Showing 121 - 140 results of 13,618 for search 'also algorithm', query time: 0.17s Refine Results
  1. 121

    Personalized-Template-Guided Intelligent Evolutionary Algorithm by Dongni Hu, Xuming Han, Minghan Gao, Yali Chu, Ting Zhou

    Published 2025-08-01
    “…Existing heuristic algorithms are based on inspiration sources and have not yet done a good job of basing themselves on optimization principles to minimize and utilize historical information, which may lead to low efficiency, accuracy, and stability of the algorithm. …”
    Get full text
    Article
  2. 122

    The Hybrid Taguchi-Genetic Algorithm for Mobile Location by Chien-Sheng Chen, Jium-Ming Lin, Chin-Tan Lee, Chyuan-Der Lu

    Published 2014-03-01
    “…Finally, we compare HTGA with GA and find that the Taguchi algorithm can enhance genetic algorithm. We also can find that the average convergence of generation number will not be affected no matter which propagation models we use. …”
    Get full text
    Article
  3. 123
  4. 124

    Survey of Autonomous Vehicles’ Collision Avoidance Algorithms by Meryem Hamidaoui, Mohamed Zakariya Talhaoui, Mingchu Li, Mohamed Amine Midoun, Samia Haouassi, Djamel Eddine Mekkaoui, Abdelkarim Smaili, Amina Cherraf, Fatima Zahra Benyoub

    Published 2025-01-01
    “…The primary collision avoidance algorithms currently employed by self-driving cars are examined in this thorough survey. …”
    Get full text
    Article
  5. 125

    Influence of Using ACO Algorithm in STATCOM Performance by Maha Al-Flaiyeh

    Published 2024-03-01
    “…Two optimization methods were used Ant Colony Algorithm (ACO) and Genetic Algorithm (GA) to adjust the parameters of the outer PI controller. …”
    Get full text
    Article
  6. 126

    An Optimized Strategy Coverage Control Algorithm for WSN by Zeyu Sun, Weiguo Wu, Huanzhao Wang, Heng Chen, Wei Wei

    Published 2014-07-01
    “…In the end, this paper verifies OSCC algorithm by simulation experiment and proves it can use least sensor nodes to effectively cover target area. …”
    Get full text
    Article
  7. 127

    Application of an Improved CHI Feature Selection Algorithm by Liang-jing Cai, Shu Lv, Kai-bo Shi

    Published 2021-01-01
    “…So, this paper studies the CHI feature selection algorithm, and the main work and innovations are as follows: firstly, this paper analyzed the CHI algorithm’s flaws, determined that the introduction of new parameters will be the improvement direction of the CHI algorithm, and thus proposed a new algorithm based on variance and coefficient of variation. …”
    Get full text
    Article
  8. 128
  9. 129

    Observations on TETRA Encryption Algorithm TEA-3 by Jens Alich, Amund Askeland, Subhadeep Banik, Tim Beyne, Anne Canteaut, Patrick Felke, Gregor Leander, Willi Meier, Lukas Stennes

    Published 2025-03-01
    “… We present a number of observations on TEA-3, a stream cipher used in TETRA radio networks that was kept secret until recently. While the same also holds for the six other TETRA encryption algorithms, we pick TEA-3 to start with, as (i) it is not obviously weakened as TEA-{1,4,7} but (ii) in contrast to TEA-2 it is approved for extra-European emergency service, and (iii) as already noted by [MBW23] the TEA-3 design surprisingly contains a non-bijective S-box. …”
    Get full text
    Article
  10. 130

    Metaheuristic Algorithms for Optimization: A Brief Review by Vinita Tomar, Mamta Bansal, Pooja Singh

    Published 2024-03-01
    “…This work also addressed some of the difficulties associated with metaheuristic algorithms. …”
    Get full text
    Article
  11. 131

    Subsampling Algorithms for Irregularly Spaced Autoregressive Models by Jiaqi Liu, Ziyang Wang, HaiYing Wang, Nalini Ravishanker

    Published 2024-11-01
    “…To overcome this challenge, subsampling algorithms are widely used to perform statistical analyses on smaller, more manageable subsets of the data. …”
    Get full text
    Article
  12. 132

    Apllication of optimization algorithms to improve the design of turnouts by B. E. Glyuzberg

    Published 2016-04-01
    “…The article describes the formulation and algorithms for solving optimization of turnout elements at the design stage. …”
    Get full text
    Article
  13. 133

    Algorithm for finding subcritical paths on network diagrams by M. A. Аnfyorov

    Published 2023-02-01
    “…The conducted runs of computational experiments confirmed the operability and efficiency of the software-implemented algorithm. The performed analysis demonstrated the good convergence characteristics of the proposed algorithm as compared with other algorithms of this class applied to network diagrams. …”
    Get full text
    Article
  14. 134

    Review on algorithms of dealing with depressions in grid DEM by Yi-Jie Wang, Cheng-Zhi Qin, A-Xing Zhu

    Published 2019-04-01
    “…Existing ways of improving the computation efficiency of depression-processing algorithms are also presented, i.e. serial algorithm optimization and parallel algorithms. …”
    Get full text
    Article
  15. 135

    Limited Comp Handover Algorithm For LTE-Advanced by Cheng-Chung Lin, Kumbesan Sandrasegaran, Xinning Zhu, Zhuliang Xu

    Published 2013-01-01
    “…Therefore a new handover algorithm that not only supports JP in CoMP but also takes system capacity into consideration in LTE-A system is necessary. …”
    Get full text
    Article
  16. 136

    RGB-DSLAM Visual Odometry Optimization Algorithm by DONG Jing-wei, JIANG Yi-ming, HAN Zhi-yu

    Published 2020-12-01
    “…In view of the long time-consuming and poor precision of RGB-D SLAM algorithm in the field ofvisual SLAM,an implementation scheme of RGB-D SLAM visual odometry is proposed. …”
    Get full text
    Article
  17. 137

    Carrier-independent deep optical watermarking algorithm by Hao CHEN, Feng WANG, Weiming ZHANG, Nenghai YU

    Published 2022-08-01
    “…With the development of multimedia techniques, the demand for copyright protection of digital products has also gradually risen.Digital watermarking is an effective means to protect the copyright of digital products.It is generally made by adding important identification information (i.e., digital watermark) to a digital carrier (e.g., text, image, etc.), so that the carrier carries the identification information but does not affect the normal use of the carrier.The common digital watermark embedding scheme is to embed the watermark information by modifying the carrier via specific algorithms.In the actual application scenarios, there are many images or objects to be protected (such as art paintings, etc.) that are not allowed to be modified.Based on this background, a new carrier-independent deep optical watermarking algorithm was proposed, which can realize watermark information embedding without modifying the original carrier and achieve the purpose of copyright protection.Specifically, a new watermark template expression scheme at the embedding end was proposed, which expressed the watermark information by visible light modulation.By analyzing the visual system of human eyes, a watermark template pattern based on alternating projection was proposed to embed the watermark information, which made the embedding process neither require modification of the original carrier nor affect the visual senses of human eyes.At the extraction end, a watermark extraction network based on residual connection was designed, and the captured watermarked images were fed into this network after perspective transformation to extract the watermark information.The experiments were conducted under various conditions and comparisons with three baseline algorithms were made.The experimental results show that the proposed algorithm generates watermarked images with less visual distortion and is robust to the "projecting-shooting" process.The watermark extraction network has high accuracy in extracting watermark information at different distances, angles and illumination conditions, and has certain advantages over other general networks.…”
    Get full text
    Article
  18. 138
  19. 139

    Black Hole Algorithm for Software Requirements Prioritization by Norah Ibrahim Alfassam, M. Abdullah-Al-Wadud, Mubarak Rashed Alrashoud

    Published 2025-01-01
    “…Furthermore, the proposed BHA-based solution was evaluated on three real-world datasets (RALIC, Word, and ReleasePlanner), and its performance was compared with that of multiple state-of-the-art algorithms, including Ant Colony Optimization (ACO), Genetic Algorithm (GA), Grey Wolf Optimizer (GWO), Particle Swarm Optimization (PSO), Fitness Dependent Optimizer (FDO), Goose Algorithm (GAO), and Lagrange Elementary Optimization (LEO). …”
    Get full text
    Article
  20. 140

    Decision support algorithm to prevent hardware failures by E. A. Abidova

    Published 2024-11-01
    “…The algorithm is based on the consistent application of singular spectrum analysis and allows not only timely detecting of deviations, but also assessing the probability of a decision error. …”
    Get full text
    Article