Showing 661 - 680 results of 13,928 for search '(( whole algorithm ) OR ( while algorithm ))', query time: 0.23s Refine Results
  1. 661

    Game and Application Purchasing Patterns on Steam using K-Means Algorithm by Salman Fauzan Fahri Aulia, Yana Aditia Gerhana, Eva Nurlatifah

    Published 2024-11-01
    “…The findings reveal that free-to-play games are the most popular among users, while the "Animation Modelling" category is the most expensive based on price comparisons…”
    Get full text
    Article
  2. 662

    Optimal Speed and Position Controller for PMDC Motor Based GWO Algorithm by Iman S. Kareem, Sahar R. Al-Sakini, Ghassan A. Bilal

    Published 2025-07-01
    “…Nonetheless, the primary goal of this work is to determine how well the intelligent algorithm GWO performs while autotuning the PID controller for a permanent magnet direct current (PMDC) motor. …”
    Get full text
    Article
  3. 663

    Image forgery detection algorithm based on U-shaped detection network by Zhuzhu WANG

    Published 2019-04-01
    “…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
    Get full text
    Article
  4. 664

    An Energy-Efficient CKN Algorithm for Duty-Cycled Wireless Sensor Networks by Lei Wang, Zhuxiu Yuan, Lei Shu, Liang Shi, Zhenquan Qin

    Published 2012-05-01
    “…., duty cycles) using sleep scheduling algorithms. The connected K -neighborhood (CKN) algorithm is an efficient decentralized sleep scheduling algorithm for reducing the number of awake nodes while maintaining both network connectivity and an on-demand routing latency. …”
    Get full text
    Article
  5. 665

    Sigmoid-Function-Based Adaptive Pelican Optimization Algorithm for Global Optimization by A. F. S. Yussif, S. Adjei, B. E. Wilson

    Published 2025-03-01
    “… This paper introduces the Sigmoid-function-based Adaptive Pelican Optimization Algorithm (MPOA), an enhanced version of the traditional Pelican Optimization Algorithm (POA) aimed at improving the POA's performance. …”
    Get full text
    Article
  6. 666

    An interpolated quantized guard band algorithm for physical layer key generation by Yongli An, Kun Zha, Wenfeng Song, Zhanlin Ji

    Published 2025-03-01
    “…With the continuous progress of communication technology, traditional encryption algorithms cannot meet the demands of modern wireless communication security. …”
    Get full text
    Article
  7. 667

    A novel transcendental metaphor metaheuristic algorithm based on power method by Huiying Zhang, Hanshuo Wu, Yifei Gong, Xiao Pan, Qipeng Zhong

    Published 2025-07-01
    “…Abstract This paper proposes a novel metaheuristic algorithm-the Power Method Algorithm (PMA), which is inspired by the power iteration method to solve complex optimization problems. …”
    Get full text
    Article
  8. 668

    Artificial Intelligence and Algorithmic Approaches of Health Security Systems: A Review by Savina Mariettou, Constantinos Koutsojannis, Vassilios Triantafillou

    Published 2025-01-01
    “…According to our approach, the studies analyzed highlight the growing importance of advanced security frameworks, especially those incorporating artificial intelligence and algorithmic methodologies, in safeguarding healthcare systems while enhancing patient care quality. …”
    Get full text
    Article
  9. 669

    Multi-Objective Robust Optimization Reconstruction Algorithm for Electrical Capacitance Tomography by Xuejie Yang, Jing Lei, Qibin Liu

    Published 2025-04-01
    “…Qualitative and quantitative evaluation results demonstrate that the proposed method surpasses mainstream imaging algorithms, enhancing the automation level of the reconstruction process and image quality while exhibiting exceptional robustness. …”
    Get full text
    Article
  10. 670

    DATA DRIVEN RULE-BASED PEAK SHAVING ALGORITHM FOR SCHEDULING REFRIGERATORS by Daniel KWEGYIR, Francis Effah BOAFO, Daniel OPOKU, Emmanuel Asuming FRIMPONG

    Published 2024-12-01
    “…This approach aims to minimize energy consumption while maintaining thermal comfort. The algorithm’s performance was evaluated using real-world data from the Spanish Transmission Service Operators (TSO). …”
    Get full text
    Article
  11. 671

    Efficient Implementation of Matrix-Based Image Processing Algorithms for IoT Applications by Sorin Zoican, Roxana Zoican

    Published 2025-04-01
    “…The proposed method uses CNN in a different way, not for artificial intelligence algorithms, but for matrix calculations using CNN resources effectively while maintaining the accuracy of the calculations. …”
    Get full text
    Article
  12. 672

    Impact on bias mitigation algorithms to variations in inferred sensitive attribute uncertainty by Yanchen Wang, Lisa Singh

    Published 2025-03-01
    “…One solution is to infer the missing sensitive attribute information and apply an existing bias mitigation algorithm using this inferred knowledge. While researchers are beginning to explore this question, it is still unclear how robust existing bias mitigation algorithms are to different levels of inference accuracy. …”
    Get full text
    Article
  13. 673
  14. 674

    BeSnake: A Routing Algorithm for Scalable Spin-Qubit Architectures by Nikiforos Paraskevopoulos, Carmen G. Almudever, Sebastian Feld

    Published 2024-01-01
    “…It also has the option to adjust the level of optimization and to dynamically tackle parallelized routing tasks, all the while maintaining noise awareness. Our simulations demonstrate beSnake's advantage over an existing routing solution on random circuits and real quantum algorithms with up to 1000 qubits, showing an average improvement of up to 80% in gate overhead, 54% in depth overhead, and up to 8.33 times faster routing times.…”
    Get full text
    Article
  15. 675

    Cloud Data Security through BB84 Protocol and Genetic Algorithm by Jaydip Kumar, Vipin Saxena

    Published 2022-12-01
    “…It is a unique algorithm which may be used to minimize the security threats over the clouds. …”
    Get full text
    Article
  16. 676

    Comparison of algorithms for multi-objective optimization of radio technical device characteristics by A. V. Smirnov

    Published 2022-12-01
    “…One of the compared algorithms comprises the Third Evolution Step of Generalized Differential Evolution (GDE3) population-based algorithm for searching the full approximation of the Pareto set simultaneously, while the other three algorithms minimize the scalar objective function to find only one element of the Pareto set in a single search cycle: these comprise Multistart Pattern Search (MSPS), Multistart Sequential Quadratic Programming (MSSQP) method and Particle Swarm Optimization (PSO) algorithms.Results. …”
    Get full text
    Article
  17. 677

    An Enhanced Artificial Lemming Algorithm and Its Application in UAV Path Planning by Xuemei Zhu, Chaochuan Jia, Jiangdong Zhao, Chunyang Xia, Wei Peng, Ji Huang, Ling Li

    Published 2025-06-01
    “…When applied to UAV path planning in large- and medium-scale environments with realistic obstacle constraints, the EALA generates Pareto-optimal paths that minimize length, curvature, and computation time while guaranteeing collision avoidance. Benchmark tests and realistic simulations show that the EALA outperforms 10 algorithms. …”
    Get full text
    Article
  18. 678
  19. 679

    Lightweight remote sensing ship detection algorithm based on YOLOv5s by Haochen WANG, Yuelan XIN, Jiang GUO, Qingqing WANG

    Published 2024-10-01
    “…ObjectiveThis paper proposes a lightweight remote sensing ship target detection algorithm LR-YOLO based on improved YOLOv5s to meet the lightweight and fast inference requirements of ship target detection tasks involving remote sensing images. …”
    Get full text
    Article
  20. 680

    Study on lightweight strategies for L-YOLO algorithm in road object detection by Ji Hong, Kuntao Ye, Shubin Qiu

    Published 2025-03-01
    “…However, traditional algorithms often suffer from large parameter sizes and high computational costs, limiting their applicability in resource-constrained environments. …”
    Get full text
    Article