Showing 7,001 - 7,020 results of 13,928 for search '(( whole algorithm ) OR ( while algorithm ))', query time: 0.23s Refine Results
  1. 7001

    Improving data sharing and knowledge transfer via the Neuroelectrophysiology Analysis Ontology (NEAO) by Cristiano A. Köhler, Sonja Grün, Michael Denker

    Published 2025-05-01
    “…On the other hand, different software codes can implement the same analysis algorithm, while adopting different names to identify functions and parameters. …”
    Get full text
    Article
  2. 7002

    Dynamic emotion intensity estimation from physiological signals facilitating interpretation via appraisal theory. by Isabel Barradas, Reinhard Tschiesner, Angelika Peer

    Published 2025-01-01
    “…In our experiment, emotions of varying intensities are induced for three distinct qualities while physiological signals are measured, and participants assess their subjective feeling in real time. …”
    Get full text
    Article
  3. 7003

    Convergence Analysis for Differentially Private Federated Averaging in Heterogeneous Settings by Yiwei Li, Shuai Wang, Qilong Wu

    Published 2025-02-01
    “…Federated learning (FL) has emerged as a prominent approach for distributed machine learning, enabling collaborative model training while preserving data privacy. However, the presence of non-i.i.d. data and the need for robust privacy protection introduce significant challenges in theoretically analyzing the performance of FL algorithms. …”
    Get full text
    Article
  4. 7004

    Bidding strategies for virtual power plants under the electricity-carbon joint market taking into account wind and solar uncertainties by Shuangchi ZHAO, Hong LIN, Haiyun WANG

    Published 2025-05-01
    “…The upper level maximizes the VPP's profit, while the lower level maximizes social welfare in the joint market. …”
    Get full text
    Article
  5. 7005

    Sensor placement optimization for critical-grid coverage problem of indoor positioning by Hui Wu, Zhe Liu, Jin Hu, Weifeng Yin

    Published 2020-12-01
    “…As a conclusion, the proposed method could reduce the cost of sensor deployment while ensuring the accuracy of indoor positioning for critical areas. …”
    Get full text
    Article
  6. 7006

    Anomaly Detection Approach Based on Deep Neural Network and Dropout by Zaid Hussien et al.

    Published 2020-06-01
    “…However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. …”
    Get full text
    Article
  7. 7007

    Distributed Event-Triggered-Based Adaptive Formation Tracking Control for Multi-UAV Systems Under Fixed and Switched Topologies by Chengqing Liang, Lei Liu, Lei Li, Dongmei Yan

    Published 2025-03-01
    “…Finally, the validity of the designed algorithm is confirmed by numerical examples and software-in-the-loop (SIL) simulation experiments.…”
    Get full text
    Article
  8. 7008

    Lightweight anomaly detection model for UAV networks based on memory-enhanced autoencoders by HU Tianzhu, SHEN Yulong, REN Baoquan, HE Ji, LIU Chengliang, LI Hongjun

    Published 2024-04-01
    “…Experiments on public data sets and NS-3 simulation data sets show that while ensuring lightweight, the proposed model reduces the false negative rate by an average of 35.9% and 48% compared with the baseline method.…”
    Get full text
    Article
  9. 7009

    Hybrid modeling for optimizing electrospun polyurethane nanofibrous membranes in air filtration applications by Majid Sohrabi, Milad Razbin

    Published 2025-07-01
    “…However, optimizing their structural characteristics to maximize filtration efficiency while minimizing pressure drop remains challenging due to the complexity of the electrospinning process. …”
    Get full text
    Article
  10. 7010

    Accurate Solar Radiation Forecasting Through Feature-Enhanced Decision Trees and Wavelet Decomposition by Gaizen Soufiane, Abbou Ahmed, Fadi Ouafia

    Published 2025-01-01
    “…This study explores the efficacy of the decision tree algorithm in predicting solar power generation, addressing the inherent variability in photovoltaic (PV) energy production due to weather conditions. …”
    Get full text
    Article
  11. 7011

    Comparing the Effect of Age, Gender, and Desired Speed on Car-Following Behavior by Using Driving Simulator by Ehsan Ramezani-Khansari, Masoud Tabibi, Fereidoon Moghadas Nejad, Mahmoud Mesbah

    Published 2021-01-01
    “…The CF model for each driver was calibrated by genetic algorithm. Gender and DS were effective in CF behavior, while the age factor was not. …”
    Get full text
    Article
  12. 7012

    Automatic speech analysis combined with machine learning reliably predicts the motor state in people with Parkinson’s disease by Tabea Thies, Elisa Mallick, Johannes Tröger, Ebru Baykara, Doris Mücke, Michael T. Barbe

    Published 2025-05-01
    “…Acoustic speech features were automatically extracted with the algorithm given by the Dysarthria Analyzer. Results suggest that acute levodopa intake improves phonatory-respiratory speech functions and speech planning abilities, while the articulatory system remains unaffected. …”
    Get full text
    Article
  13. 7013

    New method for file deduplication in cloud storage by Chao YANG, Qian JI, Si-chun XIONG, Mao-zhen LIU, Jian-feng MA, Qi JIANG, Lin BAI

    Published 2017-03-01
    “…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
    Get full text
    Article
  14. 7014

    Authentication of an Indonesian ID Card with Simultaneous NFC and Face Recognition by Chairullah Chairullah, Yuwaldi Away, Maulisa Oktiana

    Published 2025-06-01
    “…The application, developed using Flutter, incorporates facial recognition for biometric verification, while NFC is employed as an additional authentication layer to provide dual-factor verification and reinforce identity security. …”
    Get full text
    Article
  15. 7015

    Effectiveness of the Spatial Domain Techniques in Digital Image Steganography by Rosshini Selvamani, Yusliza Yusoff

    Published 2024-03-01
    “…The purpose of this research is to determine the best and most effective algorithm among the three competitive spatial domain algorithms, which are Least Significant Bit (LSB), Optimum Pixel Adjustment Procedure (OPAP), and Pixel Value Differencing (PVD) which in regard demonstrated the efficacy of spatial domain algorithms. …”
    Get full text
    Article
  16. 7016

    Development of View Optimization Techniques for Structural Monitoring Systems Using Post-Processing of Structural Analysis and Image Processing by Yonghui Park

    Published 2025-01-01
    “…The proposed framework for view optimization utilized the results from structural analysis performed in ABAQUS to extract initial camera positions and direction vectors, which served as inputs for an optimization algorithm. The optimization process applied image processing methods to detect deformation areas, while performance was evaluated at each iteration and saved when improvements were found. …”
    Get full text
    Article
  17. 7017

    Retrospective Illumination Correction of Retinal Images by Libor Kubecka, Jiri Jan, Radim Kolar

    Published 2010-01-01
    “…Among the tested optimizers, the gradient-based optimizer with varying step has shown to have the fastest convergence while providing the best precision. The final algorithm proved to be able of suppressing approximately 70% of the artificially introduced non-homogenous illumination. …”
    Get full text
    Article
  18. 7018

    Intelligent CO2 Monitoring for Diagnosis of Sleep Apnea Using Neural Cryptography Techniques by Manar Ahmed Hamza, Maha M. Althobaiti, Ola Abdelgney Omer Ali, Souad Larabi-Marie-Sainte, Majdy M. Eltahir, Anwer Mustafa Hilal, Mesfer Al Duhayyim, Ishfaq Yaseen

    Published 2022-01-01
    “…The accuracy of the GEP-KNN algorithm with different K values produced the highest accuracy at K=9 and k=10 of 95.12% and 95.67%; the lowest accuracy is K=1 of 65.34%.…”
    Get full text
    Article
  19. 7019

    Adaptive switching and routing protocol design and optimization in internet of things based on probabilistic models by Yi Yang

    Published 2024-01-01
    “…The paper explores the subject of data flow optimization using Fuzzy Assisted Cuckoo Search Optimization (FACSO), traffic flow using Gaussian Process Regression (GPR), and CH prediction using the Stochastic Optimization Algorithm (SOA). Optimizing network lifetime while minimizing Energy Consumption (EC) is feasible through the practical application of the SOA, GPR, and FACSO models. …”
    Get full text
    Article
  20. 7020

    Journalism’s transformation through digitalization in Turkey: Applying search engine optimization to journalism by Tuğçe Ayçin

    Published 2022-12-01
    “…These discussions focus on how producing news by focusing on algorithms contradicts the professional principles of journalism. …”
    Get full text
    Article