Showing 5,121 - 5,140 results of 13,928 for search '(( whole algorithm ) OR ( while algorithm ))', query time: 0.17s Refine Results
  1. 5121

    T‐depth reduction method for efficient SHA‐256 quantum circuit construction by Jongheon Lee, Sokjoon Lee, You‐Seok Lee, Dooho Choi

    Published 2023-01-01
    “…Abstract To perform a quantum brute force attack on a cryptosystem based on Grover's algorithm, it is necessary to implement a quantum circuit of the cryptographic algorithm. …”
    Get full text
    Article
  2. 5122

    A Novel, Open Access Method to Assess Sleep Duration Using a Wrist-Worn Accelerometer. by Vincent T van Hees, Séverine Sabia, Kirstie N Anderson, Sarah J Denton, James Oliver, Michael Catt, Jessica G Abell, Mika Kivimäki, Michael I Trenell, Archana Singh-Manoux

    Published 2015-01-01
    “…No such group differences were found for total sleep duration. Our algorithm was validated against data from a polysomnography study on 28 persons which found a longer time window and lower angle threshold to have better sensitivity to wakefulness, while the reverse was true for sensitivity to sleep. …”
    Get full text
    Article
  3. 5123

    Bilevel Optimization for ISAC Systems with Proactive Eavesdropping Capabilities by Tingyue Xue, Wenhao Lu, Mianyi Zhang, Yinghui He, Yunlong Cai, Guanding Yu

    Published 2025-07-01
    “…With the help of the proposed algorithm, we obtain the optimal solution of the analog transmit beamforming matrix and the digital beamforming vector. …”
    Get full text
    Article
  4. 5124

    Detection of mare parturition through balanced multi-scale feature fusion based on improved Libra RCNN. by Buyu Wang, Weijun Duan, Jian Zhao, Dongyi Bai

    Published 2025-01-01
    “…This paper addresses the challenges of manual monitoring of parturition in large-scale equine facilities due to the unpredictability of mare parturition timing, proposing an algorithm for detecting mare parturition through a balanced multi-scale feature fusion based on an improved Libra RCNN. …”
    Get full text
    Article
  5. 5125

    A photovoltaic power forecasting method based on the LSTM-XGBoost-EEDA-SO model by Ying Xu, Xinrong Ji, Zhengyang Zhu

    Published 2025-08-01
    “…In comparison with Particle Swarm Optimization (PSO), Sparrow Search Algorithm (SSA), and the equal-weight assignment approach for high- and low-frequency component forecasting, the proposed SO algorithm attains the lowest forecasting errors. …”
    Get full text
    Article
  6. 5126

    Objects outline delineation by nonliniear filtration methods for boundary pixels by D. V. Zaerko, V. A. Lipnitski, N. L. Bobrova, Dm. V. Zaerko

    Published 2022-12-01
    “…A processing of border pixel from pixel map originate problem while work with outline objects segmentation algorithm on bitmap images, which are based on 2D convolution operation. …”
    Get full text
    Article
  7. 5127

    Evolved Motor Design Process to Reduce the Design Expense of Axial Flux Permanent Magnet Motor by Jong-Min Ahn, Dong-Kuk Lim, Min-Mo Koo

    Published 2025-01-01
    “…Design variables with significant impact on performance are selected, and an optimal design is conducted using a multi-objective optimization algorithm. The analytical method employs the space harmonic method to calculate the motor’s magnetic field distribution using Fourier series, while the conformal mapping method considers the slot effect by incorporating it into the air gap flux density. …”
    Get full text
    Article
  8. 5128

    SP-Pillars: An Efficient LiDAR 3D Objects Detection Framework With Multi-Scale Feature Perception and Optimization by Tingshuai Chen, Ye Yuan, Bingyang Yin, Yuanhong Liao

    Published 2025-01-01
    “…The experimental evaluation results on the KITTI dataset indicate that the proposed algorithm is reliable and effective. Compared with other related algorithms, this algorithm exhibits excellent detection performance, slightly improving detection speed while maintaining high accuracy, meeting the requirements of real-time processing, and has important application value in optimizing autonomous driving technology.…”
    Get full text
    Article
  9. 5129

    Sensitive and specific peak detection for SELDI-TOF mass spectrometry using a wavelet/neural-network based approach. by Vincent A Emanuele, Gitika Panicker, Brian M Gurbaxani, Jin-Mann S Lin, Elizabeth R Unger

    Published 2012-01-01
    “…In this work, we study the preprocessing of SELDI in detail and introduce improvements. While many algorithms, including the vendor supplied software, can identify peak clusters of specific mass (or m/z) in groups of spectra with high specificity and low false discover rate (FDR), the algorithms tend to underperform estimating the exact prevalence and intensity of peaks in those clusters. …”
    Get full text
    Article
  10. 5130

    An adaptive continuous threshold wavelet denoising method for LiDAR echo signal by Dezhi Zheng, Tianchi Qu, Chun Hu, Shijia Lu, Zhongxiang Li, Guanyu Yang, Xiaojun Yang

    Published 2025-06-01
    “…In this paper, a novel adaptive continuous threshold wavelet denoising algorithm is proposed to filter out the noise. The algorithm features an adaptive threshold and a continuous threshold function. …”
    Get full text
    Article
  11. 5131

    A Novel Green Logistics Vehicle Scheduling Method Against Road Congestion Utilizing Vehicle–Road–Cloud Collaborative Technology by Rui Zheng, Zhiwei Zhu, Xiaolu Ma, Ruiyang Shi, Zibao Lu

    Published 2025-01-01
    “…To solve this model, an initial solution is constructed using an energy-saving algorithm, while exploring a Cauchy variational strategy and a parallel local search to propose an improved adaptive large neighborhood search (ALNS) algorithm. …”
    Get full text
    Article
  12. 5132

    Closely Spaced Multi-Target Association and Localization Using BR and AOA Measurements in Distributed MIMO Radar Systems by Zehua Yu, Ziyang Jin, Ting Sun, Jinshan Ding, Jun Li, Qinghua Guo

    Published 2025-03-01
    “…To address this, we formulate the objective function as a form of the product of certain local functions, and we design a factor graph-based iterative message-passing algorithm. The message-passing algorithm dynamically approximates the complex local functions involved in the problem, delivering excellent performance while maintaining low complexity. …”
    Get full text
    Article
  13. 5133

    Lightweight CNN-Based Visual Perception Method for Assessing Local Environment Complexity of Unmanned Surface Vehicle by Tulin Li, Xiufeng Zhang, Yingbo Huang, Chunxi Yang

    Published 2025-02-01
    “…Subsequently, this identification result can be used as feedback for the heuristic algorithm to optimize and plan the USV’s path. The simulation results indicate that the developed model achieves an 80% reduction in model size while maintaining an accuracy exceeding 90%. …”
    Get full text
    Article
  14. 5134

    Meta-heuristic-based offloading task optimization in mobile edge computing by Aamir Abbas, Ali Raza, Farhan Aadil, Muazzam Maqsood

    Published 2021-06-01
    “…In this article, we proposed an optimal selection of offloading tasks using well-known metaheuristics, ant colony optimization algorithm, whale optimization algorithm, and Grey wolf optimization algorithm using variant design of these algorithms according to our problem through mathematical modeling. …”
    Get full text
    Article
  15. 5135

    Simultaneous Multi-Objective and Topology Optimization: Effect of Mesh Refinement and Number of Iterations on Computational Cost by Daniel Miler, Matija Hoić, Rudolf Tomić, Andrej Jokić, Robert Mašović

    Published 2025-07-01
    “…The multi-objective algorithm dynamically adjusts domain size, support locations, and load magnitudes during optimization. …”
    Get full text
    Article
  16. 5136

    Lithology Identification of Buried Hill Reservoirs Based on Support Vector Machine by GAO Yongde, WU Jinbo, SUN Dianqiang

    Published 2025-02-01
    “…To address this issue, we selecte the HZ depression as the study area and propose a lithology identification model based on the support vector machine (SVM) algorithm. SVM is well-suited for handling high-dimensional data and exhibits strong generalization capability, while being relatively simple to implement, making it ideal for identifying complex reservoir lithology. …”
    Get full text
    Article
  17. 5137

    A Bio-Optimization Approach for Renewable Energy Management: The Case of a University Building in a Tropical Climate by Orlando Aguilar Pinzón, Orlando Aguilar Gallardo, Miguel Chen Austin

    Published 2025-04-01
    “…These findings highlight some of the challenges with integrating renewable energy systems into existing buildings while showcasing the potential of biomimetic algorithms, like the PSO and the GA, for targeted optimization tasks. …”
    Get full text
    Article
  18. 5138

    MultS-ORB: Multistage Oriented FAST and Rotated BRIEF by Shaojie Zhang, Yinghui Wang, Jiaxing Ma, Jinlong Yang, Liangyi Huang, Xiaojuan Ning

    Published 2025-07-01
    “…The proposed method preserves all the advantages of the traditional ORB algorithm while significantly improving feature matching accuracy under illumination-induced blurring. …”
    Get full text
    Article
  19. 5139

    A System for Real-Time Detection of Abandoned Luggage by Ivan Vrsalovic, Jonatan Lerga, Marina Ivasic-Kos

    Published 2025-05-01
    “…To do this, we use an adapted YOLOv11-s model and a proposed algorithm for detecting unattended luggage. The system uses the OpenCV library for the video processing of the recorded footage, a detector, and an algorithm that analyzes the movement of a person and their luggage and evaluates their spatial and temporal relationships to determine whether the luggage is truly abandoned. …”
    Get full text
    Article
  20. 5140

    ADAM-DETR: an intelligent rice disease detection method based on adaptive multi-scale feature fusion by Hanyu Song, Xinyue Huang, Ziqiang Wang, Jianwei Hu, Huasheng Zhang, Hui Yang

    Published 2025-08-01
    “…Abstract Rice diseases pose a severe threat to global food security, while traditional detection methods suffer from low efficiency and dependence on manual expertise. …”
    Get full text
    Article