Showing 641 - 660 results of 13,618 for search 'also algorithm', query time: 0.11s Refine Results
  1. 641

    Optimal Shape Control of Piezoelectric Intelligent Structure Based on Genetic Algorithm by Zhanxi Wang, Xiansheng Qin, Shunqi Zhang, Jing Bai, Jing Li, Genjie Yu

    Published 2017-01-01
    “…This paper presents a mathematical model regarding piezoelectric intelligent structure shape control. We also applied a genetic algorithm, and given a piezoelectric intelligent cantilever plate with both ends affected by a certain load, optimal shape control results of piezoelectric materials were analyzed from different perspectives (precision reference or cost reference). …”
    Get full text
    Article
  2. 642

    Advanced Phasmatodea Population Evolution Algorithm for Capacitated Vehicle Routing Problem by Jiawen Zhuang, Shu-Chuan Chu, Chia-Cheng Hu, Lyuchao Liao, Jeng-Shyang Pan

    Published 2022-01-01
    “…Phasmatodea population evolution algorithm (PPE) is a recently proposed metaheuristic algorithm. …”
    Get full text
    Article
  3. 643

    The Patch-Levy-Based Bees Algorithm Applied to Dynamic Optimization Problems by Wasim A. Hussein, Siti Norul Huda Sheikh Abdullah, Shahnorbanun Sahran

    Published 2017-01-01
    “…The results of the experiments show that PLBA achieves better results than the other BA variants. The obtained results also indicate that PLBA significantly outperforms some of the other state-of-the-art algorithms and is competitive with others.…”
    Get full text
    Article
  4. 644

    Adaptive Cooperative Search Algorithm for Air Pollution Detection Using Drones by Il-kyu Ha

    Published 2025-05-01
    “…The search continues iteratively until any vertex measurement reaches a predefined threshold. An improved algorithm is also proposed to address the divergence and oscillation that occur during the search. …”
    Get full text
    Article
  5. 645

    Religious Digital Creatives in Türkiye: A Research on the Axis of Algorithmic Authority by Yunus Ergen

    Published 2024-12-01
    “…The most recent approach for understanding authority derived from the contentgenerated in digital media is algorithmic authority. This approach is also employed to analyze the structureof religious digital content creators and the content they create. …”
    Get full text
    Article
  6. 646

    Novel distinguisher for SM4 cipher algorithm based on deep learning by Huijiao WANG, Xin ZHANG, Yongzhuang WEI, Lingchen LI

    Published 2023-07-01
    “…A method was proposed to construct a deep learning distinguisher model for large state block ciphers with large-block and long-key in view of the problem of high data complexity, time complexity and storage complexity of large state block cipher distinguishers, and the neural distinguishers were constructed for SM4 algorithm.Drawing inspiration from the idea that ciphertext difference could improve the performance of distinguishers, a new input data format for neural distinguisher was designed by using partial difference information between ciphertext pairs as part of the training data.The residual neural network model was used to construct the neural distinguisher.The training dataset for large blocks was preprocessed.Additionally, an improved strategy for model relearning was proposed to address the high specificity and low sensitivity of the constructed distinguisher.Experimental results show that the proposed deep learning model for SM4 can achieve 9 rounds neural distinguisher.The accuracy of 4~9 rounds distinguishers can reach up to 100%, 76.14%, 65.20%, 59.28%, 55.89% and 53.73% respectively.The complexity and accuracy of the constructed differential neural distinguisher are significantly better than those of traditional differential distinguishers, and it is currently the best neural distinguisher for the block cipher SM4 to our knowledge.It also proves that the deep learning method is effective and feasible in the security analysis of block cipher of large block.…”
    Get full text
    Article
  7. 647

    Improved sliding mode control for induction motor based on twisting algorithm by Hadda Benderradji, Samira Benaicha, Larbi Chrifi Alaoui

    Published 2025-01-01
    “…The comparison between the results of the two proposed methods shows that the second-order sliding mode control using the twisting algorithm not only guarantees the same robustness and dynamic performances of traditional first-order sliding mode control but also achieves the reduction of the chattering phenomenon.…”
    Get full text
    Article
  8. 648

    Object detection algorithm in a navigation system for a rescue drone by Nataliia Stelmakh, Yurii Yukhymenko, Ilya Rudkovskiy, Anton Lavrinenkov

    Published 2025-06-01
    “… This article focuses on improving object recognition algorithms for rescue drones, in particular, enhancing the methodology for classifying human poses by expanding the set of key body points and using more effective mathematical models. …”
    Get full text
    Article
  9. 649

    Competition law in the age of AI: Confronting algorithmic collusion in the smart economy by Chen LI, Ina VIRTOSU

    Published 2025-03-01
    “…While robots and AI systems enhance efficiency and drive innovation across digital commerce platforms, they also raise competition law concerns. Algorithmic collusion is a prime example, as autonomous algorithms can independently coordinate market behaviour, challenging traditional liability frameworks. …”
    Get full text
    Article
  10. 650

    A parallel algorithm for fast reconstruction of primary vertices on heterogeneous architectures by Agnieszka Dziurda, Maciej Giza, Vladimir V. Gligorov, Wouter Hulsbergen, Bogdan Kutsenko, Saverio Mariani, Niklas Nolte, Florian Reiss, Patrick Spradlin, Dorothea vom Bruch, Tomasz Wojton

    Published 2025-06-01
    “…Its implementations and optimisations on x86 and GPU architectures and its performance on simulated samples are also discussed.…”
    Get full text
    Article
  11. 651

    Advancement of the DRPE Encryption Algorithm for Phase CGHs by Random Pixel Shuffling by Alfonso Blesa, Francisco J. Serón

    Published 2025-04-01
    “…This work presents an optical encryption process for various types of information related to 3D worlds (scenes) or 2D images, utilizing Computer-Generated Holograms (CGHs). It also introduces a modification to the Dual Random Phase Encoding (DRPE) encryption algorithm by incorporating pixel shuffling. …”
    Get full text
    Article
  12. 652

    Differential bond energy algorithm for optimal vertical fragmentation of distributed databases by Shikha Mehta, Parul Agarwal, Prakhar Shrivastava, Jharna Barlawala

    Published 2022-01-01
    “…The mean difference in GAM values for both algorithms are also illustrated. The experimental results portrays that DBE is suitable for vertical fragmentation of high dimensional problems as it attain high GAM value as compared to BEA on various datasets.…”
    Get full text
    Article
  13. 653

    Network reconfiguration and optimal distributed generations allocation with whale optimizer algorithm by Ahmadreza Abdollahi Chirani

    Published 2025-03-01
    “…Discovering the optimal site, size, and reconfiguration strategy for a DG-based distribution network using a metaheuristic algorithm is the main goal of this study. The multi-objective and multi-constrained feature of the Whale Optimization Algorithm (WOA) makes it a useful optimization technique for network reconfiguration. …”
    Get full text
    Article
  14. 654
  15. 655

    Feasibility study of genetic algorithms application for implementation of block cryptosystem cryptanalysis by Yury O. Chernyshev, Alexander S. Sergeyev, Nikolay N. Ventsov, Alexander N. Ryazanov

    Published 2015-09-01
    “…It is noted also that as the distinctive feature of both block cipher methods, and the genetic algorithms is their internal parallelism, then the task of developing a cryptanalysis algorithm based on the parallel implementation of the constituent stages is relevant. …”
    Get full text
    Article
  16. 656

    Greedy Algorithm for Deriving Decision Rules from Decision Tree Ensembles by Evans Teiko Tetteh, Beata Zielosko

    Published 2025-01-01
    “…This study introduces a greedy algorithm for deriving decision rules from decision tree ensembles, targeting enhanced interpretability and generalization in distributed data environments. …”
    Get full text
    Article
  17. 657

    Multi-Hop Data Communication Algorithm for Clustered Wireless Sensor Networks by Dilip Kumar, R. B. Patel

    Published 2011-04-01
    “…It can also increase the scalability, stability, and network lifetime. …”
    Get full text
    Article
  18. 658

    Research on the A* Algorithm Based on Adaptive Weights and Heuristic Reward Values by Xizheng Wang, Gang Li, Zijian Bian

    Published 2025-03-01
    “…Typical working conditions are selected, and the algorithm is verified through simulation tests. Simulation tests show that the algorithm not only shortens the planning time and improves the path security but also reduces the number of search nodes by about 76.4% on average and the turn angle by about 71.7% on average.…”
    Get full text
    Article
  19. 659

    An Extended Firefly Algorithm for Enhanced Information Diffusion with Multi-Factor Considerations by Amjad Alloush, Ghaida Rebdawi:, Mohammad Saeed Abou Trab

    Published 2025-07-01
    “…In this study, we propose an enhanced information diffusion model based on an Extended Modified Firefly Algorithm (EMFA), integrating four key features: content type, engagement level, temporal behavior, and user social attributes. …”
    Get full text
    Article
  20. 660

    Design and Implementation of English Intelligent Communication Platform Based on Similarity Algorithm by Yujie Chai

    Published 2021-01-01
    “…In the task of text similarity computation, it achieves better results in three evaluation metrics: accuracy, recall, and F1 value. The algorithm also improves the computational efficiency of the model to a certain extent by removing feature words with low feature contribution. …”
    Get full text
    Article