, Ireneusz Szcześniak, Bożena Woźna-Szcześniak

    Published 2024-10-01
    “…This paper considers the online routing, modulation, spectrum, and core allocation problem in elastic optical networks. Three algorithms are proposed to minimize the bandwidth blocking probability while taking into account the impact of interference from established lightpaths. …”
    Get full text
    Article
  19. 219

    Managing Descemet Membrane Detachment by HELP Algorithm by Dhivya Ashok Kumar, Amar Agarwal

    Published 2016-10-01
    “…We present an anterior segment coherence tomography based algorithm using Height, length, extent and pupil (HELP) for management of post operative DMD. …”
    Get full text
    Article
  20. 220

    On the Effectiveness of Optimisation Algorithms for Hydrodynamic Lubrication Problems by František Kocman, Pavel Novotný

    Published 2025-05-01
    “…While the PSWM algorithm also reliably found the global minimum, it exhibited lower speed in the defined problems. …”
    Get full text
    Article