Showing 8,081 - 8,100 results of 13,928 for search '(( whole algorithm ) OR ( while algorithm ))', query time: 0.21s Refine Results
  1. 8081

    Optimisation of Electric Vehicle Charging Stations Planning Based on Macro and Micro Perspectives by Qiuxuan WANG, Kunxiang DENG, Jiangnan YAN, Jun LI

    Published 2025-07-01
    “…CMSLM is solved using sparrow search algorithm from both macro and micro perspectives. The proposed approach is applied to Guangzhou, China, as a case study. …”
    Get full text
    Article
  2. 8082

    Optimizing Key Parameters of Ground Delay Program with Uncertain Airport Capacity by Jixin Liu, Kaijian Li, Minjia Yin, Xuehua Zhu, Ke Han

    Published 2017-01-01
    “…The proposed GDP strategy has the potential to effectively reduce the overall delay while maintaining the ATC safety risk within an acceptable level.…”
    Get full text
    Article
  3. 8083

    Bayesian Computation Methods for Inference in Stochastic Kinetic Models by Eugenia Koblents, Inés P. Mariño, Joaquín Míguez

    Published 2019-01-01
    “…Specifically, the particle MCMC (pMCMC) method has been shown to be effective, while computationally demanding method applicable to this problem. …”
    Get full text
    Article
  4. 8084

    Game-based resource allocation in heterogeneous downlink CR-NOMA network without subchannel sharing by Deepa Das, Rajendra Kumar Khadanga, Deepak Kumar Rout, Md. Minarul Islam, Taha Selim Ustun

    Published 2025-01-01
    “…To achieve this, we set out to solve a complex problem involving maximizing throughput while staying within transmission power limits, meeting minimum data rate requirements, and controlling interference power. …”
    Get full text
    Article
  5. 8085

    Seismic Optimization of Fluid Viscous Dampers in Cable-Stayed Bridges: A Case Study Using Surrogate Models and NSGA-II by Qunfeng Liu, Zhen Liu, Jun Zhao, Yuhang Lei, Shimin Zhu, Xing Wu

    Published 2025-04-01
    “…Results demonstrate that the ANN-based approach effectively addresses multi-objective optimization challenges while providing a robust framework for improved seismic performance in cable-stayed bridges. …”
    Get full text
    Article
  6. 8086

    A Comparative Study of Image Processing Techniques for Javanese Ancient Manuscripts Enhancement by Imam Yuadi, Novanto Yudistira, Habiddin Habiddin, Khoirun Nisa'

    Published 2025-01-01
    “…This study evaluates how each filter enhances visual clarity while maintaining structural integrity using evaluation metrics such as the Structural Similarity Index Measure (SSIM) and Normalized Cross-Correlation (NCC). …”
    Get full text
    Article
  7. 8087

    Deep learning method for cucumber disease detection in complex environments for new agricultural productivity by Jun Liu, Xuewei Wang, Qian Chen, Peng Yan, Xin Liu

    Published 2025-07-01
    “…Experiments on our cucumber disease dataset demonstrate that YOLO-Cucumber achieves a 6.5% improvement in mAP@50 (93.8%), while reducing model size by 3.87 MB and increasing inference speed to 218 FPS. …”
    Get full text
    Article
  8. 8088

    Discrete‐time full‐order sensorless control of high‐speed interior permanent magnet synchronous motor in electric vehicle traction system by Dongcui Wang, Yuan Zhu, Sibei Wu, Lu Liu

    Published 2024-11-01
    “…Abstract A discrete‐time full‐order sensorless control strategy for high‐speed interior permanent magnet synchronous motor (IPMSM) used in electric vehicle (EV) traction system is designed in this paper. While most speed and position observer (SPO) methods are developed in the continuous‐time domain, the presence of a unit‐time‐delay block existed in feedback loop and discretisation of the algorithm can lead to performance degradation during digital implementation. …”
    Get full text
    Article
  9. 8089

    FedQP: Large-Scale Private and Flexible Federated Query Processing by Hussain M. J. Almohri, Layne T. Watson

    Published 2025-01-01
    “…The key challenge is in designing algorithms that efficiently aggregate client input, minimize data exposure, and maximize model adaptability. …”
    Get full text
    Article
  10. 8090

    Deep Reinforcement Learning-Based Anti-Jamming Approach for Fast Frequency Hopping Systems by Sixi Cheng, Xiang Ling, Lidong Zhu

    Published 2025-01-01
    “…Building on this, we propose an improved multi-action deep recurrent Q-network (MA-DRQN) algorithm to determine the AFS for hopping sequence generation. …”
    Get full text
    Article
  11. 8091

    Evolutionary Game-Based Secrecy Rate Adaptation in Wireless Sensor Networks by Guanxiong Jiang, Shigen Shen, Keli Hu, Longjun Huang, Hongjie Li, Risheng Han

    Published 2015-03-01
    “…Physical layer security, whose aim is to maximize the secrecy rate of a source while keeping eavesdroppers ignorant of data transmitted, is extremely suitable for Wireless Sensor Networks (WSNs). …”
    Get full text
    Article
  12. 8092

    Robust Low-Overlap Point Cloud Registration via Displacement-Corrected Geometric Consistency for Enhanced 3D Sensing by Xin Wang, Qingguang Li

    Published 2025-07-01
    “…Experimental results demonstrate that our method outperformed existing approaches in the aspects of registration recall, rotation error, and algorithm robustness under low-overlap conditions. …”
    Get full text
    Article
  13. 8093

    Dummy eye measurements of microsaccades: Testing the influence of system noise and head movements on microsaccade detection in a popular video-based eye tracker by Frouke Hermens

    Published 2015-02-01
    “…Whereas early studies of microsaccades have predominantly relied on custom-built eye trackers and manual tagging of microsaccades, more recent work tends to use video-based eye tracking and automated algorithms for microsaccade detection. While data from these newer studies suggest that microsaccades can be reliably detected with video-based systems, this has not been systematically evaluated. …”
    Get full text
    Article
  14. 8094

    Research on Improved YOLOv7 for Traffic Obstacle Detection by Yifan Yang, Song Cui, Xuan Xiang, Yuxing Bai, Liguo Zang, Hongshan Ding

    Published 2024-12-01
    “…Object detection and recognition algorithms are widely used in applications such as real-time monitoring and autonomous driving. …”
    Get full text
    Article
  15. 8095

    An Audio Steganography to Protect data in Text, Images and Audio with Hybrid Encryption Techniques by Thuraka Srinivasa Padmaja, Srinivasa Padmaja thuraka

    Published 2025-07-01
    “…The inquiry looks into White Space and Least Significant Bit (LSB) approaches for text steganography, while Quantization Index Modulation (QIM) is combined with LSB for image steganography. …”
    Get full text
    Article
  16. 8096

    Permeability Predictions for Tight Sandstone Reservoir Using Explainable Machine Learning and Particle Swarm Optimization by Jing-Jing Liu, Jian-Chao Liu

    Published 2022-01-01
    “…The particle swarm optimization algorithm is then used to optimize the hyperparameters of the XGBoost model. …”
    Get full text
    Article
  17. 8097

    A POMDP Approach to Map Victims in Disaster Scenarios by Pedro Gabriel Villani, Paulo Sergio Cugnasca

    Published 2024-11-01
    “…Using a partially observable Markov decision process, it simulates victim detection through an image classification algorithm, enabling efficient and independent operation. …”
    Get full text
    Article
  18. 8098

    AI-enhanced fire detection and suppression system for autonomous ships by Hyuk Lee, Jung Hoon Chung, Hyun Chung, Jong-Hwan Kim, Yongho Yoo, Gil Hyuk Lim, Won-Sun Ruy

    Published 2024-01-01
    “…In this paper, we introduce an innovative AFDSS that integrates RGB, infrared (IR), and ultraviolet (UV) sensors to reduce false alarms and employ a reinforcement learning algorithm to optimize water spray under sea conditions. …”
    Get full text
    Article
  19. 8099

    Healthcare professionals and the public sentiment analysis of ChatGPT in clinical practice by Lizhen Lu, Yueli Zhu, Jiekai Yang, Yuting Yang, Junwei Ye, Shanshan Ai, Qi Zhou

    Published 2025-01-01
    “…This study was divided into five steps: data collection, data cleaning, validation of relevance, sentiment analysis, and content analysis using the K-means algorithm. This study comprised 3130 comments amounting to 1,593,650 words. …”
    Get full text
    Article
  20. 8100

    Clusters from chronic conditions in the Danish adult population. by Anders Stockmarr, Anne Frølich

    Published 2024-01-01
    “…Yet the structure of chronic conditions in individuals with multimorbidity, viewed as a population, is largely unmapped. We use algorithmic diagnoses and the K-means algorithm to cluster the entire 2015 Danish multimorbidity population into 5 clusters. …”
    Get full text
    Article