Showing 7,641 - 7,660 results of 13,928 for search '(( whole algorithm ) OR ( while algorithm ))', query time: 0.15s Refine Results
  1. 7641
  2. 7642

    Incentive Mechanism for Cloud Service Offloading in Edge–Cloud Computing Environment by Chendie Yao, Junjie Xie, Zhong Liu

    Published 2025-05-01
    “…On this basis, we propose an efficient polynomial-time algorithm to find the SE. Moreover, we discuss the adaptation of our incentive mechanism to dynamic node joining or departing. …”
    Get full text
    Article
  3. 7643

    Radio frequency fingerprint identification method based on syntactic recognition by CHEN Yanjun, HU Aiqun

    Published 2025-04-01
    “…This method can reduce data dimensionality while maintaining high discriminability, offering a novel approach for RFF identification.…”
    Get full text
    Article
  4. 7644

    Robust time series analysis for forecasting photovoltaic energy yield by Sapundzhi Fatima, Chikalov Aleksandar, Georgiev Slavi, Georgiev Ivan, Todorov Venelin

    Published 2025-01-01
    “…This study introduces an approach to forecasting the power output of a photovoltaic (PV) system by employing an ARIMA-based algorithm. Two distinct ARIMA models were designed – one generated via SPSS and one selected by the researchers. …”
    Get full text
    Article
  5. 7645

    A Blockchain-Based Edge Computing Group Signature Authentication Model for Underwater Clustered Networks by Yanxia Chen, Zhe Li, Rongxin Zhu

    Published 2024-12-01
    “…Autonomous Underwater Vehicles (AUVs) are deployed as blockchain nodes to aid cluster heads in identity verification, while all underwater acoustic nodes are integrated as lightweight blockchain nodes, thus ensuring uniform management and authentication. …”
    Get full text
    Article
  6. 7646

    Optimizing Automated Negotiation: Integrating Opponent Modeling with Reinforcement Learning for Strategy Enhancement by Ya Zhang, Jinghua Wu, Ruiyang Cao

    Published 2025-02-01
    “…However, most existing research primarily focuses on modeling the formal negotiation phase, while neglecting the critical role of opponent analysis during the pre-negotiation stage. …”
    Get full text
    Article
  7. 7647

    YOLOv8-SAMURAI: A Hybrid Tracking Framework for Ladder Worker Safety Monitoring in Occlusion Scenarios by Sangyoon Yun, Hyunsoo Kim

    Published 2025-05-01
    “…The results indicate that, while YOLOv8 performs well in non-occluded conditions, the tracking accuracy declines significantly under severe occlusions. …”
    Get full text
    Article
  8. 7648

    Improving the area-preserving parameterization of rational Bézier surfaces by rational bilinear transformation by Xiaowei Li, Yingjie Wu, Yaohui Sun, Xin Chen, Yanru Chen, Yi-jun Yang

    Published 2025-08-01
    “…To improve the area-preserving parameterization quality of rational Bézier surfaces, an optimization algorithm using bilinear reparameterization is proposed. …”
    Get full text
    Article
  9. 7649

    Single-phase Flyback Photovoltaic Micro-inverter Grid-connected Control Strategy with a Lag-time Compensation Technique by MA Chen cheng, YU Feng, WU Xiao xin, MAO Jing feng

    Published 2023-12-01
    “… In terms of the single-phase flyback photovoltaic micro-inverters, the traditional discontinuous current mode algorithm takes the disadvantages of large phase delay between the grid-connected current and voltage, and high harmonics of grid-connected current. …”
    Get full text
    Article
  10. 7650

    Short-Term Power Prediction for Wind Farm and Solar Plant Clusters Based on Machine Learning Method by Yang CUI, Zhenghong CHEN, Peihua XU

    Published 2020-03-01
    “…The result shows that the proposed method is higher than or close to the traditional single-station power accumulation method in short-term prediction accuracy, but it can significantly improve the modeling efficiency while ensuring the prediction accuracy.…”
    Get full text
    Article
  11. 7651

    SECURE VERTEX-EDGE DOMINATION IN HYPERCUBE AND GRID GRAPHS: APPLICATIONS OF CYBERSECURITY IN BANKING FOR SECURE TRANSACTIONS by C. Ruby Sharmila, S. Meenakshi

    Published 2025-06-01
    “…However, the majority of research places a strong emphasis on vertex dominance in security networks while ignoring the importance of edge defense for overall security, also hypercube and grid structures are not considered. …”
    Get full text
    Article
  12. 7652

    Optimized Controller Design Using Hybrid Real-Time Model Identification with LSTM-Based Adaptive Control by Yeon-Jeong Park, Joon-Ho Cho

    Published 2025-02-01
    “…This method compensates for the delay time of the SOPTD model while minimizing the Integral Time Absolute Error performance index. …”
    Get full text
    Article
  13. 7653

    CSL-SFNet for Cooperative Spectrum Sensing in Cognitive Satellite Network with GEO and LEO Satellites by Kai Yang, Shengbo Hu, Xin Zhang, Tingting Yan, Manqin Zhu

    Published 2024-01-01
    “…The simulation results demonstrate that the proposed algorithm can achieve a detection probability of 90% when the signal-to-noise ratio is −20 dB; it has a shorter running time and always outperforms the other CSS algorithms.…”
    Get full text
    Article
  14. 7654

    Analisis Tantangan Moderasi Beragama di Era Digital melalui Perspektif Teori Filter Bubble dan Echo Chamber by Alfi Rohmatul Hidayah, Moh. Asaddin Nur

    Published 2024-12-01
    “…Filter bubbles expose users only to content aligning with their views, while echo chambers amplify these views without engaging alternative perspectives. …”
    Get full text
    Article
  15. 7655

    DIP-UP: Deep Image Prior for Unwrapping Phase by Xuanyu Zhu, Yang Gao, Zhuang Xiong, Wei Jiang, Feng Liu, Hongfu Sun

    Published 2025-07-01
    “…We compared the DIP-refined models to their original versions, as well as to the conventional PRELUDE algorithm from FSL, using both simulated and in vivo brain data. …”
    Get full text
    Article
  16. 7656

    Enhancing Latent Defect Detection in Built-In Spindle Assembly Lines Through Vibration Data Analysis by Kuo-Hao Li, Chao-Nan Wang, Yao-Chi Tang

    Published 2025-01-01
    “…The integration of these advanced algorithms accurately identified defects and categorized them, thus optimizing manufacturing processes. …”
    Get full text
    Article
  17. 7657

    Educational frontiers with ChatGPT: a social network analysis of influential tweets by Mehmet Firat, Saniye Kuleli

    Published 2024-08-01
    “…Using the ForceAtlas2 algorithm and thematic content analysis, the study explores the appeal of ChatGPT and its prospects as an educational tool. …”
    Get full text
    Article
  18. 7658

    Research on license plate recognition based on graphically supervised signal-assisted training by Dianwei Chi, Zehao Jia, Lizhen Liu

    Published 2025-07-01
    “…Methods This study proposes an improved license plate recognition algorithm. We use the License Plate Recognition Network (LPRNet) as the base model. …”
    Get full text
    Article
  19. 7659

    Public Health surveillance from emergency call center data: visualization dashboard and NLP of call reports by Alexandre Naprous, Marta Avalos-Fernandez, Catherine Pradeau, Emmanuel Lagarde, Cedric Gil-Jardine

    Published 2022-05-01
    “…We also extracted indicators that could serve as proxy measures using a keyword-search algorithm. We then developed a dashboard visualization tool to enable dynamic and spatial exploratory analyses. …”
    Get full text
    Article
  20. 7660

    Joint Service Caching and Computing Offloading Strategies for Electrical Equipment Intelligent IoT Platform by Yi SUN, Shaonan CHANG, Kai CHEN, Qiang CUI, Weijie SHEN

    Published 2022-04-01
    “…Current works mainly focus on the application of edge computing in Industrial Internet of Things(IIoT), while the impact of service caching strategy on edge computing is not paid enough attention. …”
    Get full text
    Article