Showing 5,981 - 6,000 results of 13,928 for search '(( whole algorithm ) OR ( while algorithm ))', query time: 0.20s Refine Results
  1. 5981

    A Comprehensive Review of MI-HFE and IPHFE Cryptosystems: Advances in Internal Perturbations for Post-Quantum Security by Yong Wang, Lingyue Li, Ying Zhou, Huili Zhang

    Published 2024-10-01
    “…While Grover’s algorithm presents a comparatively lesser threat to symmetric encryption, it still accelerates key search processes, creating potential vulnerabilities. …”
    Get full text
    Article
  2. 5982

    Schur Complement Optimized Iterative EKF for Visual–Inertial Odometry in Autonomous Vehicles by Guo Ma, Cong Li, Hui Jing, Bing Kuang, Ming Li, Xiang Wang, Guangyu Jia

    Published 2025-07-01
    “…The experimental results show that the algorithm achieves superior state estimation performance on several typical visual–inertial datasets, demonstrating excellent accuracy and robustness.…”
    Get full text
    Article
  3. 5983

    Design and Implementation of Hybrid GA-PSO-Based Harmonic Mitigation Technique for Modified Packed U-Cell Inverters by Hasan Iqbal, Arif Sarwat

    Published 2024-12-01
    “…By utilizing the multi-objective optimization method, the approach minimizes THD while keeping voltage and efficiency constraints. …”
    Get full text
    Article
  4. 5984

    Lightweight UAV Detection Method Based on IASL-YOLO by Huaiyu Yang, Bo Liang, Song Feng, Ji Jiang, Ao Fang, Chunyun Li

    Published 2025-04-01
    “…To address this, we propose the IASL-YOLO algorithm, which optimizes the YOLOv8s model to enhance detection accuracy and lightweight efficiency. …”
    Get full text
    Article
  5. 5985

    Modeling random processes induced by the support surface profile in transport and technological systems by Yu. P. Kornyushin, A. V. Lavrov, A. V. Sidorova

    Published 2023-09-01
    “…The adequacy of the algorithm has been confirmed through a comprehensive analysis of at least 50 implementations, highlighting its effectiveness and reliability.…”
    Get full text
    Article
  6. 5986

    CONTENT-ANALYSIS OF THE RUSSIAN MARKET OF SELECTIVE α2-ADRENOMIMETIC MEDICINAL DRUGS, APPLIED IN THERAPY OF RHINITIS OF DIFFERENT ETIOLOGY by L. V. Ganicheva, A. I. Lyakhov

    Published 2017-05-01
    “…Followed by the results of thestudies we have obtained the date which can be used while developing the principlesand algorithm of pharmaceutical consulting, as well as for formation of rationalrange of selective α2-adrenomimetic medicinal drugs, applied for therapy of rhinitis ofdifferent etiology.…”
    Get full text
    Article
  7. 5987

    Multi-scale eddy identification and analysis based on deep learning method and ocean color data by Meng Hou, Lixing Fang, Kai Wu, Jie Yang, Ge Chen

    Published 2025-08-01
    “…In this study, we proposed a multi-scale eddy detection neural network algorithm (MED-Net) for eddy identification and segmentation task in chlorophyll fields. …”
    Get full text
    Article
  8. 5988

    ICSO: A Novel Hybrid Evolutionary Approach with Crisscross and Perturbation Mechanisms for Optimizing Generative Adversarial Network Latent Space by Zhihui Chen, Ting Lan, Zhanchuan Cai, Zonglin Liu, Renzhang Chen

    Published 2025-05-01
    “…The ICSO algorithm treats the quality and diversity as separate objectives, balancing them through a normalization strategy, while a gradient regularization term (i.e., GP) is introduced into the discriminator’s objective function to stabilize training and mitigate gradient-related issues. …”
    Get full text
    Article
  9. 5989

    Application of Deep Learning to Identify Flutter Flight Testing Signals Parameters and Analysis of Real F-18 Flutter Flight Test Data by Sami Abou-Kebeh, Roberto Gil-Pita, Manuel Rosa-Zurera

    Published 2025-01-01
    “…Deep learning algorithms demonstrate substantial accuracy and robustness, providing reliable parameter identification for flutter analysis while significantly reducing the time spent near flutter conditions. …”
    Get full text
    Article
  10. 5990

    Multivisit Drone-Vehicle Routing Problem with Simultaneous Pickup and Delivery considering No-Fly Zones by Yan-Qiu Liu, Jing Han, Ying Zhang, Yan Li, Tao Jiang

    Published 2023-01-01
    “…Given the intricacy of the MILP model, we propose a two-stage heuristic algorithm based on a simulated annealing approach, combined with strategies for rectifying infeasible solutions and expediting algorithmic processes. …”
    Get full text
    Article
  11. 5991

    Dynamic Sensor-Based Data Management Optimization Strategy of Edge Artificial Intelligence Model for Intelligent Transportation System by Nu Wen, Ying Zhou, Yang Wang, Ye Zheng, Yong Fan, Yang Liu, Yankun Wang, Minmin Li

    Published 2025-03-01
    “…Experimental results show that while maintaining the same recall rate, the inference time is reduced to one tenth or even one twentieth of the original time. …”
    Get full text
    Article
  12. 5992

    Analysis of information flow security using software implementing business logic based on stored database program blocks by A. А. Timakov

    Published 2024-04-01
    “…The technology is presented as a step-by-step approach to resolving specific tasks, including the following: designing a database (DB) for storing and processing sensitive information; analyzing dependencies and identifying relevant sets of program blocks in the DB; generating TLA+ specifications for the identified program blocks; labeling specifications according to global security policy rules and additional constraints; applying the specification verification algorithm, and resolving security violations while providing recommendations for software developers. …”
    Get full text
    Article
  13. 5993

    Introducing a Novel Method for Determining the Future Price of the Financial Markets: A Case Study of the Hang Seng Index by Afreen Akashi, Md Sanadiule Ullash, Apurba Das

    Published 2024-12-01
    “…Grey Wolf Optimization, Slime Mold Algorithm, and Genetic Algorithm are the optimization techniques included in this study. …”
    Get full text
    Article
  14. 5994

    ZNN-Based Gait Optimization for Humanoid Robots with ALIP and Inequality Constraints by Yuanji Liu, Hao Jiang, Haiming Mou, Qingdu Li, Jianwei Zhang

    Published 2025-03-01
    “…The results demonstrate that, compared to the absence of an optimization strategy, the proposed algorithm can effectively prevent overshoot and approximate energy-efficient responses caused by large variations in angular momentum.…”
    Get full text
    Article
  15. 5995

    A Novel Framework for Automated Grid Generation and CFD Simulation of Complex Geometries by Chunguang XU, Xin OUYANG, Jie CHEN, Jun LIU

    Published 2024-11-01
    “…This framework integrated body-fitted grids that accommodate intersecting grid lines, the flexible-node finite difference method (FN-FDM) designed for unordered point clouds, and a universal algorithm for freestream preservation (discrete equivalence equation and its discrete rule, DEER). …”
    Get full text
    Article
  16. 5996

    Collision Detection and Reaction for Quadrotors Using Encoder-Integrated Tombo Propellers by Hung Tien Pham, Quang Ngoc Pham, Quan Khanh Luu, Giuseppe Loianno, Van Anh Ho

    Published 2025-01-01
    “…A collision detection algorithm based on this phenomenon successfully identifies eight out of twelve collisions during hover flights, while the remaining four minor collisions, which were undetected, had negligible effects on quadrotor stability. …”
    Get full text
    Article
  17. 5997

    An Investigation of Extended-Dimension Embedded CKF-SLAM Based on the Akaike Information Criterion by Hanghang Xu, Yijin Chen, Wenhui Song, Lianchao Wang

    Published 2024-12-01
    “…Furthermore, the system noise is embedded into the state variables, and an embedding volume criterion is used to improve the conventional CKF while extending the dimensionality. Finally, the proposed algorithm was validated and analyzed through both simulations and real-world experiments. …”
    Get full text
    Article
  18. 5998

    A Complex Network Approach for Quantitative Characterization and Robustness Analysis of Sandstone Pore Network Structure by Yuhao Hu, Guannan Liu, Feng Gao, Fengtian Yue, Tao Gao

    Published 2021-01-01
    “…Then, in view of the problem, which is difficult to quantify the detailed topological structure of the sandstone pore networks in the previous study, the new complex network theory is used to characterize the pore structure. PageRank algorithm is based on the number of connections between targets as a measure index to rank the targets, so the network degree distribution, average path length, clustering coefficient, and robustness based on PageRank algorithm and permeability-related topological parameters are studied. …”
    Get full text
    Article
  19. 5999

    Multisensor Fused Fault Diagnosis for Rotation Machinery Based on Supervised Second-Order Tensor Locality Preserving Projection and Weighted k-Nearest Neighbor Classifier under Ass... by Fen Wei, Gang Wang, Bingyin Ren, Jianghua Ge, Yaping Wang

    Published 2016-01-01
    “…Second-order tensor representation of multisensor fused conditional features is employed to replace the prevailing vector description of features from a single sensor. Then, an SSTLPP algorithm under AMDM (SSTLPP-AMDM) is presented to realize dimensional reduction of original high-dimensional feature tensor. …”
    Get full text
    Article
  20. 6000

    A Swarm-Based Multi-Objective Framework for Lightweight and Real-Time IoT Intrusion Detection by Hessah A. Alsalamah, Walaa N. Ismail

    Published 2025-08-01
    “…MOOIDS-IoT combines a Genetic Algorithm (GA)-based feature selection technique with a multi-objective Particle Swarm Optimization (PSO) algorithm. …”
    Get full text
    Article