Search alternatives:
post » most (Expand Search)
Showing 81 - 100 results of 338 for search 'improve post optimization algorithm', query time: 0.17s Refine Results
  1. 81

    Dynamic Sharding and Monte Carlo for Post-Quantum Blockchain Resilience by Dahhak Hajar, Nadia Afifi, Imane Hilal

    Published 2025-04-01
    “…Previous research also found that post-quantum blockchains, despite their improved cryptographic algorithms, are still vulnerable to DDoS attacks, emphasizing the need for more resilient architectural solutions. …”
    Get full text
    Article
  2. 82

    Hardware implementation of RSA encryption algorithm based on pipeline by Yang Longfei, Lu Shi, Peng Kuang

    Published 2024-01-01
    “…To address the high cost of implementing long-bits RSA encryption algorithms in hardware, improvements have been made to the traditional radix-4 Montgomery algorithm. …”
    Get full text
    Article
  3. 83
  4. 84

    Multi-objective optimization of HESS control for optimal frequency regulation in a power system with RE penetration by Ousama M.T. Ajami, Rodney H.G. Tan, Mithulan Nadarajah, Farah Adilah Jamaludin, Adlan Bagus Pradana

    Published 2024-12-01
    “…The findings indicate that the Independently Optimized Virtual Synchronous Generator HESS (IO VSG-HESS) achieves the best settling time post-contingency but offers the least improvement in frequency nadir with an average of 0.31 %. …”
    Get full text
    Article
  5. 85

    Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution by Don Roosan, Rubayat Khan, Saif Nirzhor, Fahmida Hai

    Published 2025-05-01
    “…Context The study proposes and evaluates a novel cybersecurity architecture for telehealth, resilient against future quantum computing cyber threats. By integrating Post-Quantum Cryptography (PQC) with Quantum Key Distribution (QKD) and privacy-preserving mechanisms, data confidentiality and immutability for patient records in a post-quantum era are ensured. …”
    Get full text
    Article
  6. 86
  7. 87

    Advances in Digital Signature Algorithms: Performance, Security and Future Prospects by Lyu Shuhan

    Published 2025-01-01
    “…The results show that while optimizations improve computational efficiency, challenges persist, especially with potential quantum threats that could undermine these algorithms' security. …”
    Get full text
    Article
  8. 88
  9. 89
  10. 90

    Research on Control Method of Electron Accelerator Based on Simulink Simulation by YUE Hongwei1, LI Zhongping2, 3, ZHOU Youwei2, CAO Shuchun2, 3, REN Jieru1, ZHANG Zimin2, 3, , ZHAO Yongtao1

    Published 2025-01-01
    “…The fuzzy neural network PID algorithm improves these indicators more significantly, the stabilization time is reduced by 77.9%, the overshoot is reduced by 79.6%, and the post-disturbance recovery time is reduced by 87.1%. …”
    Article
  11. 91
  12. 92

    Assessing and Reducing Energy Consumption of Grain Cleaning and Drying Equipment by Yu. N. Sap’yan, V. A. Kolos, M. I. Suleymanov, E. N. Kabakova

    Published 2019-12-01
    “…(Research purpose) To adapt the criteria and algorithm of energy-saving optimization of field technology to assess and improve the status of energy efficiency, reduce energy consumption and identify the maximum available energy saving potential of grain drying equipment during energy audit. …”
    Get full text
    Article
  13. 93
  14. 94

    Synthesis of an Algorithm for Classifying Underwater Objects on Based on the Analysis of their Noise Spectra by Evgeniy Storozhok, Vladimir Kristalinskii

    Published 2024-03-01
    “…The need to reduce the probability of false alarms in such systems actualizes the issues of developing an optimal algorithm for classifying underwater objects by their sonar field. …”
    Get full text
    Article
  15. 95
  16. 96
  17. 97

    An Area-Time Efficient Hardware Architecture for ML-KEM Post-Quantum Cryptography Standard by Trong-Hung Nguyen, Tuan-Kiet Dang, Duc-Thuan Dam, Khai-Duy Nguyen, Phuc-Phan Duong, Cong-Kha Pham, Trong-Thuc Hoang

    Published 2025-01-01
    “…To facilitate the integration of the NIST-standardized post-quantum cryptographic (PQC) algorithm, Module Lattice-based Key Encapsulation Mechanism (ML-KEM), into quantum-resistant devices and cryptosystems, this study introduces an area-time efficient hardware implementation. …”
    Get full text
    Article
  18. 98

    Analyzing Post-fire Vegetation Dynamics with Ultra-high Resolution Remote Sensing Data by O. Petrov, O. Petrov, A. Medvedev

    Published 2025-07-01
    “…This study highlights the potential of UAV-based multi-temporal monitoring for post-fire forest assessment. Future research should focus on improving tree segmentation of SfM-MVS point clouds in dense canopies, optimizing co-alignment under varying environmental conditions, and integrating additional point cloud classification methods to improve accuracy in areas with complex species distribution.…”
    Get full text
    Article
  19. 99
  20. 100

    Parsimonious and explainable machine learning for predicting mortality in patients post hip fracture surgery by Fouad Trad, Bassel Isber, Ryan Yammine, Khaled Hatoum, Dana Obeid, Mohammad Chahine, Rachid Haidar, Ghada El-Hajj Fuleihan, Ali Chehab

    Published 2025-07-01
    “…In this study, we developed machine learning (ML) algorithms to estimate 30-day mortality risk post-hip fracture surgery in the elderly using data from the National Surgical Quality Improvement Program (NSQIP 2012–2017, n = 62,492 patients). …”
    Get full text
    Article