Showing 6,061 - 6,080 results of 13,928 for search '(( whole algorithm ) OR ( while algorithm ))', query time: 0.29s Refine Results
  1. 6061

    Quantum Key Relay Scheme Based on Trusted Control Center by Shaosheng Jiang, Ruinan Chi, Xiaojun Wen

    Published 2014-06-01
    “…A transmit quantum key relay scheme based on trusted control center and trusted quantum relay server was proposed.The quantum key one-time pad encryption algorithm was used in the design of trusted relay protocol.Upon the establishment of trusted relay network,the trusted control center was used to ensure the credibility and security of access relay,and the user's IP address was hidden in the quantum information data that had been encrypted only for the legal user to decrypt and transmit credible information.The security analysis shows,users who do not connect with the quantum channel can still use the trusted relay network to transmit quantum key securely in a long-distance transmission while attackers can not obtain useful quantum key information from the network.…”
    Get full text
    Article
  2. 6062

    Efficient traceable identity-based signature scheme by DU Hong-zhen1, WEN Qiao-yan2

    Published 2009-01-01
    “…Compared with the existing schemes without suffering from key escrow, the scheme is the most efficient scheme and the signing algorithm needs only one scalar multiplication in the additive group while the reverse operation requires only three scalar multiplications.…”
    Get full text
    Article
  3. 6063

    Treatment of Subcorneal Pustular Dermatosis without Dapsone: A Case Report and Review of the Literature by Lindsey J. Wanberg, Brittney Schultz, Amrita Goyal

    Published 2024-01-01
    “…Subcorneal pustular dermatosis (SPD) is a rare neutrophilic dermatosis characterized by pustules on the trunk and intertriginous areas. While oral dapsone is the first-line treatment for SPD, alternative options are necessary for patients with glucose-6-phosphate dehydrogenase deficiency, drug hypersensitivity reactions, or refractory disease. …”
    Get full text
    Article
  4. 6064

    Dynamic Modeling and Composite Attitude Cooperative Control for Dumbbell-Shaped Spacecraft by Qingmu Ai, Yingzi Guan, Yuzhi Wang, Shunli Li

    Published 2025-01-01
    “…First, a dynamic model is formulated that accounts for actuator faults and external disturbances while enabling distributed attitude coordination control. …”
    Get full text
    Article
  5. 6065

    Multiuser computation offloading for edge-cloud collaboration using submodular optimization by Bing LIANG, Wen JI

    Published 2020-10-01
    “…A computation offloading scheme based on edge-cloud computing was proposed to improve the system utility of multiuser computation offloading.This scheme improved the system utility while considering the optimization of edge-cloud resources.In order to tackle the problems of computation offloading mode selection and edge-cloud resource allocation,a greedy algorithm based on submodular theory was developed by fully exploiting the computing and communication resources of cloud and edge.The simulation results demonstrate that the proposed scheme effectively reduces the delay and energy consumption of computing tasks.Additionally,when computing tasks are offloaded to edge and cloud from devices,the proposed scheme still maintains stable system utilities under ultra-limited resources.…”
    Get full text
    Article
  6. 6066

    Pattern mining and prediction techniques for user behavioral trajectories in e-commerce. by Xin Wang, Dong-Feng Liu

    Published 2025-01-01
    “…Second, it introduces a frequent sub-trajectory mining algorithm that emphasizes the order of user visits for trajectory analysis and prediction. …”
    Get full text
    Article
  7. 6067

    Lightweight YOLOv8s-Based Strawberry Plug Seedling Grading Detection and Localization via Channel Pruning by CHEN Junlin, ZHAO Peng, CAO Xianlin, NING Jifeng, YANG Shuqin

    Published 2024-11-01
    “…Furthermore, a two-stage seedling-hole matching algorithm was introduced based on the pruned YOLOv8s model. …”
    Get full text
    Article
  8. 6068

    A Review of Numerical Techniques for Frictional Contact Analysis by Govind Vashishtha, Sumika Chauhan, Riya Singh, Manpreet Singh, Ghanshyam G. Tejani

    Published 2025-01-01
    “…The choice of contact algorithm significantly impacts accuracy and efficiency; penalty methods, though computationally efficient, can lack accuracy at high friction coefficients; whereas, Lagrange multiplier methods, while more accurate, are computationally more demanding. …”
    Get full text
    Article
  9. 6069

    Feature fusion with attributed deepwalk for protein–protein interaction prediction by Mei-Yuan Cao, Suhaila Zainudin, Kauthar Mohd Daud

    Published 2025-04-01
    “…Abstract protein–protein interactions (PPIs) are crucial for understanding cellular processes and disease mechanisms. While experimental methods for detecting PPIs exist, computational approaches offer a more efficient alternative. …”
    Get full text
    Article
  10. 6070

    SHAPING THE STOCK PORTFOLIO BY THE INVESTMENT RATING METHOD by Svyatoslav N. Digo, Aleksandra M. Sokolova

    Published 2018-02-01
    “…For the last five years capitalization of joint stock companies in Russia nearly doubled while the major indicator of stock market  development, i. e. …”
    Get full text
    Article
  11. 6071

    PV<i>k</i>NN: A Publicly Verifiable and Privacy-Preserving Exact <i>k</i>NN Query Scheme for Cloud-Based Location Services by Jingyi Li, Yuqi Song, Chengliang Tian, Weizhong Tian

    Published 2025-06-01
    “…The <i>k</i>-nearest- neighbor (<i>k</i>NN) algorithm is crucial in data mining and machine learning, yet its deployment on large-scale datasets within cloud environments presents significant security and efficiency challenges. …”
    Get full text
    Article
  12. 6072

    RWA-BFT: Reputation-Weighted Asynchronous BFT for Large-Scale IoT by Guanwei Jia, Zhaoyu Shen, Hongye Sun, Jingbo Xin, Dongyu Wang

    Published 2025-01-01
    “…This paper introduces RWA-BFT, a reputation-weighted asynchronous Byzantine Fault Tolerance (BFT) consensus algorithm designed to address the scalability and performance challenges of blockchain systems in large-scale IoT scenarios. …”
    Get full text
    Article
  13. 6073

    Machine Learning-Enhanced Attribute-Based Authentication for Secure IoT Access Control by Jibran Saleem, Umar Raza, Mohammad Hammoudeh, William Holderbaum

    Published 2025-04-01
    “…This research presents the SmartIoT Hybrid Machine Learning (ML) Model, a novel integration of Attribute-Based Authentication and a lightweight machine learning algorithm designed to enhance security while minimising computational overhead. …”
    Get full text
    Article
  14. 6074

    DRACO: Decentralized Asynchronous Federated Learning Over Row-Stochastic Wireless Networks by Eunjeong Jeong, Marios Kountouris

    Published 2025-01-01
    “…Our approach leverages continuous communication, allowing edge devices to perform local training and exchange model updates along a continuous timeline, thereby eliminating the need for synchronized timing. Additionally, our algorithm decouples communication and computation schedules, enabling complete autonomy for all users while effectively addressing straggler issues. …”
    Get full text
    Article
  15. 6075

    Balancing resource utilization and slice dissatisfaction through dynamic soft slicing for 6G wireless networks by Zeinab Sasan, Siavash Khorsandi

    Published 2025-07-01
    “…The problem is formulated as a Mixed Integer Linear Programming (MILP) model, aiming to maximize network utilization while minimizing slice dissatisfaction. Given the NP-hard nature of the problem, we propose the Heuristic Resource Allocation for Soft Slicing (HRASS) algorithm, which achieves near-optimal performance with significantly reduced computational complexity. …”
    Get full text
    Article
  16. 6076

    Optimizing the train timetable in a high-speed rail corridor: The implications on departure time, fare cost and seat preference of passengers. by Zhipeng Huang, Limin Yang, Jinlian Li, Tao Zhang, Zixian Qu, Yusen Miao

    Published 2025-01-01
    “…Using the Lanzhou-Xi'an high-speed railway corridor as a case study, we apply a genetic algorithm combined with a nested Frank-Wolfe method to solve the model. …”
    Get full text
    Article
  17. 6077

    Low-Power Portable System for Power Grid Foreign Object Detection Based on the Lightweight Model of Improved YOLOv7 by Yonghuan He, Rong Wu, Chao Dang

    Published 2025-01-01
    “…Foreign objects caught and entangled on power grid transmission lines, power towers and other equipment can pose potential threats to the power system. The detection algorithm for foreign objects in the power grid cannot achieve the optimal balance in terms of accuracy and efficiency. …”
    Get full text
    Article
  18. 6078

    External phantom-based validation of a deep-learning network trained for upscaling of digital low count PET data by Anja Braune, René Hosch, David Kersting, Juliane Müller, Frank Hofheinz, Ken Herrmann, Felix Nensa, Jörg Kotzerke, Robert Seifert

    Published 2025-04-01
    “…Conclusions Phantom-based validation of AI-based algorithms allows for a detailed assessment of the performance, limitations, and generalizability of deep-learning based algorithms for PET image enhancement. …”
    Get full text
    Article
  19. 6079

    Dual-coding Contrastive Learning Based on the ConvNeXt and ViT Models for Morphological Classification of Galaxies in COSMOS-Web by Shiwei Zhu, Guanwen Fang, Chichun Zhou, Jie Song, Zesen Lin, Yao Dai, Xu Kong

    Published 2025-01-01
    “…Using the GoogLeNet algorithm, we classify the morphology of the remaining 27% of galaxies. …”
    Get full text
    Article
  20. 6080

    Genotyping Identification of Maize Based on Three-Dimensional Structural Phenotyping and Gaussian Fuzzy Clustering by Bo Xu, Chunjiang Zhao, Guijun Yang, Yuan Zhang, Changbin Liu, Haikuan Feng, Xiaodong Yang, Hao Yang

    Published 2025-01-01
    “…By leveraging the 3D reconstruction algorithm SFM (Structure from Motion), we promptly obtained point clouds of the maize tassels. …”
    Get full text
    Article