Showing 4,621 - 4,640 results of 13,928 for search '(whole OR while) algorithm', query time: 0.14s Refine Results
  1. 4621

    Application Scheduling in Mobile Cloud Computing with Load Balancing by Xianglin Wei, Jianhua Fan, Ziyi Lu, Ke Ding

    Published 2013-01-01
    “…Then, after formulating the application scheduling problems in HLMCM and bringing forward the Hybrid Ant Colony algorithm based Application Scheduling (HACAS) algorithm, we finally validate the efficiency of the HACAS algorithm by simulation experiments.…”
    Get full text
    Article
  2. 4622

    Research on the cooperative offloading strategy of sensory data based on delay and energy constraints by Peiyan YUAN, Saike SHAO, Ran WEI, Junna ZHANG, Xiaoyan ZHAO

    Published 2023-03-01
    “…The edge offloading of the internet of things (IoT) sensing data was investigated.Multiple edge servers cooperatively offload all or part of the sensing data initially sent to the cloud center, which protects data privacy and improves user experience.In the process of cooperative offloading, the transmission of the sensing data and the information exchange among edge servers will consume system resources, resulting in the cost of cooperation.How to maximize the offloading ratio of the sensing data while maintaining a low collaboration cost is a challenging problem.A joint optimization problem of sensing data offload ratio and cooperative scale satisfying the constraints of network delay and system energy consumption was formulated.Subsequently, a distributed alternating direction method of multipliers (ADMM) via constraint projection and variable splitting was proposed to solve the problem.Finally, simulation experiments were carried out on MATLAB.Numerical results show that the proposed method improved the network delay and energy consumption compared to the fairness cooperation algorithm (FCA), the distributed optimization algorithm (DOA), and multi-subtasks-to-multi-servers offloading scheme (MTMS) algorithm.…”
    Get full text
    Article
  3. 4623

    Distributed Formation Control with Obstacle and Collision Avoidance for Hypersonic Gliding Vehicles Subject to Multiple Constraints by Zhen Zhang, Yifan Luo, Yaohong Qu

    Published 2023-01-01
    “…The actual control input solver adopts a feasible solution process to calculate the actual control signals while dealing with constraints. Finally, extensive numerical simulations are implemented to unveil the proposed algorithm’s performance and superiority.…”
    Get full text
    Article
  4. 4624

    Compensation for Matrix Effects in High-Dimensional Spectral Data Using Standard Addition by Elena Khanonkin, Israel Schechter, Itai Dattner

    Published 2025-01-01
    “…A performance evaluation shows the algorithm compensates effectively for matrix effects, outperforms previously published standard addition algorithms and direct applications of multivariate chemometric algorithms, and is robust to variations in SNR and matrix effect intensity.…”
    Get full text
    Article
  5. 4625

    CLDP-pFedAvg: Safeguarding Client Data Privacy in Personalized Federated Averaging by Wenquan Shen, Shuhui Wu, Yuanhong Tao

    Published 2024-11-01
    “…Furthermore, we provide a convergence analysis of the clipping-enabled differentially private meta-based FedAvg algorithm. The proposed strategy is evaluated across various datasets, and the findings indicate that our approach offers improved privacy protection while maintaining model accuracy.…”
    Get full text
    Article
  6. 4626

    MARKETING STRATEGY OF THE UNIVERSITY: FORMATION AND ITS EFFECTIVENESS EVALUATION REALIZATION by Natalia К. Shemetova

    Published 2015-03-01
    “…The study is aimed at developing an algorithm of formation of university’s marketing strategy and the development of evaluating methods of its effectiveness realization. …”
    Get full text
    Article
  7. 4627

    An efficient real-time signal processing method for satellite laser ranging. by Jinyu Wang, Wei Zhu, Weiming Gong

    Published 2024-01-01
    “…However, the recognition rate of the single-stage Graz filtering algorithm for high-orbit satellites is less than 1%, and traditional two-stage filtering algorithms, such as polynomial fitting and iterative filtering techniques, exhibit high false and missed detection rates. …”
    Get full text
    Article
  8. 4628

    Real-Time Fire Detection Method Based on Computer Vision for Electric Vehicle Charging Safety Monitoring by Yuchen Gao, Qing Yang, Shiyu Zhang, Dexin Gao

    Published 2023-01-01
    “…Therefore, a target detection model based on the improved YOLOv5 (You Only Look Once) algorithm is proposed for the features generated by lithium battery combustion, using the K-means algorithm to cluster and analyse the target locations within the dataset, while adjusting the residual structure and the number of convolutional kernels in the network and embedding a convolutional block attention module (CBAM) to improve the detection accuracy without affecting the detection speed. …”
    Get full text
    Article
  9. 4629

    Blood Scattering Model for Pulsed Doppler by Piotr KARWAT, Andrzej NOWICKI, Marcin LEWANDOWSKI

    Published 2014-09-01
    “…Generated data are used for optimization and validation of Doppler signals processing algorithms. The algorithm is based on the finite elements method FEM. …”
    Get full text
    Article
  10. 4630

    Study on adaptive modulation in D2D communications over Nakagami-m fading channel by Xiaoping ZENG, Haiwei MAO, Fan YANG, Xin JIAN, Shiqi LI, Xin JIANG, Wei FANG

    Published 2018-09-01
    “…A novel adaptive modulation based on nondata-aided error vector magnitude (NDA-EVM) was proposed to solve the problem of lower spectral efficiency in device to device (D2D) communication over Nakagami-m fading channel.The NDA-EVM was used to evaluate the channel quality.The relationship between NDA-EVM and symbol error ratio (SER) was derived according to the maximum likelihood method.Thereafter,the adaptive modulation mechanism of MQAM with the SER constraint was designed.Considering the joint effect of finite-length queuing and fading channel,the system packet loss rate and spectral efficiency was analyzed.Theoretical analysis and simulation experiments show that NDA-EVM based adaptive modulation accurately gives the modulation threshold and evaluates the relationship between QoS and packet loss rate,the proposed algorithm improves system spectral efficiency while maintaining low algorithm complexity,spectral efficiency improves by 0.752 bit·(s·Hz)<sup>-1</sup>,compared with traditional algorithm.…”
    Get full text
    Article
  11. 4631

    A Novel Spectrum Sensing Method for Multiple Unknown Signal Sources Using Frequency Domain Energy Detection and DBSCAN by Rui Gao, Guanghui Yan, Ruiting Niu, Wenwen Chang, Tianfeng Yan, Chunyang Tang

    Published 2025-01-01
    “…The proposed method was implemented using the GNU Radio toolkit for efficient acquisition and processing of in-phase and quadrature (I/Q) data from software-defined radio (SDR) hardware, and transformed this data into power spectral density (PSD) for analysis. The FDED algorithm detects signal occupancy in sub-channels, while FDNE calculates an adaptive threshold based on noise variance estimates. …”
    Get full text
    Article
  12. 4632

    Corrosion rate prediction for long-distance submarine pipelines based on MWIWOA-SVM by Zhengshan LUO, Haipeng LYU, Jihao LUO

    Published 2025-05-01
    “…The extended search mode was refined by integrating the simplex method, while the optimization capability of the Whale Optimization Algorithm (WOA) was enhanced with Levy flight to improve step length. …”
    Get full text
    Article
  13. 4633

    Robust mesh generation for electromagnetic models with geometric defects through node alignment and mesh boolean operations by Z. H. Gao, Fei Yu, Jie Cao, Xin Yang, J. H. Xie, Z. Q. Guan

    Published 2025-07-01
    “…Abstract This paper presents a mesh fault-tolerant repair algorithm tailored to address common geometric issues inherent in electromagnetic models. …”
    Get full text
    Article
  14. 4634

    Multi task detection method for operating status of belt conveyor based on DR-YOLOM by Yongan LI, Tengjie CHEN, Hongwei WANG, Zhihao ZHANG

    Published 2025-06-01
    “…The results show that compared to mainstream single detection algorithms, DR-YOLOM multi task detection algorithm has better comprehensive detection ability, and this algorithm can ensure high target recognition accuracy, segmentation accuracy, and appropriate inference speed with a small number of parameters. …”
    Get full text
    Article
  15. 4635

    A Vision-Based End-to-End Reinforcement Learning Framework for Drone Target Tracking by Xun Zhao, Xinjian Huang, Jianheng Cheng, Zhendong Xia, Zhiheng Tu

    Published 2024-10-01
    “…This framework focuses on controlling the drone to follow a moving target while maintaining a specific distance. VTD3 is a pure vision-based tracking algorithm which integrates the YOLOv8 detector, the BoT-SORT tracking algorithm, and the Twin Delayed Deep Deterministic Policy Gradient (TD3) algorithm. …”
    Get full text
    Article
  16. 4636

    Web service discovery method based on semantic expansion by ZHANG Zheng, ZUO Chun, WANG Yu-guo

    Published 2007-01-01
    “…A Web service discovery method based on semantic expansion was provided.It semantically expanded the conception of service description and service request.The semantic expansion way includes equivalent expansion,feature expansion and compose expansion.It gave the definition of extend semantic subsume during the period of input/output matching.The experiment tells that this algorithm can improve the recall while maintaining a high level precision.If sin-gle service can not match the service request,the way can attempt service composition to match service request.The heu-ristic algorithm based on H*changed the composition problem to searching problem.Because of the adoption of estima-tion function,the efficiency is improved distinctly.…”
    Get full text
    Article
  17. 4637

    Exploration of indoor environment perception and design model based on virtual reality technology by Zhang Mingli

    Published 2025-04-01
    “…(a) Error changes before applying filtering algorithms. (b) Error changes after applying filtering algorithms.…”
    Get full text
    Article
  18. 4638

    EXTRAPOLATION BY ATTRACTION METHOD FOR IDENTIFICATION OF TRACKS AND PLOTS IN SYSTEM OF SECONDARY RADAR INFORMATION PROCESSING by U. A. Aparovich, R. V. Bondarenko

    Published 2019-06-01
    “…One of the main problems in the secondary radar information processing (trace-while-scan) is the correct identification of sensed plots with corresponding tracks of targets being tracked by extrapolated marks. …”
    Get full text
    Article
  19. 4639

    Web service discovery method based on semantic expansion by ZHANG Zheng, ZUO Chun, WANG Yu-guo

    Published 2007-01-01
    “…A Web service discovery method based on semantic expansion was provided.It semantically expanded the conception of service description and service request.The semantic expansion way includes equivalent expansion,feature expansion and compose expansion.It gave the definition of extend semantic subsume during the period of input/output matching.The experiment tells that this algorithm can improve the recall while maintaining a high level precision.If sin-gle service can not match the service request,the way can attempt service composition to match service request.The heu-ristic algorithm based on H*changed the composition problem to searching problem.Because of the adoption of estima-tion function,the efficiency is improved distinctly.…”
    Get full text
    Article
  20. 4640

    Efficient multiplication for finite fields of p characteristic by LI Yin 1, CHEN Gong-liang1, LI Jian-hua1

    Published 2009-01-01
    “…Based on residue arithmetic,a new form of polynomial named PAPB in Fp[x] had been constructed.The amount and distribution of such irreducible polynomials had also been investigated.Then,an efficient algorithm for multiplication modulo PAPB had been proposed using residue arithmetic and Chinese remainder theorem.In the end,the result analysis was given.The theoretic analysis and simulation experiment show that for some finite field of medium prime characteristic,the given algorithm only costs O(k1.5) operations in Fp while the multiplication modulo irreducible binomial cost O(k2) operations,which shows a better performance.As a result,the work presents an interesting perspective for optimal extension field and elliptic curve cryptography.…”
    Get full text
    Article