Showing 161 - 180 results of 13,928 for search '(whole OR while) algorithm', query time: 0.16s Refine Results
  1. 161
  2. 162

    An Optimized Strategy Coverage Control Algorithm for WSN by Zeyu Sun, Weiguo Wu, Huanzhao Wang, Heng Chen, Wei Wei

    Published 2014-07-01
    “…Thirdly, OSCC picks out the optimal routing solution while conducting combinatorial optimization of routing path using ant colony optimization (ACO) algorithm, thus reducing the energy spending of whole network. …”
    Get full text
    Article
  3. 163

    DIDADTIC TOOLS FOR THE STUDENTS’ ALGORITHMIC THINKING DEVELOPMENT by T. P. Pushkaryeva, T. A. Stepanova, V. V. Kalitina

    Published 2017-12-01
    “…Modern engineers must possess high potential of cognitive abilities, in particular, the algorithmic thinking (AT). In this regard, the training of future experts (university graduates) of technical specialities has to provide the knowledge of principles and ways of designing of various algorithms, abilities to analyze them, and to choose the most optimal variants for engineering activity implementation. …”
    Get full text
    Article
  4. 164

    Loopback matching algorithm with support set protection by Shu-juan TIAN, Xiao-ping FAN, Ting-rui PEI, Shu YANG, Zhe-tao LI

    Published 2015-09-01
    “…There was a drawback of deleting right support elements in some greedy iterative reconstruction algorithms.To resolve this problem,loopback matching algorithm with support set protection (LM-P) was proposed.First,LM-P ini-tialized elements of non-protected support set based on minimum residual inner product.Second,it computed the projec-tions of observations on the observation sub-matrix corresponding to non-protected support set elements.Then,an ele-ment in non-protected support set with the largest projection was added to the protected support set.An alternative multi-plicative iteration method was employed to obtain the whole protected support set.As to reconstruct a sparse signal whose nonzero elements are normally distributed and the signal sparsity is less than half the number of measurements,experimental results show that the reconstruction accuracy of LM-P algorithm exceeds 86%.For sparse signals with small noise,the reconstruction accuracy of LM-P can maintain over 99 %.Compared with OMP,CoSaMP,SP and GPA algo-rithms,LM-P's observations are smaller.LM-P also has good performance for image reconstruction.greedy iteration;support set;sparse signal;LM-P…”
    Get full text
    Article
  5. 165

    Loopback matching algorithm with support set protection by Shu-juan TIAN, Xiao-ping FAN, Ting-rui PEI, Shu YANG, Zhe-tao LI

    Published 2015-09-01
    “…There was a drawback of deleting right support elements in some greedy iterative reconstruction algorithms.To resolve this problem,loopback matching algorithm with support set protection (LM-P) was proposed.First,LM-P ini-tialized elements of non-protected support set based on minimum residual inner product.Second,it computed the projec-tions of observations on the observation sub-matrix corresponding to non-protected support set elements.Then,an ele-ment in non-protected support set with the largest projection was added to the protected support set.An alternative multi-plicative iteration method was employed to obtain the whole protected support set.As to reconstruct a sparse signal whose nonzero elements are normally distributed and the signal sparsity is less than half the number of measurements,experimental results show that the reconstruction accuracy of LM-P algorithm exceeds 86%.For sparse signals with small noise,the reconstruction accuracy of LM-P can maintain over 99 %.Compared with OMP,CoSaMP,SP and GPA algo-rithms,LM-P's observations are smaller.LM-P also has good performance for image reconstruction.greedy iteration;support set;sparse signal;LM-P…”
    Get full text
    Article
  6. 166

    Inexact Version of Bregman Proximal Gradient Algorithm by S. Kabbadj

    Published 2020-01-01
    “…In this paper, we give an inexact version of the BPG algorithm while circumventing the condition of supercoercivity by replacing it with a simple condition on the parameters of the problem. …”
    Get full text
    Article
  7. 167

    ALGORITHM FOR POST-BURN BACTERIAL SEPSIS DIAGNOSIS by B. V. Guzenko

    Published 2013-10-01
    “…The purpose of our work was to develop the algorithm of bacterial sepsis diagnosis in patients with severe burn disease. …”
    Get full text
    Article
  8. 168

    Intelligent data collection algorithm research for WSNs by Zhong Weihe

    Published 2025-02-01
    “…The remaining algorithms in Scenario 4 dropped below 50% by 500 rounds, while the dynamic data collection algorithm was still close to 70% by 1,500 rounds. …”
    Get full text
    Article
  9. 169

    PFW-YOLO Lightweight Helmet Detection Algorithm by Yue Hong, Hao Wang, Shuo Guo

    Published 2025-01-01
    “…The final experimental results indicate that, compared to the original YOLOv8n algorithm, the PFW-YOLO algorithm achieves a 53% reduction in parameters, a 42% decrease in computational effort, and a 51% reduction in model size, while enhancing the mean average precision (mAP) by 0.4%.…”
    Get full text
    Article
  10. 170

    Multifactor Algorithm for Test Case Selection and Ordering by Atulya Gupta, Rajendra Prasad Mahapatra

    Published 2021-06-01
    “…Moreover, evolutionary algorithms such as the genetic process often help in depleting test cases, together with a concurrent decrease in computational runtime. …”
    Get full text
    Article
  11. 171

    Video watermarking algorithm for resisting collusion attacks by LIU Shao-hui, HAN Lu, YAO Hong-xun

    Published 2010-01-01
    “…A content dependent video watermark algorithm for resisting linear collusion attacks was presented. …”
    Get full text
    Article
  12. 172

    OPTIMISATION OF THE MACHINING PROCESS USING GENETIC ALGORITHM by Nadežda ČUBOŇOVÁ, Tomáš DODOK, Zuzana SÁGOVÁ

    Published 2019-09-01
    “…Tool path verification and optimisation are two best ways of dramatically improving manufacturing operations while saving money with relatively little work. Genetic algorithms can be used for improvement of these operations and considerably reduce length of tool paths leading to the reduction of machine times and optimisation of cutting parameters. …”
    Get full text
    Article
  13. 173

    Video watermarking algorithm for resisting collusion attacks by LIU Shao-hui, HAN Lu, YAO Hong-xun

    Published 2010-01-01
    “…A content dependent video watermark algorithm for resisting linear collusion attacks was presented. …”
    Get full text
    Article
  14. 174

    Algorithm of blockchain data provenance based on ABE by Youliang TIAN, Kedi YANG, Zuan WANG, Tao FENG

    Published 2019-11-01
    “…To solve the problem that the blockchain-based traceability algorithm mainly used homomorphic encryption and zero-knowledge proof for privacy protection,making it difficult to achieve dynamic sharing of traceability information,a blockchain data traceability algorithm based on attribute encryption was proposed.In order to realize the dynamic protection of transaction privacy,the strategy update algorithm applicable to block chain was designed based on the CP-ABE scheme proposed by Waters to achieve dynamic protection of transaction privacy.In order to realize the dynamic update of the visibility about block content,based on the strategy update algorithm,the block structure was designed to achieve the dynamic update about the content visibility of the block.The security and experimental simulation analysis show that the proposed algorithm can realize the dynamic sharing of traceability information while completing the protection transaction privacy.…”
    Get full text
    Article
  15. 175

    Research of embedding algorithm for wireless network virtualization by Bin CAO, Shi-chao XIA, Fang HE, Yun LI

    Published 2017-01-01
    “…Wireless network virtualization has become one of the promising techniques in fifth generation mobile networks (5G),and the virtual network embedding plays a very important role.A model was formulated to describe the problem and a wireless virtual network embedding algorithm based on joint bandwidth and power allocation (WVNEA-JBP) was put forward,which selected the suitable node and path to serve the data transmission from virtual networks.In order to minimize the overhead while satisfy the higher capacity request,this algorithm considered the impact of interference of wireless links and supports path splitting.A case study was introduced to show how WVNEA-JBP to work.Furthermore,simulation results show that WVNEA-JBP is able to accomplish the efficient utilization of network resources and improve the accept rate of virtual network requests.…”
    Get full text
    Article
  16. 176

    Congestion control algorithm for unreliable unicast traffic by SONG Li-hua1, CHEN Ming1, WANG Hai-tao2, XIONG Huan1

    Published 2008-01-01
    “…To improve performance in high bandwidth networks when trying to retain fairness, a rate-based congestion control algorithm was proposed for unreliable unicast traffic. …”
    Get full text
    Article
  17. 177

    Influencer autonomy: Navigating authenticity, agencies, and algorithms by SUNDET VILDE SCHANKE, STEEN-JOHNSEN KARI, ANDERSEN MADS MØLLER TOMMERUP

    Published 2025-05-01
    “…Our findings reveal that while influencer autonomy is always limited and partial, it remains a compelling narrative.…”
    Get full text
    Article
  18. 178
  19. 179

    Research of embedding algorithm for wireless network virtualization by Bin CAO, Shi-chao XIA, Fang HE, Yun LI

    Published 2017-01-01
    “…Wireless network virtualization has become one of the promising techniques in fifth generation mobile networks (5G),and the virtual network embedding plays a very important role.A model was formulated to describe the problem and a wireless virtual network embedding algorithm based on joint bandwidth and power allocation (WVNEA-JBP) was put forward,which selected the suitable node and path to serve the data transmission from virtual networks.In order to minimize the overhead while satisfy the higher capacity request,this algorithm considered the impact of interference of wireless links and supports path splitting.A case study was introduced to show how WVNEA-JBP to work.Furthermore,simulation results show that WVNEA-JBP is able to accomplish the efficient utilization of network resources and improve the accept rate of virtual network requests.…”
    Get full text
    Article
  20. 180

    SOMO-m Optimization Algorithm with Multiple Winners by Wei Wu, Atlas Khan

    Published 2012-01-01
    “…More importantly, SOMO-m algorithm with m≥2 can be used to find two or more minimums simultaneously in a single learning iteration process, while the original SOM-based optimization (SOMO) algorithm has to fulfil the same task much less efficiently by restarting the learning iteration process twice or more times.…”
    Get full text
    Article