Showing 4,521 - 4,540 results of 13,928 for search '(whole OR while) algorithm', query time: 0.18s Refine Results
  1. 4521

    Abnormality detection and privacy protection strategies for power marketing inspection business of cyber–physical–social systems using big data and artificial intelligence by Li Kai, Mo Pingyan, Yang Yongjiao, Xie Hanyang, Shen Zhixiong

    Published 2025-07-01
    “…The proposed model incorporates a work order correlation matching algorithm, a fault interval detection algorithm, an electricity consumption prediction algorithm, and a business anomaly identification algorithm. …”
    Get full text
    Article
  2. 4522

    Calibration and Uncertainty Analysis of Freundlich and Langmuir Isotherms Using the Markov Chain Monte Carlo (MCMC) Approach by Haniyeh Sharifi Moghadam, Saeed Alimohammadi

    Published 2024-10-01
    “…The Metropolis algorithm’s runtime was 5.8 times that of the Gibbs algorithm. …”
    Get full text
    Article
  3. 4523

    Federated Reinforcement Learning-Based Dynamic Resource Allocation and Task Scheduling in Edge for IoT Applications by Saroj Mali, Feng Zeng, Deepak Adhikari, Inam Ullah, Mahmoud Ahmad Al-Khasawneh, Osama Alfarraj, Fahad Alblehai

    Published 2025-03-01
    “…Experimental outcomes show that the method we suggest is better than those used in best-fit, first-fit, and worst-fit basic algorithms. It maintains power stability usage among edge servers while surpassing old-fashioned heuristic techniques. …”
    Get full text
    Article
  4. 4524

    Self-Adjusting Look-Ahead Distance of Precision Path Tracking for High-Clearance Sprayers in Field Navigation by Xu Wang, Bo Zhang, Xintong Du, Huailin Chen, Tianwen Zhu, Chundu Wu

    Published 2025-06-01
    “…The tracking accuracy has been improved and the applicability of the algorithm for rapid deployment has been enhanced.…”
    Get full text
    Article
  5. 4525

    Multi-Humanoid Robot Arm Motion Imitation and Collaboration Based on Improved Retargeting by Xisheng Jiang, Baolei Wu, Simin Li, Yongtong Zhu, Guoxiang Liang, Ye Yuan, Qingdu Li, Jianwei Zhang

    Published 2025-03-01
    “…Traditional retargeting algorithms, while effective in mapping human motion to robots, typically either ensure similarity in arm configuration (joint space-based) or focus solely on tracking the end-effector position (Cartesian space-based). …”
    Get full text
    Article
  6. 4526

    Research on range matching for wire-speed hardware NIDS by CHEN Shu-hui, SUN Zhi-gang, SU Jin-shu

    Published 2006-01-01
    “…To solve the rule matching problem of hardware NIDS,a range matching algorithm LRC-RM was proposed,with more efficient memory utilization.The approach mapped the port range into a compressed bit vector and organized the bit vectors as an extended balanced binary tree.Experiments were employed to show that NIDS using this approach can perform wire-speed range matching for OC-192 links,while saving 99% memory resource comparing to the existing methods.The algorithm is easy to be implemented within a chip without additional RAM.…”
    Get full text
    Article
  7. 4527

    Hierarchical location-diversity-based low-delay anonymous communication framework by CHEN Xin1, HU Hua-ping1, LIU Bo1, XIAO Feng-tao1, HUANG Zun-guo1

    Published 2009-01-01
    “…First, a router selecting based algorithm on location diversity and RTT was proposed; then a hierarchical location-diversity-based low-delay anonymous communication framework was presented.The framework’s security was analyzed and an evaluation algorithm for security was presented. …”
    Get full text
    Article
  8. 4528

    Integrated Guidance and Control for Strap-Down Flight Vehicle: A Deep Reinforcement Learning Approach by Qinglong Zhang, Bin Zhao, Yifu Jiang, Jingyan Zhang, Jiale Zhang

    Published 2025-05-01
    “…Secondly, a channel-by-channel progressive training method based on the twin delayed deep deterministic policy gradient (TD3) algorithm is proposed. The agents of the pitch and yaw channels are trained using the TD3 algorithm independently, which substantially alleviates the complexity of the training process, while the roll channel is stabilized through the application of the back-stepping method. …”
    Get full text
    Article
  9. 4529

    Enhancing AES image encryption with a three-dimensional hyperchaotic system for increased security and efficiency. by Mingyi Huo, Yanpei Zheng, Jun Huang

    Published 2025-01-01
    “…The proposed algorithm markedly reduces the number of encryption rounds to one while enhancing both efficiency and security. …”
    Get full text
    Article
  10. 4530

    Integrated Navigation Method for Orchard-Dosing Robot Based on LiDAR/IMU/GNSS by Wang Wang, Jifeng Qin, Dezhao Huang, Furui Zhang, Zhijie Liu, Zheng Wang, Fuzeng Yang

    Published 2024-10-01
    “…Next, an improved A* algorithm was introduced to ensure the global operational path maintained a safe distance from obstacles, while the DWA algorithm handled dynamic obstacle avoidance. …”
    Get full text
    Article
  11. 4531

    Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain by Lin JIN, Youliang TIAN

    Published 2022-08-01
    “…Currently, there is no data exchanging and sharing between different hospitals, and it is easy to form data islands.At the same time, regional medical data contains a large amount of sensitive information of patients.The public acquisition, sharing and circulation of these data will lead to malicious tampering, theft, abuse and loss of ownership, thereby revealing patient privacy.In addition, the size of medical data is enormous and the data is unstructured, then it is more difficult to prevent and hold accountable some highly targeted malicious attacks, such as malicious attacks on medical data theft, tampering, and extortion.In view of the above problems, a blockchain-based on multi-authority attribute hidden electronic medical record sharing scheme was proposed to achieve fine-grained access to shared electronic medical records while ensuring patient privacy.The Multi-Authorization Attribute Encryption (MA-ABE) algorithm was introduced, which used multi-authority organizations to manage decentralized attributes.It also used hash functions to identify different users, in order to effectively resist collusion attacks between users with different authorizations.Besides, the linear secrets sharing scheme (LSSS) was used to realize partial hiding of attributes, and the attributes were divided into two parts:attribute name and attribute value.In addition, combined with the characteristics of blockchain openness, transparency and tamper-proof, the design of access policy can update the algorithm.Based on the access policy update algorithm, the policy block was added.The new access policy was uploaded to the blockchain to form a policy update traceability chain, which can realize distributed and reliable access control management under the condition of hidden policy.It can also support data privacy protection at the same time, and traceability of user behavior.The theoretical proof and experimental analysis have proved that this scheme protect attribute privacy effectively, while reduces computational overhead.…”
    Get full text
    Article
  12. 4532

    Optimized Airspace Structures and Sequencing Method for Urban Logistics Droneport by Yuan Zheng, Die Li, Zhou Shen, Chenglong Li, Zhaoxuan Zhang

    Published 2025-03-01
    “…Experimental results demonstrate that the proposed airspace design reduces take-off/landing time by 34.8% compared to conventional funnel-shaped configurations. The sequencing algorithm prioritizes high-value missions while reducing the average waiting time for low-battery drones by 47.3%, effectively alleviating endurance pressures. …”
    Get full text
    Article
  13. 4533

    Bandit-Based Multiple Access Approach for Multi-Link Operation in Heterogeneous Dynamic Networks by Mingqi Han, Zhenyu Chen, Xinghua Sun

    Published 2025-01-01
    “…The MP-CUCB algorithm enables each MLD to independently make access decisions to improve throughput while guaranteeing the fairness requirements of SLDs. …”
    Get full text
    Article
  14. 4534

    Ambiguity-aware semi-supervised learning for leaf disease classification by Tri-Cong Pham, Tien-Nam Nguyen, Van-Duy Nguyen

    Published 2025-04-01
    “…The results indicate that our semi-supervised method reduces the reliance for fully labeled datasets while preserving high accuracy by utilizing the ambiguity rejection algorithm. …”
    Get full text
    Article
  15. 4535

    A hybrid blockchain-based solution for secure sharing of electronic medical record data by Gang Han, Yan Ma, Zhongliang Zhang, Yuxin Wang

    Published 2025-01-01
    “…This structure enhances both security and transparency while fostering collaborative efforts across different stakeholders. …”
    Get full text
    Article
  16. 4536

    Generalized Singular Value Decomposition-Based Secure Beam Hybrid Precoding for Millimeter Wave Massive Multiple-Input Multiple-Output Systems by Boqing Chen, Lijun Yang, Meng Wu

    Published 2025-04-01
    “…In a hybrid precoding system, the low-complexity GSVD-Sparsity algorithm can achieve a spectral efficiency close to that of the GSVD-based scheme in a fully digital system while maintaining anti-eavesdropping capabilities.…”
    Get full text
    Article
  17. 4537

    Research on GNNs with stable learning by Wenbin Li, Wenxuan Wei, Peiyang Wang, Li Pan, Bo Yang, Yanling Xu

    Published 2025-08-01
    “…The aim is to extract genuine causal features while eliminating spurious causal features. By introducing a feature sample weighting decorrelation technique in the random Fourier transform space and combining it with a baseline GNN model, a Stable-GNN model and a constrained sampling weight gradient update algorithm are designed. …”
    Get full text
    Article
  18. 4538

    A Study on Multi-ship Avoidance System for Unmanned Surface Vehicles Using the Quaternion Ship Domain and Collision Risk Index by Dong-Hun Lee, Mu-Yeong Seo, Hyo-Geun Lee, Won-Jun Yoo, Sanghyun Kim, Kwang-Jun Paik

    Published 2025-02-01
    “…The algorithm was used to evaluate target ships (TS) using the CRI values, adapt the ship domain based on QSD, and use the velocity obstacle (VO) method to determine feasible avoidance paths while adhering to the International Regulations for Preventing Collisions at Sea (COLREGs). …”
    Get full text
    Article
  19. 4539

    Key Nodes Identification Method in Scale-Free Network Based on Structural Holes by Weiyan Liu

    Published 2025-01-01
    “…The proposed algorithm achieves higher accuracy in structural hole-aware ranking compared to benchmarks while maintaining <inline-formula> <tex-math notation="LaTeX">${ O}\left ({{ m+n.logn }}\right)$ </tex-math></inline-formula> complexity. …”
    Get full text
    Article
  20. 4540

    Combining theory and usability testing to inform optimization and implementation of an online primary care depression management tool by Nicola McCleary, Justin Presseau, Isabelle Perkins, Brittany Mutsaers, Claire E. Kendall, Janet Yamada, Katharine Gillis, Douglas Green

    Published 2025-01-01
    “…To evaluate usability, participants used a written patient scenario to work through the algorithm while verbalizing their thoughts (‘Think Aloud’). …”
    Get full text
    Article