Showing 2,521 - 2,540 results of 13,928 for search '(whole OR while) algorithm', query time: 0.19s Refine Results
  1. 2521

    A Vehicle Path Planning Algorithm Based on Mixed Policy Gradient Actor-Critic Model with Random Escape Term and Filter Optimization by Wei Nai, Zan Yang, Daxuan Lin, Dan Li, Yidan Xing

    Published 2022-01-01
    “…Deep reinforcement learning (DRL), as a state-of-the-art solution method in vehicle path planning, can better balance the ability and complexity of the algorithm to reflect the real situation. However, DRL has its own disadvantages of higher search cost and earlier convergence to the local optimum, as vehicle path planning issues are usually in a complex environment, and their action set can be diverse. …”
    Get full text
    Article
  2. 2522

    KF-NIPT: K-mer and fetal fraction-based estimation of chromosomal anomaly from NIPT data by Dongin Kim, Ji Yeon Sohn, Jin Hee Cho, Ji-Hye Choi, Gwi-young Oh, Hyun Goo Woo

    Published 2025-05-01
    “…Results We developed a KF-NIPT, a new algorithm that estimate chromosomal anomaly by calculating K-mer-based sequence depth and fetal fraction from the whole genome sequencing (WGS) data. …”
    Get full text
    Article
  3. 2523
  4. 2524

    On the Convergence of Maximum Likelihood Expectation–maximization Algorithm for Iterative Tomographic Reconstruction and the Role of Spatial Frequency, Location, Pixel Intensity, C... by Mohsen Qutbi

    Published 2025-04-01
    “…Background: It is desirable to iterate the maximum likelihood expectation–maximization (MLEM) algorithm to the point of convergence to obtain the optimal result. …”
    Get full text
    Article
  5. 2525

    Comparative Evaluation of Reinforcement Learning Algorithms for Multi-Agent Unmanned Aerial Vehicle Path Planning in 2D and 3D Environments by Mirza Aqib Ali, Adnan Maqsood, Usama Athar, Hasan Raza Khanzada

    Published 2025-06-01
    “…Furthermore, our findings reveal how algorithms perform while transitioning from a simplistic 2D setup to a realistic 3D physics-based environment, which is essential for performing sim-to-real transfer. …”
    Get full text
    Article
  6. 2526

    Determination of future gully erosion risk and its spatially quantitative interpretability of driving factors in regional scale using machine learning algorithms by Xin Liu, Dichen Wang, Mingming Guo, Xingyi Zhang, Zhuoxin Chen, Zhaokai Wan, Jielin Liu

    Published 2025-07-01
    “…The GERM was realized by four machine learning algorithms including Random Forest (RF), XGBoost, K-Nearest Neighbor (KNN), and Multi-layer perceptron of artificial neural networks (ANN-MLP). …”
    Get full text
    Article
  7. 2527
  8. 2528
  9. 2529

    Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution by Nawal Shaltout, Ahmed A.Abd El-Latif, Waleed M. Al-Adrousy, Samir Elmougy

    Published 2023-01-01
    “…Hence, it is essential to investigate and develop new cryptographic algorithms to ensure the protection and privacy of multimedia data at rest and during transmission through the communication channel while attempting to overcome the limitations of traditional cryptographic methods. …”
    Get full text
    Article
  10. 2530

    Feasibility of knee magnetic resonance imaging protocol using artificial intelligence-assisted iterative algorithm protocols: comparison with standard MRI protocols by Hailong Liu, Yanxia Chen, Meng Zhang, Han Bu, Fenghuan Lin, Jun Chen, Mengqiang Xiao, Jie Chen

    Published 2024-10-01
    “…SD images were processed using standard reconstruction techniques, while accelerated images utilized AIIA reconstruction. …”
    Get full text
    Article
  11. 2531

    Multidimensional routing with the increased navigation accuracy with the maintenance of flight notifications of the flight vehicles by V. I. Goncharenko, G. N. Lebedev, V. B. Malygin

    Published 2021-08-01
    “…While planning the routes it is also necessary to consider the interests of different interested groups, which are often opposite to one another. …”
    Get full text
    Article
  12. 2532

    Implementation of the Advanced Encryption Standard (AES) Algorithm and Bit Plane Complexity Segmentation (BPCS) Steganography Technique for Enhancing Text File Security by Afthar Kautsar, Muhammad Ikhsan

    Published 2025-03-01
    “…The data embedded in the image can be extracted with a success rate of 100%, while the image quality remains intact without noticeable changes. …”
    Get full text
    Article
  13. 2533

    Advanced control and optimization techniques for DFIG wind energy systems: A case study using pelican algorithm and CTID-PID controller by P. V. S. S. A. Parimala, Narendra Babu P

    Published 2025-06-01
    “…The RSC is controlled using the pelican optimization technique, a nature-inspired algorithm that effectively tunes control parameters to achieve optimal dynamic response and minimize power losses, enabling maximum wind power capture while maintaining stability. …”
    Get full text
    Article
  14. 2534

    Multi-Parameter Optimization Using Metaheuristic Algorithms to Improve Uncrewed Aerial Vehicles’ Wireless Communications: A Performance Analysis by Lalan J. Mishra, Naima Kaabouch

    Published 2025-01-01
    “…On average, in Approach 1, the whale optimization algorithm had the shortest convergence time, while ant colony optimization was the slowest. …”
    Get full text
    Article
  15. 2535

    UAVRM-A*: A Complex Network and 3D Radio Map-Based Algorithm for Optimizing Cellular-Connected UAV Path Planning by Yanming Chai, Yapeng Wang, Xu Yang, Sio-Kei Im, Qibin He

    Published 2025-06-01
    “…These approaches offer performance that approaches that of DRL, while addressing key challenges like long training times and poor generalization. …”
    Get full text
    Article
  16. 2536

    The Decomposition of a Train into its Cars by A. N. Malkov, G. P. Shtern, I. A. Mikhaylov

    Published 2011-06-01
    “…The input data is a film that visualizes the train motion. An algorithm for solving the problem is proposed. An experiment is conducted using 16 different films to test the algorithm.…”
    Get full text
    Article
  17. 2537

    Adaptive Medium Access Control Protocol for Dynamic Medical Traffic With Quality of Service Provisioning in Wireless Body Area Network by Wan Haszerila Wan Hassan, Sohail Sarang, Darmawaty Mohd Ali, Goran M. Stojanovic, Wan Norsyafizan W. Muhamad, Norsuzila Ya'acob

    Published 2024-01-01
    “…Additionally, an M/M/1 queuing algorithm with a non-preemptive priority is modeled using SimEvents in MATLAB to validate the packet delay of the priority queues. …”
    Get full text
    Article
  18. 2538

    Comparison and Analysis of Different Connection Methods in Structure Dynamic Analysis of Assemblies by Wang Gaoyi, Wu Xinyue, Mao Yanlei

    Published 2016-01-01
    “…In the dynamic analysis of the assembly structure,there are three methods to simplify the connection between different components: node coupling,rigid / flexible connections and MPC algorithm. Through comparing the accuracy of the three methods in solid model connections and comes to the conclusion that the simplify accuracy of node coupling and MPC algorithm is higher than the rigid / flexible connection,while MPC algorithm is more convenient and practical. …”
    Get full text
    Article
  19. 2539

    Treatment of the Cirrhotic Patients Considering Portal Hypertension Severity Degree and Comorbid Syntropic Extrahepatic Lesions, their Complications: Modified Algorithm, its Effect... by Ferko M.

    Published 2016-12-01
    “…According to the results of our study, we can say that the improved algorithm for the treatment of patients with liver cirrhosis and a common methodology gives a positive result, but in terms of qualitative and quantitative indices, generally accepted medical complex is significantly inferior to modified by us algorithm. …”
    Get full text
    Article
  20. 2540

    Ghostly Encounters on Google by Samuel Collins

    Published 2022-03-01
    “…In so doing, spirit photography anticipates the challenges digitization, manipulation and algorithmically generated images raise to the indexical truth-value of the image. …”
    Get full text
    Article