Showing 5,201 - 5,220 results of 13,928 for search '(whole OR while) algorithm', query time: 0.18s Refine Results
  1. 5201

    Learning properties of quantum states without the IID assumption by Omar Fawzi, Richard Kueng, Damian Markham, Aadil Oufkir

    Published 2024-11-01
    “…Among other applications, this allows us to generalize the classical shadow framework to the non-i.i.d. setting while only incurring a comparatively small loss in sample efficiency. …”
    Get full text
    Article
  2. 5202

    Mixed fleet-based two-echelon vehicle routing optimization for cold chain logistics with diverse recharging strategies. by Yaling Li, Wenzhu Liao, Yuqi Huang

    Published 2025-01-01
    “…The presented model optimizes economic and environmental considerations to mitigate air pollution and reduce dependence on non-renewable energy sources while providing feasible routes. This study proposes an allocation algorithm and an enhanced ant colony algorithm to address a single-objective two-echelon vehicle routing problem with the mixed fleet (2EVRPMF). …”
    Get full text
    Article
  3. 5203

    Task offloading and resource allocation in vehicle heterogeneous networks with MEC by Haibo ZHANG, Qiuji LUAN, Jiang ZHU, Fangwei LI

    Published 2018-09-01
    “…Based on the advantages of high-bandwidth and low-latency brought by mobile edge computing (MEC),which could provide IT service environment and cloud computing capability,combined with the long-term evolution unlicensed (LTE-U) technology,the task offloading decision and resource allocation issues in vehicle heterogeneous network were studied.Considering the link differentiation requirements,which were the high capacity of vehicle-to-roadside unit (V2I) links and the super reliability of vehicle-to-vehicle (V2V) links,quality of service (QoS) was modeled as the combination of capacity and latency.Firstly,the improved K-means algorithm was used to cluster the request vehicles according to different QoS to determine the communication mode.Secondly,the LTE-U technology based on non-competition period (CFP) which was combined with carrier aggregation (CA) technology,and the distribution Q-Learning algorithm were adopted to allocate the channel and power.The simulation results show that the proposed mechanism can maximize the V2I link traversal capacity while ensuring the reliability of the V2I link.…”
    Get full text
    Article
  4. 5204

    steganography in colored images based on biometrics by Zeena Nabeel Jameel AL-Kateeb, Marriam Raad Jasim Mohammed AL-Bazaz

    Published 2019-05-01
    “…The performance of the algorithm and the method of its application were measured using measures of efficiency of the work, whereas the Peak Signal Noise Ratio was used, the highest ratio obtained was 81.3417, and Mean Square Error was approximately 0.0008 as a maximum limit, while the error rate was the restored confidential message after hiding Bit Error Rate = 0 in all cases …”
    Get full text
    Article
  5. 5205

    Nanosatellite Autonomous Navigation via Extreme Learning Machine Using Magnetometer Measurements by Gilberto Goracci, Fabio Curti, Mark Anthony de Guzman

    Published 2025-02-01
    “…This work presents an algorithm to perform autonomous navigation in spacecraft using onboard magnetometer data during GPS outages. …”
    Get full text
    Article
  6. 5206

    Mode selection and resource optimization for UAV-assisted cellular networks by Daquan FENG, Canjian ZHENG, Xiangqi KONG

    Published 2024-03-01
    “…The resource allocation and optimization scheme was studied in a coexistence scenario of unmanned aerial vehicle (UAV) and cellular communication network.To improve spectrum efficiency of the system, UAV users could reuse the cellular spectrum resources to access the network through full duplex or half duplex device-to-device technique.Additionally, a joint access control, mode selection, power control and resource allocation optimization problem was formulated to maximize the overall throughput of the network while ensuring quality of service requirements for both UAV users and ground cellular users.Specifically, the phase 1 method in the convex optimization was adopted for access control and feasibility check, and then the convex and concave procedure (CCCP) iterative algorithm was used to solve the power control problem for feasible UAV user pairs.By using this local optimum value, the original optimization problem can be simplified into a weighted maximization problem.Finally, the Kuhn-Munkres (KM) algorithm was used to match the optimal channel resources and obtain the global optimal throughput value of the system.Numerical results show that the proposed scheme can significantly improve the performance of system.…”
    Get full text
    Article
  7. 5207

    Towards Independency Using LMN4DISABLED System for Disabled by Wael Hosny Fouad Aly

    Published 2015-08-01
    “…Sensor nodes and cameras are distributed in all rooms and hallways. Dijkstra routing algorithm is used to select the appropriate route for each profile. …”
    Get full text
    Article
  8. 5208

    An Alternative Framework for Dynamic Mode Decomposition with Control by Gyurhan Nedzhibov

    Published 2025-05-01
    “…The new scheme aims to improve computational efficiency while maintaining the reliability and accuracy of the decomposition. …”
    Get full text
    Article
  9. 5209

    A comparative structural module study of Balla Lompoa and Ba’anjung by Fermanto Lianto, Denny Husin, Rudy Trisno

    Published 2025-01-01
    “…The steps are 1) Architectural redrawing, 2) Module extraction, and 3) Algorithm pattern. The output is an architectural algorithm as the patterns. …”
    Get full text
    Article
  10. 5210

    Identification of Perceptual Phonetic Training Gains in a Second Language Through Deep Learning by Georgios P. Georgiou

    Published 2025-06-01
    “…This study addresses this gap by developing a deep learning algorithm designed to identify perceptual gains resulting from second language (L2) phonetic training. …”
    Get full text
    Article
  11. 5211

    Effects of Human Connection through Social Drones and Perceived Safety by Hwayeon Kong, Frank Biocca, Taeyang Lee, Kihyuk Park, Jeonghoon Rhee

    Published 2018-01-01
    “…In the group where the drones were flown in an unsafe manner, participants exhibited higher levels of satisfaction with the algorithm-driven drone guide, while both types of drones received the same level of satisfaction when they were flown safely. …”
    Get full text
    Article
  12. 5212

    Robust Approach for Global Stabilization of a Class of Underactuated Mechanical Systems in Presence of Uncertainties by Ibrahim Shah, Waseem Abbasi, Musaed Alhussein, Imran Khan, Fazal Ur Rehman, Muhammad Shahid Anwar, Khursheed Aurangzeb

    Published 2023-01-01
    “…The algorithm design offer a methodical way to handle underactuation, while the robustness properties of SMC suppresses the effect of norm bounded uncertainties and external disturbances. …”
    Get full text
    Article
  13. 5213

    Signal Timing Optimization Model for Intersections in Traffic Incidents by Jiawen Wang, Jiayu Hang, Xizhao Zhou

    Published 2020-01-01
    “…To satisfy the conditions for efficiently identifying feasible solutions in a short time, a heuristic algorithm (simulated annealing algorithm) is employed to solve the model. …”
    Get full text
    Article
  14. 5214

    Compression and Decompression of Audio Files Using the Arithmetic Coding Method by Parasian D. P Silitonga, Irene Sri Morina

    Published 2019-05-01
    “…Arithmetic coding is one algorithm that can be used to compress audio files. …”
    Get full text
    Article
  15. 5215

    Multimodal Control by Variable-Structure Neural Network Modeling for Coagulant Dosing in Water Purification Process by Jun Zhang, Da-Yong Luo

    Published 2020-01-01
    “…This method rectifies coagulant dosage effectively while keeping valid coagulation performance. By the way, the MM-P-VSRVNN algorithm can decrease computation time and avoid overfitting learning ability. …”
    Get full text
    Article
  16. 5216

    Anomaly-Based Intrusion Detection System for the Internet of Medical Things by Eichie Franklin, Bernardi Pranggono

    Published 2024-04-01
    “…The attention-based Convolutional Neural Network and Long Short-Term Memory (CNN-LSTM) model was the second-best performer, while the hybrid CNN-LSTM model performed the worst. …”
    Get full text
    Article
  17. 5217

    Optimal Model-Free Mean-Square Consensus for Multi-Agents with Markov Switching Topology by Ruoxun Ma, Lipo Mo, Bokang Zhou

    Published 2024-11-01
    “…The goal is to design an appropriate algorithm to find the optimal control policies that minimize the performance index while achieving consensus among the agents. …”
    Get full text
    Article
  18. 5218

    Concurrent Calculations on Reconfigurable Logic Devices Applied to the Analysis of Video Images by Sergio R. Geninatti, José Ignacio Benavides Benítez, Manuel Hernández Calviño, Nicolás Guil Mata

    Published 2010-01-01
    “…This paper presents the design and implementation on FPGA devices of an algorithm for computing similarities between neighboring frames in a video sequence using luminance information. …”
    Get full text
    Article
  19. 5219

    Efficient sensor network planning based on approximate potential games by Su-Jin Lee, Young-Jin Park, Han-Lim Choi

    Published 2018-06-01
    “…The selection algorithm is based on the correlation between one agent’s and the other agents’ measurement selection. …”
    Get full text
    Article
  20. 5220

    A PV Battery Charging System Based on Extremum-Seeking Control and a Series Resonant Converter with Capacitive Galvanic Isolation by Abdulhakeem Alsaleem, Abdulrahman Alduraibi

    Published 2025-07-01
    “…This paper presents a standalone system that utilizes a capacitive isolated series resonant converter using an extremum-seeking control algorithm to extract the maximum power from PV panels. …”
    Get full text
    Article