Showing 7,061 - 7,080 results of 13,928 for search '(( whole algorithm ) OR ( while algorithm ))', query time: 0.19s Refine Results
  1. 7061

    An Inter-Regional Lateral Transshipment Model to Massive Relief Supplies with Deprivation Costs by Shuanglin Li, Na Zhang, Jin Qin

    Published 2025-07-01
    “…Specifically, JADE is employed in the first stage to allocate the volume of massive relief supplies, aiming to minimize deprivation costs, while IALNS optimizes intermodal routing in the second stage to minimize the weighted sum of transportation time and cost. …”
    Get full text
    Article
  2. 7062

    Optimization Techniques on Quantum and Classical Systems: A Comprehensive Comparative Study by Shaik Hussain, Rajitha Morampudi, Priyamvada K., Bhargavi R. Naveena

    Published 2025-01-01
    “…This study compares Particle Swarm Optimization (PSO), Moth Flame Optimization (MFO), and Genetic Algorithm (GA) on three platforms : a local computer, a local computer with quantum integration, and an IBM quantum machine. …”
    Get full text
    Article
  3. 7063

    Source Quantization and Coding over Noisy Channel Analysis by Runfeng Wang, Dan Song, Jinkai Ren, Lin Wang, Zhiping Xu

    Published 2024-11-01
    “…., the channel decoding algorithm is employed to realize the lossy source coding. …”
    Get full text
    Article
  4. 7064

    Prediction of the spatial distribution of vine weevil under climate change using multiple variable selection methods by Ga-Young Kim, Wang-Hee Lee

    Published 2025-03-01
    “…This research developed multiple species distribution models (SDMs) using different variable selection methods, including correlation, biological considerations, and principal component analysis, and integrated them into an ensemble model to predict the pest’s distribution under climate change. The MaxEnt algorithm was used to develop the models, showing robust performance with raw bioclimatic variables (TSS 0.34–0.37, F1 score 0.60–0.67), while lower performance and different distribution patterns were observed with reconstructed variables (TSS 0.13, F1 score 0.48). …”
    Get full text
    Article
  5. 7065

    Enhancing security and usability with context aware multi-biometric fusion for continuous user authentication by Ayeswarya S., John Singh K.

    Published 2025-08-01
    “…Keystroke dynamics are processed using Wavelet Transform Filtering (WTF) to improve feature extraction, while gait data is refined with an Autocorrelation (AC) Filter to ensure the use of reliable gait segments. …”
    Get full text
    Article
  6. 7066

    Towards carbon emission modeling and optimization for time-sensitive IIoT by LI Yingyu, DAI Yipeng, GE Xiaohu, SHI Guangming, XIAO Yong, LIU Yan, YU Liang, XU Han

    Published 2025-03-01
    “…Based on this, considering low-latency constraints, a task offloading optimization algorithm based on the alternative direction method of multipliers (ADMM) was designed to minimize the overall carbon emissions of the considered IIoT system. …”
    Get full text
    Article
  7. 7067

    Doppler broadening of neutron elastic scattering cross section using SCLM(α,β) thermal scattering laws by Bengoechea Fernández Aitor, Noguere Gilles, Bernard David

    Published 2025-01-01
    “…Despite works performed on 238U, no algorithm reported in the literature provides a unified Crystal Lattice Model valid below and above the thermal cutoff energy. …”
    Get full text
    Article
  8. 7068

    The close-open mixed-fleet electric vehicle routing problem by Themistoklis Stamadianos, Nikolaos A. Kyriakakis, Magdalene Marinaki, Yannis Marinakis

    Published 2023-12-01
    “…To solve large instances, three discrete optimization swarm intelligence algorithms are employed, alongside a Variable Neighborhood Search algorithm. …”
    Get full text
    Article
  9. 7069

    Contribution of Daylighting to Saving Electrical Energy in Cameroon: Case Study of a Classroom in a Public School by Merimé Souffo Tagueu, Lionelle Adelaїde Madjou Tanekou, Benoît Ndzana

    Published 2025-01-01
    “…Applying the optimization algorithm designed for this purpose brings the average illuminance level down to 300lx following the EN12464 standard. …”
    Get full text
    Article
  10. 7070

    Research on image generation technology based on deep learning by Li Jinchen

    Published 2025-01-01
    “…Based on the above problems, this paper analyzes the methods of improving and optimizing the mainstream image generation algorithm from the perspectives of improving and optimizing the loss function, improving the space modeling, revising the structure of both the generator and discriminator, while speeding up the training process. …”
    Get full text
    Article
  11. 7071

    New method for file deduplication in cloud storage by Chao YANG, Qian JI, Si-chun XIONG, Mao-zhen LIU, Jian-feng MA, Qi JIANG, Lin BAI

    Published 2017-03-01
    “…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
    Get full text
    Article
  12. 7072

    Supervised Clustering of Persian Handwritten Images by Sajedeh Moradnia, Mousa Golalizadeh

    Published 2024-11-01
    “…Analyzing high-dimensional data, however, presents challenges, notably the curse of dimensionality. While various methods have been developed to address the dimensionality reduction, most overlooked the role of dependent variables. …”
    Get full text
    Article
  13. 7073

    Improved Hadamard Decomposition and Its Application in Data Compression in New-Type Power Systems by Zhi Ding, Tianyao Ji, Mengshi Li

    Published 2025-02-01
    “…The experimental results with simulated and field data demonstrate that the proposed scheme significantly reduces data volume while maintaining critical features in the restored data. …”
    Get full text
    Article
  14. 7074

    Krylov complexity in the Schrödinger field theory by Peng-Zhang He, Hai-Qing Zhang

    Published 2025-03-01
    “…Our study reveals that the Lanczos coefficients {b n } are almost independent of the chemical potential, while {a n } are dependent on the chemical potential. …”
    Get full text
    Article
  15. 7075

    BEHAVIORAL SEGMENTATION OF CUSTOMERS: RFM MODEL AND K-MEANS APPLICATION by Thanh L.T.P., Liaw S.-Y., Hien N.T.

    Published 2025-03-01
    “…Older customers spend the highest sums of money on lingerie products and the longest time since their last interaction with a company while young customers have the highest purchase frequency. …”
    Get full text
    Article
  16. 7076

    Characterize neuronal responses to natural movies in the mouse superior colliculus by Ya-tang Li

    Published 2025-03-01
    “…While artificial stimuli have been widely used in visual neuroscience and have significantly advanced our understanding of visual processing, they differ dramatically from the natural scenes that animals encounter in the wild. …”
    Get full text
    Article
  17. 7077

    A Dynamic Self-Adjusting System for Permanent Magnet Synchronous Motors Using an Improved Super-Twisting Sliding Mode Observer by Yanguo Huang, Yingmin Xie, Weilong Han

    Published 2025-06-01
    “…This method uses a neural network algorithm to balance chattering suppression with high control accuracy. …”
    Get full text
    Article
  18. 7078

    An optimal antibiotic selection framework for Sepsis patients using Artificial Intelligence by Philipp Wendland, Christof Schenkel-Häger, Ingobert Wenningmann, Maik Kschischo

    Published 2024-11-01
    “…OptAB performs an iterative optimal antibiotic selection for real-world Sepsis patients focussing on minimizing the Sepsis-related organ failure score (SOFA-Score) as treatment success while accounting for nephrotoxicity and hepatotoxicity as serious antibiotic side-effects. …”
    Get full text
    Article
  19. 7079

    Soft Actor-Critic Approach to Self-Adaptive Particle Swarm Optimisation by Daniel von Eschwege, Andries Engelbrecht

    Published 2024-11-01
    “…Self-adaptive particle swarm optimisation (SAPSO) algorithms aim to adaptively adjust CPs during the optimisation process to improve performance, ideally while reducing the number of performance-sensitive parameters. …”
    Get full text
    Article
  20. 7080

    Modular quantum signal processing in many variables by Zane M. Rossi, Jack L. Ceroni, Isaac L. Chuang

    Published 2025-06-01
    “…Despite significant advances in quantum algorithms, quantum programs in practice are often expressed at the circuit level, forgoing helpful structural abstractions common to their classical counterparts. …”
    Get full text
    Article