Showing 3,181 - 3,200 results of 13,928 for search '(( whole algorithm ) OR ( while algorithm ))', query time: 0.21s Refine Results
  1. 3181

    Reflective Distributed Denial of Service Detection: A Novel Model Utilizing Binary Particle Swarm Optimization—Simulated Annealing for Feature Selection and Gray Wolf Optimization-... by Daoqi Han, Honghui Li, Xueliang Fu

    Published 2024-09-01
    “…This work proposes a new FS approach, BPSO-SA, that is based on the Binary Particle Swarm Optimization (BPSO) and Simulated Annealing (SA) algorithms. It combines these with the Gray Wolf Optimization (GWO) algorithm to optimize the LightGBM model, thereby building a new type of reflective Distributed Denial of Service (DDoS) attack detection model. …”
    Get full text
    Article
  2. 3182
  3. 3183

    Implantation of an Artificial Intelligence Denoising Algorithm Using SubtlePET™ with Various Radiotracers: 18F-FDG, 68Ga PSMA-11 and 18F-FDOPA, Impact on the Technologist Radiation... by Jules Zhang-Yin, Octavian Dragusin, Paul Jonard, Christian Picard, Justine Grangeret, Christopher Bonnier, Philippe P. Leveque, Joel Aerts, Olivier Schaeffer

    Published 2025-07-01
    “…This study assesses the clinical deployment of SubtlePET™, a commercial AI-based denoising algorithm, across three radiotracers—<sup>18</sup>F-FDG, <sup>68</sup>Ga-PSMA-11, and <sup>18</sup>F-FDOPA—with the goal of improving image quality while reducing injected activity, technologist radiation exposure, and scan time. …”
    Get full text
    Article
  4. 3184

    Optimal Power Management to Minimize SER in Amplify and-Forward Relay Networks by M. Abedi, M. J Emadi

    Published 2018-06-01
    “…For this scenario, the maximum SER is minimized over the whole harvesting time slots. We propose a water filling algorithm for the classical relay channel and an iterative algorithm for the multi-branch single-relay cooperative scheme. …”
    Get full text
    Article
  5. 3185

    Quantum-Enhanced Generalized Pattern Search Optimization by Colton Mikes, David Huckleberry Gutman, Victoria E. Howle

    Published 2024-09-01
    “…While the development of quantum computers promises a myriad of advantages over their classical counterparts, care must be taken when designing algorithms that substitute a classical technique with a potentially advantageous quantum method. …”
    Get full text
    Article
  6. 3186

    Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods by Ahmet Emre Ergun, Ozgu Can, Murat Kantarcioglu

    Published 2025-01-01
    “…As a defense mechanism, DP is applied using the Fourier Perturbation Algorithm (FPA) to optimize padding strategies while maintaining network efficiency. …”
    Get full text
    Article
  7. 3187
  8. 3188
  9. 3189

    A Study on the SLAM of Automotive Vehicles Using Bumper-Mounted Dual LiDAR by Jae-Hun Jang, Hyeong-Jun Kim, Kyung-Chang Lee

    Published 2025-01-01
    “…This study proposes a localization and three-dimensional (3D) mapping algorithm for autonomous vehicles using bumper-mounted light detection and ranging (LiDAR) sensors. …”
    Get full text
    Article
  10. 3190

    A hybrid scheduling approach for mega event transportation: integrating harmony search and black widow optimization by Mohd Khaled Shambour, Esam Khan, Muhannad A. Abu-Hashem

    Published 2024-12-01
    “…Specifically, HSBWO outperformed HS with improvements in average fitness values ranging from 3.1% to 55.2%, while improvements over the BWO algorithm ranged from 6.4% to 56.0%, depending on the applied scenarios and population sizes.…”
    Get full text
    Article
  11. 3191
  12. 3192
  13. 3193

    Market Regime Identification and Variable Annuity Pricing: Analysis of COVID-19-Induced Regime Shifts in the Indian Stock Market by Mohammad Sarfraz, Guglielmo D’Amico, Dharmaraja Selvamuthu

    Published 2025-02-01
    “…The Expectation–Maximization (EM) algorithm was employed to achieve robust calibration and enhance pricing accuracy. …”
    Get full text
    Article
  14. 3194

    Combination of machine learning and data envelopment analysis to measure the efficiency of the Tax Service Office by Shofinurdin Soffan, Arif Bramantoro, Ahmad A. Alzahrani

    Published 2025-02-01
    “…Achieving tax targets efficiently while utilizing available resources is crucial. To assess the performance efficiency of decision-making units (DMUs), data envelopment analysis (DEA) is commonly employed. …”
    Get full text
    Article
  15. 3195

    Meeting Stringent QoS Requirements in AAV-Assisted Networks: Resource Allocation and AAVs Positioning by Meriem Hammami, Cirine Chaieb, Wessam Ajib, Halima Elbiaze, Roch Glitho

    Published 2025-01-01
    “…Considered a promising solution, autonomous aerial vehicles (AAVs) can be deployed as flying base stations or relays to provide fast and reliable communication between physicians and remote robots in both uplink and downlink directions, while meeting strict transmission requirements. This paper addresses the joint optimization problem of AAV positioning and resource allocation in AAV-assisted wireless networks to minimize the number of deployed AAVs, all while satisfying stringent transmission quality demands. …”
    Get full text
    Article
  16. 3196

    Iris: A Next Generation Digital Pathology Rendering Engine by Ryan Erik Landvater, Ulysses Balis

    Published 2025-01-01
    “…Digital pathology is a tool of rapidly evolving importance within the discipline of pathology. Whole slide imaging promises numerous advantages; however, adoption is limited by challenges in ease of use and speed of high-quality image rendering relative to the simplicity and visual quality of glass slides. …”
    Get full text
    Article
  17. 3197

    Data popularity-based encrypted deduplication scheme without third-party servers by Guanxiong HA, Qiaowen JIA, Hang CHEN, Chunfu JIA

    Published 2022-08-01
    “…It is effective to balance data security and storage efficiency for setting different levels of security protection for data based on popularity in encrypted deduplication systems.Existing schemes all need introduce a trusted third-party for recording data popularity, while the third party is prone to a single point of failure and efficiency bottleneck.To address this problem, a popularity-based encrypted deduplication scheme without third-party servers was proposed, which accurately recorded the data popularity based on the Count-Min sketch algorithm and Merkle Puzzles protocol, and achieved encrypted deduplication of unpopular data through the sPAKE protocols performed among users.Security analysis and experimental evaluation show that the proposed scheme is secure and efficient.…”
    Get full text
    Article
  18. 3198

    Modeling and Analysis of Staged Constellation Deployment from a Single-Unit System by Daniel Cumbo, Marc Anthony Azzopardi

    Published 2025-06-01
    “…The results indicate that while mission-specific factors influence deployment dynamics, informed selection of the disengagement velocities is crucial for minimizing phase times and mitigating potential delays. …”
    Get full text
    Article
  19. 3199

    A Heuristic Enhancing Artificial Immune System for Three-dimensional Loading Capacitated Vehicle Routing Problem by Peeraya Thapatsuwan, Warattapop Thapatsuwan, Chaichana Kulworatit

    Published 2025-06-01
    “…Comparative experiments were conducted against conventional AIS and the Firefly Algorithm (FA) across 27 benchmark instances. Results demonstrate that En-AIS consistently outperforms both baseline methods in terms of solution quality, achieving an average improvement of 15–20% while maintaining competitive computational times. …”
    Get full text
    Article
  20. 3200

    A Multi-Fusion Early Warning Method for Vehicle–Pedestrian Collision Risk at Unsignalized Intersections by Weijing Zhu, Junji Dai, Xiaoqin Zhou, Xu Gao, Rui Cheng, Bingheng Yang, Enchu Li, Qingmei Lü, Wenting Wang, Qiuyan Tan

    Published 2025-07-01
    “…The risk detection module applies an elliptical buffer zone algorithm to perform dynamic spatial collision determination. …”
    Get full text
    Article