Showing 4,601 - 4,620 results of 13,928 for search '(( whole algorithm ) OR ( while algorithm ))', query time: 0.21s Refine Results
  1. 4601

    Gene-boosted assembly of a novel bacterial genome from very short reads. by Steven L Salzberg, Daniel D Sommer, Daniela Puiu, Vincent T Lee

    Published 2008-09-01
    “…Our method includes a novel gene-boosting algorithm that uses amino acid sequences from predicted proteins to build a better assembly. …”
    Get full text
    Article
  2. 4602

    Optimal policy for composite sensing with crowdsourcing by Bei Zhao, Siwen Zheng, Jianhui Zhang

    Published 2020-05-01
    “…In the applications, the smartphone and its user act as a whole, which called as the composite node in this article. …”
    Get full text
    Article
  3. 4603

    Energy efficient control of indoor environments under time-varying multi-parameter uncertainty by Jianhao ZHAO, Hua SONG, Xinyuan NAN, Xin CAI

    Published 2024-12-01
    “…Experiments show that the proposed DDPG-PER algorithm can control the indoor environment within the required range by combining multiple time-varying parameters under different outdoor air quality conditions in winter and summer seasons. …”
    Get full text
    Article
  4. 4604

    About a Routing Problem of the Tool Motion on Sheet Cutting by A. A. Petunin, A. G. Chentsov, P. A. Chentsov

    Published 2015-04-01
    “…An optimal procedure based on the dynamic programming and an effective heuristic algorithm realized on a multicore computer are proposed. …”
    Get full text
    Article
  5. 4605

    Fragmentation-Avoiding Spectrum Assignment Strategy Based on Spectrum Partition for Elastic Optical Networks by Huan-Lin Liu, Lei Lv, Yong Chen, Chengying Wei

    Published 2017-01-01
    “…For alleviating spectrum fragmentation, a spectrum partition policy, splitting the whole optical spectrum into several dedicated partitions, is presented. …”
    Get full text
    Article
  6. 4606

    A deep reinforcement learning solution to help reduce the cost in waiting time of securing a traffic light for cyclists by Lucas Magnana, Hervé Rivano, Nicolas Chiabaut

    Published 2024-12-01
    “…Vehicle counter data are used to compare the DRL approach with the actuated traffic light control algorithm over whole days. Results show that DRL achieves better minimization of vehicle waiting time at every hours. …”
    Get full text
    Article
  7. 4607

    Unmanned aerial vehicle field sampling and antenna pattern reconstruction using Bayesian compressed sensing by Sayeh Mirzaei, Alireza Gholipour

    Published 2019-06-01
    “…Performing onsite measurements by scanning the whole 4π [sr] solid angle around the antenna under test (AUT) is more complicated. …”
    Get full text
    Article
  8. 4608

    Disturbance Signal Generation Method of AC Impedance Test Based on Boost Circuit by SHEN Zehua, PENG Zaiwu, CHEN Xiongchun, WANG Jian, LIU Shaochun

    Published 2022-02-01
    “…Based on the input constant current PID control algorithm of the existing DC/DC loop, a corresponding digital controller is constructed, and the physical prototype is tested and analyzed for the generated signal. …”
    Get full text
    Article
  9. 4609

    ACTIVE DISTURBANCE REJECTION CONTROL FOR STRUCTURE VIBRATION WITH ELECTROMAGNETIC INERTIAL ACTUATOR (MT) by LU Lu, LI Jing, ZHANG LuYao, ZHU ChaoWei, LI ShengQuan

    Published 2023-01-01
    “…Then, the three-order linear extended state observer was used to estimate the uncertainties and state variables for the whole vibration control system. Additionally, the influence of each parameter of ADRC on the vibration control was also theoretically analyzed to achieve the excellent vibration suppression performance. …”
    Get full text
    Article
  10. 4610

    CytoPy: An autonomous cytometry analysis framework. by Ross J Burton, Raya Ahmed, Simone M Cuff, Sarah Baker, Andreas Artemiou, Matthias Eberl

    Published 2021-06-01
    “…We demonstrate the ability of CytoPy to phenotype T cell subsets in whole blood samples even in the presence of significant batch effects due to technical and user variation. …”
    Get full text
    Article
  11. 4611

    A Novel Way to Relate Ontology Classes by Ami T. Choksi, Devesh C. Jinwala

    Published 2015-01-01
    “…We compare the results of our algorithms with those of a candidate reasoner, namely, the pellet reasoner. …”
    Get full text
    Article
  12. 4612

    Monitoring the reliability of integrated circuits protection against Trojans: encoding and decoding of combinational structures by L. A. Zolotorevich, V. A. Ilyinkov

    Published 2021-09-01
    “…An algorithm for cracking the code of combinational circuits is proposed, based on the description of encoded structure by the resolution function and reducing the problem to SAT CNF. …”
    Get full text
    Article
  13. 4613

    Sound Transmission Through a Thin Plate with Shaped Frequency Response by Stanislaw WRONA, Krzysztof MAZUR, Jaroslaw RZEPECKI, Anna CHRAPOŃSKA, Marek PAWEŁCZYK

    Published 2019-11-01
    “…Thin plates, in the form of individual panels or whole device casings, often separate the noise source from its recipients. …”
    Get full text
    Article
  14. 4614

    Continued Fraction Interpolation of Preserving Horizontal Asymptote by Yushan Zhao, Kaiwen Wu, Jieqing Tan

    Published 2022-01-01
    “…By means of the relationship between the leading coefficients of the numerator and the denominator and the reciprocal differences of the continued fraction interpolation, a novel algorithm for the continued fraction interpolation is constructed in an effort to preserve the horizontal asymptote while approximating the given function with a horizontal asymptote. …”
    Get full text
    Article
  15. 4615

    Optimization of Processor Clock Frequency for Sensor Network Nodes Based on Energy Use and Timing Constraints by Youngmin Kim, Heeju Joo, Chan-Gun Lee

    Published 2014-06-01
    “…We analyze the extended model and verify that our algorithm calculates the clock frequency that optimizes energy savings while satisfying the timing constraints.…”
    Get full text
    Article
  16. 4616

    Research on large-scale identity authentication architecture based on combined symmetric key by LIU Tong, XU Guan-ning

    Published 2009-01-01
    “…A large-scale real-name authentication architecture and key management protocol based on combined symmet-ric key algorithm were proposed.With the CSK algorithm and smart card technology, the authentication process can be finished in the chips, and the management of large-scale keys can be simplified to the management of small-scale key seeds.The security of the proposed architecture is analyzed and the experimental results are shown.It is obvious that the abilities of large-scale identity authentication and management are improved while the building cost is reduced evidently with the application of the proposed architecture.It is an applicable solution for real-name authentication network.…”
    Get full text
    Article
  17. 4617

    Research on range matching for wire-speed hardware NIDS by CHEN Shu-hui, SUN Zhi-gang, SU Jin-shu

    Published 2006-01-01
    “…To solve the rule matching problem of hardware NIDS,a range matching algorithm LRC-RM was proposed,with more efficient memory utilization.The approach mapped the port range into a compressed bit vector and organized the bit vectors as an extended balanced binary tree.Experiments were employed to show that NIDS using this approach can perform wire-speed range matching for OC-192 links,while saving 99% memory resource comparing to the existing methods.The algorithm is easy to be implemented within a chip without additional RAM.…”
    Get full text
    Article
  18. 4618

    Deadline-Aware Energy-Efficient Query Scheduling in Wireless Sensor Networks with Mobile Sink by Murat Karakaya

    Published 2013-01-01
    “…Thus, the proposed scheduling algorithm aims to minimize the number of missed deadlines while keeping the level of energy consumption at the minimum.…”
    Get full text
    Article
  19. 4619

    Reconstruction of linear block code parity-check matrix based on fault-tolerant Gaussian elimination by WANG Zhongyong, ZHANG Hong, GONG Kexian, WANG Wei, ZHANG Ling, ZHU Junhao

    Published 2025-04-01
    “…For the LDPC(648,324) code under the IEEE802.11n protocol, the existing algorithms fail when the bit error rate reaches 0.005 5, while the reconstruction rate of the proposed algorithm for the parity-check matrix still reaches over 98% when the bit error rate is 0.008.…”
    Get full text
    Article
  20. 4620

    Optimal fusion β-quaternion filtering from delayed observations and packet losses with compensation strategy under properness by J. D. Jiménez-López, R. M. Fernández-Alcalá, F. Gutiérrez-Trujillo, E. Grassucci, D. Comminiello

    Published 2025-12-01
    “…Under first-order properness conditions, a recursive algorithm is developed to compute the optimal filter. …”
    Get full text
    Article