Showing 6,461 - 6,480 results of 13,928 for search '(( whole algorithm ) OR ( while algorithm ))', query time: 0.21s Refine Results
  1. 6461

    Analisa Data Penjulan pada Toko Kelontong Musyawarah Menggunakan Algoritma Apriori by Kirana Anastasya Afika Putri Hilman Hilman

    Published 2022-12-01
    “…This study aimed to determine the pattern of the high frequency of items sold in the Musyawarah grocery store using data mining methods. The Apriori algorithm analyzes sales transactions at the Musyawarah grocery store. …”
    Get full text
    Article
  2. 6462

    Stochastic Planning of Synergetic Conventional Vehicle and UAV Delivery Operations by Konstantinos Kouretas, Konstantinos Kepaptsoglou

    Published 2025-05-01
    “…A nested genetic algorithm is initially used to solve the problem under fixed conditions. …”
    Get full text
    Article
  3. 6463

    Texture mapping of warp knitted shoe upper based on ARAP parameterization method by Guilong Cheng, Aijun Zhang, Yanting Zhang

    Published 2025-01-01
    “…Additionally, discrete harmonic and parametric optimization unfolding algorithms are employed to enhance texture mapping quality. …”
    Get full text
    Article
  4. 6464

    Simulation-Based Assessment of the Control of a Hybrid ECS Including a Vapor Cycle System by Arnav Pathak, Victor Norrefeldt

    Published 2025-03-01
    “…The interfacing reveals that some optimization of the control algorithm is possible for the hybrid ECS, while some operational points already perform as intended. …”
    Get full text
    Article
  5. 6465

    ProCAPTCHA: A profile-based CAPTCHA for personal password authentication. by Nilobon Nanglae, Pattarasinee Bhattarakosol

    Published 2024-01-01
    “…Performance evaluation shows that ProCAPTCHA can identify legitimate users with 100% accuracy, while only 60% of intruders are misclassified as true users. …”
    Get full text
    Article
  6. 6466

    Quantum reinforcement learning in continuous action space by Shaojun Wu, Shan Jin, Dingding Wen, Donghong Han, Xiaoting Wang

    Published 2025-03-01
    “…Quantum reinforcement learning (QRL) is a promising paradigm for near-term quantum devices. While existing QRL methods have shown success in discrete action spaces, extending these techniques to continuous domains is challenging due to the curse of dimensionality introduced by discretization. …”
    Get full text
    Article
  7. 6467

    Development of an AI-Based Self-Diagnosis System for Tropical Diseases by Muhammad Haris Nasri, Bayu Wibisanaa, Lilik Widyawati

    Published 2025-05-01
    “…However, challenges remain in cases with limited symptom data, indicating the need for further development to enhance algorithm performance and expand the clinical database…”
    Get full text
    Article
  8. 6468

    Challenges and Ethical Considerations in Implementing Assistive Technologies in Healthcare by Eleni Gkiolnta, Debopriyo Roy, George F. Fragulis

    Published 2025-01-01
    “…Assistive technologies are becoming an increasingly important aspect of healthcare, particularly for people with physical or cognitive problems. While earlier research has investigated the ethical, legal, and societal implications of AI and assistive technologies, many studies have failed to address real-world obstacles such as data privacy, algorithm bias, and regulatory issues. …”
    Get full text
    Article
  9. 6469

    Large language models design sequence-defined macromolecules via evolutionary optimization by Wesley F. Reinhart, Antonia Statt

    Published 2024-11-01
    “…Utilizing pre-trained language models can potentially reduce the need for hyperparameter tuning while offering new capabilities such as self-reflection. …”
    Get full text
    Article
  10. 6470

    An Extended Virtual Force-Based Approach to Distributed Self-Deployment in Mobile Sensor Networks by Jun Li, Baihai Zhang, Lingguo Cui, Senchun Chai

    Published 2012-03-01
    “…To overcome the connectivity maintenance and nodes stacking problems in the traditional virtual force algorithm (VFA), an extended virtual force-based approach is investigated to achieve the ideal deployment. …”
    Get full text
    Article
  11. 6471

    Dubhe: A Reliable and Low-Latency Data Dissemination Mechanism for VANETs by Lifeng Zhang, Beihong Jin

    Published 2013-12-01
    “…In order to reliably and quickly disseminate the data, we present Dubhe which includes a delay model and an improved greedy broadcast algorithm embedded with a coverage elimination rule. …”
    Get full text
    Article
  12. 6472

    Intrusion detection method for IoT in heterogeneous environment by LIU Jing, MU Zelin, LAI Yingxu

    Published 2024-04-01
    “…Subsequently, an innovative heterogeneous model aggregation algorithm was introduced, utilizing similarity-weighted coefficients for channel averaging, thereby effectively mitigating the adverse effects of Non-IID data during the model aggregation process. …”
    Get full text
    Article
  13. 6473

    Pruning Bayesian networks for computationally tractable multi-model calibration by Nicolas Gratius, Mario Bergés, Burcu Akinci

    Published 2025-05-01
    “…In this work, we propose a graph pruning algorithm to reduce computational cost while minimizing the loss in calibration ability by incorporating domain-driven metrics for selection purposes. …”
    Get full text
    Article
  14. 6474

    Skip-Connected CNN Exploiting BNN Surrogate for Antenna Modelling by Yubo Tian, Jinlong Sun, Zhiwei Zhu

    Published 2025-01-01
    “…The combination of evolutionary algorithms with full-wave electromagnetic (EM) simulation software is an effective method for antenna optimal design. …”
    Get full text
    Article
  15. 6475

    High-Precision Spotlight SAR Imaging with Joint Modified Fast Factorized Backprojection and Autofocus by Man Zhang, Haolin Li, Guanyong Wang

    Published 2020-01-01
    “…Fast factorized backprojection (FFBP) takes advantage of high accuracy of time-domain algorithms while also possessing high efficiency comparable with conventional frequency domain algorithms. …”
    Get full text
    Article
  16. 6476

    Normative Production Accounting in the Digital Economy: Issues and Solutions by M. V. Polulekh

    Published 2018-08-01
    “…It was determined that the formula for the normative method requires modification while the algorithm for allocation of indirect costs requires justification and interpretation. …”
    Get full text
    Article
  17. 6477

    Towards a Scalable and Adaptive Learning Approach for Network Intrusion Detection by Alebachew Chiche, Million Meshesha

    Published 2021-01-01
    “…An integrated approach of machine learning with knowledge-based system is proposed for intrusion detection. While machine learning algorithm is used to construct a classifier model, knowledge-based system makes the model scalable and adaptive. …”
    Get full text
    Article
  18. 6478

    Thermal pure states for systems with antiunitary symmetries and their tensor network representations by Yasushi Yoneta

    Published 2024-12-01
    “…Thermal pure state algorithms, which employ pure quantum states representing thermal equilibrium states instead of statistical ensembles, are useful both for numerical simulations and for theoretical analysis of thermal states. …”
    Get full text
    Article
  19. 6479

    Client grouping and time-sharing scheduling for asynchronous federated learning in heterogeneous edge computing environment by Qianpiao MA, Qingmin JIA, Jianchun LIU, Hongli XU, Renchao XIE, Tao HUANG

    Published 2023-11-01
    “…., edge heterogeneity, data Non-IID, and communication resource constraints, a grouping asynchronous federated learning (FedGA) mechanism was proposed.Edge nodes were divided into multiple groups, each of which performed global updated asynchronously with the global model, while edge nodes within a group communicate with the parameter server through time-sharing communication.Theoretical analysis established a quantitative relationship between the convergence bound of FedGA and the data distribution among the groups.A time-sharing scheduling magic mirror method (MMM) was proposed to optimize the completion time of a single round of model updating within a group.Based on both the theoretical analysis for FedGA and MMM, an effective grouping algorithm was designed for minimizing the overall training completion time.Experimental results demonstrate that the proposed FedGA and MMM can reduce model training time by 30.1%~87.4% compared to the existing state-of-the-art methods.…”
    Get full text
    Article
  20. 6480

    RESEARCH ON PARAMETRIC ANALYSIS AND MULTI-OBJECTIVE OPTIMIZATION OF CYLINDRICAL PRESSURE STRUCTURE by LIU Feng, TU ChaoHua, ZHAO YanKai

    Published 2021-01-01
    “…In order to improve the design efficiency and performance of the cylindrical pressure structure,strength and stability analysis methods were determined,the initial scheme was analyzed. the second development of Abaqus software was carried out by using Python language,Abaqus was integrated with i Sight software,the parametric analysis flow of pressure structure was designed,could realize automatic modeling and analysis of cylindrical pressure structure. the most Latin hypercube method was used to selectting the sample points,the sensitivity analysis of the design variables were carried out,The comparison of the fitting accuracy shown that the response surface model had the highest accuracy,the approximate model of the cylindrical pressure structure based on the fourth-order response surface was obtained. the multi-objective optimization model was established,The second generation of non dominated sorting genetic algorithm was used to solving the multi-objective optimization problem,the results shown that the weight of the optimization scheme was reduced,while the ultimate strength was greatly improved,improved the performance of the cylindrical pressure structure.…”
    Get full text
    Article