Showing 6,621 - 6,640 results of 8,683 for search 'optimal computing algorithms', query time: 0.13s Refine Results
  1. 6621
  2. 6622

    Post-Quantum Cryptographic Frameworks for Internet of Things (IoT) and Internet of Medical Things (IoMT) Authentication Systems by Thomas L Barna, Samson Isaac, Christopher Habu, Saratu Habu, Abimbola A Joseph

    Published 2025-06-01
    “…The rapid advancement of quantum computing threatens the security of classical cryptographic algorithms widely used in Internet of Things (IoT) and Internet of Medical Things (IoMT) systems. …”
    Get full text
    Article
  3. 6623
  4. 6624
  5. 6625

    Downscaling of ERA5 reanalysis land surface temperature based on attention mechanism and Google Earth Engine by Shiyu Li, Hong Wan, Qun Yu, Xinyuan Wang

    Published 2025-01-01
    “…In addition, the Bayesian global optimization algorithm is used to select the optimal hyperparameters of the network in order to enhance the predictive performance of the model. …”
    Get full text
    Article
  6. 6626

    Resource allocation for coexistence of eMBB and bursty URLLC based on queueing with preemption by Wei Guo, Kai Liang, Yuewen Song, Xiaoli Chu, Gan Zheng, Kai-Kit Wong

    Published 2025-05-01
    “…Based on this analysis, we formulate a mixed-integer nonlinear programming problem to minimize the average delay of URLLC packets while satisfying the average delay and throughput requirements of eMBB by jointly optimizing the eMBB subcarrier allocation, the URLLC subcarrier scheduling and the computing resource allocation. …”
    Get full text
    Article
  7. 6627

    Evaluating Sparse Feature Selection Methods: A Theoretical and Empirical Perspective by Monica Fira, Liviu Goras, Hariton-Nicolae Costin

    Published 2025-03-01
    “…Although more accurate, embedded methods are slower and depend on the chosen algorithm. Although less comprehensive than wrapper methods, they offer a strong trade-off between speed and performance when computational resources allow for it.…”
    Get full text
    Article
  8. 6628

    An Efficient Privacy-preserving Deep Learning Scheme for Medical Image Analysis by J. Andrew Onesimu, J Karthikeyan

    Published 2020-12-01
    “…MpLe provides sturdy security and privacy with optimal computational overhead. The proposed scheme is experimented using VGG-16 network on CIFAR dataset. …”
    Get full text
    Article
  9. 6629

    SATELLITE ALTIMETER DATA FILTERING AND SMOOTHING IN THE COURSE OF GROUND-BASED RETRACKING by D. S. Borovitsky, A. E. Zhesterev, V. P. Ipatov, R. M. Mamchur

    Published 2019-04-01
    “…However, at the stage of ground-based retracking it seems more appropriate to use the Kalman filter, which possesses a number of theoretical optimal features and is efficient as for utilization of the available computational resource.Results and conclusions. …”
    Get full text
    Article
  10. 6630
  11. 6631
  12. 6632
  13. 6633

    Data-driven decoding of quantum error correcting codes using graph neural networks by Moritz Lange, Pontus Havström, Basudha Srivastava, Isak Bengtsson, Valdemar Bergentall, Karl Hammar, Olivia Heuts, Evert van Nieuwenburg, Mats Granath

    Published 2025-05-01
    “…Accurate, maximum likelihood, decoders are computationally very expensive whereas decoders based on more efficient algorithms give sub-optimal performance. …”
    Get full text
    Article
  14. 6634

    基于遗传算法的RPRPR五杆机构实现轨迹综合与分析 by 杨金堂, 孔建益, 熊禾根, 蒋国璋, 李公法, 廖汉元

    Published 2006-01-01
    “…On the basis of the basic theory of five-bar mechanism and the theory of triangle stability,the RPRPR five-bar mechanism realizing accurately "the given tracks at random" is put forward in this paper.The optimization model of five-bar mechanism realizing accurately "the given tracks at random" is built.Then the numeric computing methods of compensation speed,acceleration and rotational speed,acceleration are analyzed and genetic algorithm is adopted to get the solution to optimization model.The instances indicate that the mechanism and the computing methods are correct.…”
    Get full text
    Article
  15. 6635
  16. 6636

    Improved Remote Photoplethysmography Using Machine Learning-Based Filter Bank by Jukyung Lee, Hyosung Joo, Jihwan Woo

    Published 2024-11-01
    “…In this study, we propose a machine learning-based filter bank (MLFB) noise reduction algorithm to improve the quality of rPPG signals. The MLFB algorithm determines the optimal spectral band for extracting information on cardiovascular activity and reconstructing an rPPG signal using a support vector machine. …”
    Get full text
    Article
  17. 6637

    Edge Server Placement and Task Allocation for Maximum Delay Reduction by Koki Shibata, Sumiko Miyata

    Published 2025-01-01
    “…Our method uses a genetic algorithm to optimize server utilization and the distance between users and servers. …”
    Get full text
    Article
  18. 6638

    Leveraging public cloud infrastructure for real-time connected vehicle speed advisory at a signalized corridor by Hsien-Wen Deng, M Sabbir Salek, Mizanur Rahman, Mashrur Chowdhury, Mitch Shue, Amy W. Apon

    Published 2025-03-01
    “…Second, we developed an optimization-based real-time CV speed advisory algorithm by taking a modular design approach, which makes the application automatically scalable and deployable in the cloud using the serverless architecture. …”
    Get full text
    Article
  19. 6639

    Node Placement Analysis for Overlay Networks in IoT Applications by Yuxin Wan, Junwei Cao, Kang He, Huaying Zhang, Peng Yu, Senjing Yao, Keqin Li

    Published 2014-03-01
    “…The proposed local search algorithm is evaluated by both time and efficiency where efficiency refers to the degree of approximation of algorithm results with optimal solutions. …”
    Get full text
    Article
  20. 6640

    An Effective Network Intrusion Detection System Using Recursive Feature Elimination Technique by Narendra Singh Yadav, Vijay Prakash Sharma, D. Sikha Datta Reddy, Saswati Mishra

    Published 2023-12-01
    “…This is achieved through the use of Recursive Feature Elimination (RFE). In RFE, the algorithm is run recursively until a selected number of features are identified to enhance efficiency and reduce computational cost. …”
    Get full text
    Article