Showing 4,821 - 4,840 results of 13,928 for search '(whole OR while) algorithm', query time: 0.21s Refine Results
  1. 4821

    Structural knowledge-driven meta-learning for task offloading in vehicular networks with integrated communications, sensing and computing by Ruijin Sun, Yao Wen, Nan Cheng, Wei Wang, Rong Chai, Yilong Hui

    Published 2024-07-01
    “…By optimizing the computation mode and network resources, in this paper, we investigate an I-CSC-based task offloading problem to reduce the cost caused by resource consumption while guaranteeing the latency of each task. Although this non-convex problem can be handled by the alternating minimization (AM) algorithm that alternatively minimizes the divided four sub-problems, it leads to high computational complexity and local optimal solution. …”
    Get full text
    Article
  2. 4822

    Underground personnel detection and tracking using improved YOLOv7 and DeepSORT by Weiqiang FAN, Xuejin WANG, Yinghui ZHANG, Xiaoyu LI

    Published 2024-12-01
    “…Compared with YOLOv7-DeepSORT algorithm, the number of network parameters of the improved algorithm is reduced by 36%, significantly improving the real-time performance of underground multi personnel target detection and tracking, and is expected to be deployed in the underground intelligent edge computing monitoring platform.…”
    Get full text
    Article
  3. 4823

    Identification of green leafhoppers (cicadellidae) in vineyards through an automatic image acquisition system from yellow sticky traps associated with deep-learning by Proença Maria da Conceição, Rebelo Maria Teresa, Valent Riccardo, Mateus Rebeca, Gaspar Pedro Diniz, Lopes Carlos Manuel, Franco José Carlos

    Published 2025-01-01
    “…The results demonstrated the algorithm’s capability to accurately identify green leafhopper species, improving the speed of identification compared to conventional methods while maintaining a high level of precision (80%), and a harmonic mean of the precision and recall (F1) of 0.85. …”
    Get full text
    Article
  4. 4824

    Anderson impurity solver integrating tensor network methods with quantum computing by François Jamet, Lachlan P. Lindoy, Yannic Rath, Connor Lenihan, Abhishek Agarwal, Enrico Fontana, Fedor Simkovic IV, Baptiste Anselme Martin, Ivan Rungger

    Published 2025-03-01
    “…The tensor network based ground state quantum circuit preparation algorithm can also be performed for up to 60 qubits with our available computing resources, while the state vector emulation of the quantum algorithm for time evolution is beyond what is accessible with such resources. …”
    Get full text
    Article
  5. 4825

    Strobing of Radar Marks for Trajectory Filtration in a Body-Fixed Frame by Konstantin K. Vasiliev, Alexey V. Mattis, Oleg V. Saverkin

    Published 2019-12-01
    “…Modern air targets, particularly drones, are becoming less noticeable, while their manoeuvrability continues to improve. …”
    Get full text
    Article
  6. 4826

    Multi-UAV assisted air-to-ground data collection for ground sensors with unknown positions by Cheng Yiran, Dong Yangrui

    Published 2025-06-01
    “…Simulation results reveal that, compared to the existing algorithms, the proposed approach adeptly tackles the data collection challenge when sensor positions remain unknown while significantly enhancing task execution efficiency across diverse environmental conditions. …”
    Get full text
    Article
  7. 4827

    A high-entropy image encryption scheme using optimized chaotic maps with Josephus permutation strategy by Nawal El Ghouate, Mohamed Amine Tahiri, Ahmed Bencherqui, Hanaa Mansouri, Ahmed El Maloufy, Hicham Karmouni, Mhamed Sayyouri, Sameh Askar, Mohamed Abouhawwash

    Published 2025-08-01
    “…This algorithm uses Kepler Chaotic Optimisation Algorithm (CKOA) to select the most suitable chaotic maps, guaranteeing optimal diffusion and complex pixel confusion. …”
    Get full text
    Article
  8. 4828

    Optimizing energy and load management in island microgrids for enhancing resilience against resource interruptions by Majid Hosseina, Mahmoud Samiei Moghaddam, Amir Hassannia

    Published 2025-05-01
    “…To effectively solve this high-dimensional, nonlinear problem, we employ the Multi-objective Moth Flame Algorithm (MOMFA), an enhanced metaheuristic evolutionary algorithm designed to handle complex trade-offs between cost, reliability, and resilience. …”
    Get full text
    Article
  9. 4829

    Multiobjective Optimization for Topology and Coverage Control in Wireless Sensor Networks by Seyed Mahdi Jameii, Karim Faez, Mehdi Dehghan

    Published 2015-02-01
    “…Simulation results demonstrate that the proposed algorithm can improve the network lifetime and coverage while maintaining the network connectivity.…”
    Get full text
    Article
  10. 4830

    Alzheimer’s Disease Detection Using Deep Learning and Federated Learning by Taha Bin Niaz, Usman Amjad, Humera

    Published 2025-07-01
    “…The success and accuracy of the proposed algorithm are established with empirically defined metrics such as accuracy and defined thresholds. …”
    Get full text
    Article
  11. 4831

    Programmable data processing method and system design for polymorphic network by Jinlin WANG, Li’nan JING, Xiao CHEN, Jiali YOU

    Published 2022-04-01
    “…Aiming at the problems of compatible with multiple route identification, network protocols and network application data processing faced by multimodal networks, a programmable data processing method compatible with multiple modes was proposed.Through the mode recognition and classify module to identify packets of different network modes, the data type, offset and length were used to represent multiple types of data, and the modal data processing pipeline was formed by using the matching action data table with selectable matching algorithm and processing action to process data of different types of network.A prototype system for data processing of polymorphic network was implemented and verified by using the proposed method.Experimental results show that the modal data processing pipeline can isolate the network of different modes and ensure the performance independence, the type of matching algorithm and the length of the processed data will affect the forwarding performance of the system, while the type of data will not.…”
    Get full text
    Article
  12. 4832

    Research on the WSN Node Localization Based on TOA by Qing-hui Wang, Ting-ting Lu, Meng-long Liu, Li-feng Wei

    Published 2013-01-01
    “…Regarding the tracking of moving target in the large-scale fixed scene, a new routing algorithm of LAODV in the principle of TOA localization is proposed. …”
    Get full text
    Article
  13. 4833

    High-confidence assessment of functional impact of human mitochondrial non-synonymous genome variations by APOGEE. by Stefano Castellana, Caterina Fusilli, Gianluigi Mazzoccoli, Tommaso Biagini, Daniele Capocefalo, Massimo Carella, Angelo Luigi Vescovi, Tommaso Mazza

    Published 2017-06-01
    “…Only a tiny subset was functionally evaluated with certainty so far, while the pathogenicity of the vast majority was only assessed in-silico by software predictors. …”
    Get full text
    Article
  14. 4834

    Distributed Transmission Probability Control in Fading Channel with State Information by S. Xie, K.S. Low, E. Gunawan

    Published 2015-05-01
    “…In this system, each user tries to minimize its number of transmission attempts while meeting the throughput demand. The user interaction in such an ALOHA network is modeled as a random access game. …”
    Get full text
    Article
  15. 4835

    Programmable data processing method and system design for polymorphic network by Jinlin WANG, Li’nan JING, Xiao CHEN, Jiali YOU

    Published 2022-04-01
    “…Aiming at the problems of compatible with multiple route identification, network protocols and network application data processing faced by multimodal networks, a programmable data processing method compatible with multiple modes was proposed.Through the mode recognition and classify module to identify packets of different network modes, the data type, offset and length were used to represent multiple types of data, and the modal data processing pipeline was formed by using the matching action data table with selectable matching algorithm and processing action to process data of different types of network.A prototype system for data processing of polymorphic network was implemented and verified by using the proposed method.Experimental results show that the modal data processing pipeline can isolate the network of different modes and ensure the performance independence, the type of matching algorithm and the length of the processed data will affect the forwarding performance of the system, while the type of data will not.…”
    Get full text
    Article
  16. 4836

    旋转叶片异步振动参数辨识方法及试验验证 by 王茜, 雷晓波

    Published 2021-01-01
    “…Based on the principle of blade tip timing( BTT) and the vibration principle of one degree of freedom,the parameter identification algorithm of rotating blade asynchronous vibration is established by using all phase FFT( apFFT) and least square method.The algorithm is verified by numerical simulation,and the test parameter and empirical value of the rationality for sensor layout are given.The tests of asynchronous vibration parameter identification were launched on a fan rotor,while high pressure nitrogen was used to shock the blades to produce single frequency absolute occupancy vibration.Results show that the method for asynchronous vibration identification could accurately identify blade vibration parameters,and the vibration frequencies of all blades obtained are exactly the same.Frequency identification accuracy is high with the maximum relative error of 1.12% using strain analysis frequency as a baseline.Results verify that the method of asynchronous vibration parameter identification is correct.…”
    Get full text
    Article
  17. 4837

    A blockchain sharding scheme in edge computing by Jun WANG, Jianwei MA, Jinxi LUO

    Published 2023-12-01
    “…The low security and poor privacy of the data in edge computing restrict the development of edge computing.Block chains can provide security for data in edge computing using their own tamper resistance, while protecting privacy by use of traceability.But the bottleneck of blockchain's scalability has become a barrier to their application in the field of edge computing.To solve the problem that blockchain can not meet the needs of a large number of nodes to process data at the same time when applied to edge computing, a two-layer sharding scheme was presented, which meets the needs of edge computing scenarios.Geographic location-based partitioning of nodes was implemented using the improved K-means algorithm, and a local blockchain network consensus (LBNC) algorithm was designed based on the idea of delegated proof of stake (DPoS) and practical Byzantine fault tolerance (PBFT).Simulation results show that the proposed scheme has less delay and higher throughput than those of PBFT, and the total throughput increases with the number of shards.…”
    Get full text
    Article
  18. 4838

    Artificial intelligence-driven sentiment analysis and optimization of movie scripts by Hong Zheng

    Published 2025-06-01
    “…Additionally, the emotion optimization algorithm enhances the accuracy of sentiment analysis results while boosting emotional depth. …”
    Get full text
    Article
  19. 4839

    A spectral Fletcher-Reeves conjugate gradient method with integrated strategy for unconstrained optimization and portfolio selection. by Nasiru Salihu, Sulaiman M Ibrahim, P Kaelo, Issam A R Moghrabi, Elissa Nadia Madi

    Published 2025-01-01
    “…We rigorously establish the global convergence of the algorithm for general functions, using criteria from a Wolfe-line search. …”
    Get full text
    Article
  20. 4840

    A Distributed Q Learning Spectrum Decision Scheme for Cognitive Radio Sensor Network by Jian He, Jun Peng, Fu Jiang, Gaorong Qin, Weirong Liu

    Published 2015-05-01
    “…Cognitive spectrum management can improve the utilization efficiency of spectrum while increasing the energy consumption of sensor network nodes. …”
    Get full text
    Article