Showing 7,061 - 7,080 results of 8,683 for search 'optimal computing algorithms', query time: 0.21s Refine Results
  1. 7061

    Evaluation criteria of centralization options in the architecture of multicomputer systems with traps and baits by Antonina Kashtalian, Sergii Lysenko, Anatoliy Sachenko, Bohdan Savenko, Oleg Savenko, Andrii Nicheporuk

    Published 2025-02-01
    “…Significant deviations in specific time intervals are addressed to achieve optimal centralization options.…”
    Get full text
    Article
  2. 7062
  3. 7063

    Resource Allocation and Interference Coordination Strategies in Heterogeneous Dual-Layer Satellite Networks by Jinhong Li, Rong Chai, Tianyi Zhou, Chengchao Liang

    Published 2025-02-01
    “…We formulate a mathematical optimization problem to optimize resource allocation while minimizing co-channel interference and develop an ADMM-based distributed algorithm for efficient problem-solving. …”
    Get full text
    Article
  4. 7064

    Calibration and Uncertainty Analysis of Freundlich and Langmuir Isotherms Using the Markov Chain Monte Carlo (MCMC) Approach by Haniyeh Sharifi Moghadam, Saeed Alimohammadi

    Published 2024-10-01
    “…However, the Gibbs algorithm exhibited a higher convergence speed, making it suitable for scenarios where computational efficiency is a priority. …”
    Get full text
    Article
  5. 7065
  6. 7066

    Results of transgastric drainage of fluid collections and postnecrotic pancreas cysts in patients with acute pancreatitis by V. G. Lubyansky, V. V. Nasonov

    Published 2023-04-01
    “…Based on the analysis of the results of treatment of patients with postnecrotic pancreatic cysts and acute peripancreatic fluid collections, the data of multispiral computed tomography and endoscopic ultrasonography at the stages of cyst formation, options and optimal timing of endoscopic transgastric drainage were determined. …”
    Get full text
    Article
  7. 7067

    Verifiable outsourced attribute-based encryption with access update by Suqing LIN

    Published 2019-02-01
    “…In order to meet the secure and reliable access requirements for the encrypted data stored in the public cloud,a verifiable outsourced attribute-based encryption scheme with access update was proposed.Based on a standard KP-ABE scheme,verifiable outsourced decryption and verifiable access update for a ciphertext through novel constructions for the scheme were obtained.The verifiability of the outsourced computation ensures that the third-party service may perform algorithms honestly.The scheme has selective IND-CPA security for the original and updated ciphertexts,weak master private key security,and verification soundness in the standard model were proved,respectively.Compared with similar schemes from literatures,the proposed scheme can achieve tradeoff in the optimization of functionality,security and efficiency.…”
    Get full text
    Article
  8. 7068
  9. 7069

    Exploration of Energy-Saving Chilling Landscape Design Based on Algo for Group Intelligence by Zhuo Li

    Published 2022-01-01
    “…With the development of electronic computers, the previously unachievable optimization of engineering structures is now possible, while the traditional optimization methods cannot meet the requirements of modern computing due to the implementation constraints. …”
    Get full text
    Article
  10. 7070

    Ground truth clustering is not the optimum clustering by Lucia Absalom Bautista, Timotej Hrga, Janez Povh, Shudian Zhao

    Published 2025-03-01
    “…Despite being NP-hard, solvers exist that can compute optimal solutions for small to medium-sized datasets. …”
    Get full text
    Article
  11. 7071

    A lightweight lattice-based group signcryption authentication scheme for Internet of things by XU Chuan, AI Xinghao, WANG Shanshan, ZHAO Guofeng, HAN Zhenzhen

    Published 2024-04-01
    “…In the key generation stage, the improved trapdoor diagonal matrix was designed to optimize the original image sampling algorithm required for key generation and reduce the overall time required for generating a large number of keys. …”
    Get full text
    Article
  12. 7072

    Model Predictive Control of Nonlinear System Based on GA-RBP Neural Network and Improved Gradient Descent Method by Youming Wang, Didi Qing

    Published 2021-01-01
    “…A model predictive control (MPC) method based on recursive backpropagation (RBP) neural network and genetic algorithm (GA) is proposed for a class of nonlinear systems with time delays and uncertainties. …”
    Get full text
    Article
  13. 7073

    Does the COVID-19 pandemic affect the asset allocation performance? Evidence from a composite asset selection approach by Jung-Bin Su

    Published 2025-08-01
    “…The proposed approaches in this study can be embedded in a computer as an asset allocation algorithm of Robo-advisers.…”
    Get full text
    Article
  14. 7074

    Adaptive Path Planning for Multi-UAV Systems in Dynamic 3D Environments: A Multi-Objective Framework by Gregorius Airlangga, Ronald Sukwadi, Widodo Widjaja Basuki, Lai Ferry Sugianto, Oskar Ika Adi Nugroho, Yoel Kristian, Radyan Rahmananta

    Published 2024-12-01
    “…This study evaluates and compares the computational performance and practical applicability of advanced path planning algorithms for Unmanned Aerial Vehicles (UAVs) in dynamic and obstacle-rich environments. …”
    Get full text
    Article
  15. 7075

    Fast Nonparametric Inference of Network Backbones for Weighted Graph Sparsification by Alec Kirkley

    Published 2025-07-01
    “…We then construct an efficient and provably optimal greedy algorithm to identify the backbone minimizing our objectives, whose run-time complexity is log-linear in the number of edges. …”
    Get full text
    Article
  16. 7076

    A Secure Data Collection Method Based on Deep Reinforcement Learning and Lightweight Authentication by Yunlong Wang, Jie Zhang, Guangjie Han, Dugui Chen

    Published 2025-05-01
    “…To address such challenges, we propose a lightweight chain authentication protocol for scalable IoT environments (LCAP-SIoT), which uses Physical Unclonable Functions (PUFs) and distributed authentication to secure communications, and a secure data collection algorithm, named LS-QMIX, which fuses the LCAP-SIoT and Q-learning Mixer (QMIX) algorithm to optimize the path planning and cooperation efficiency of the multi-UAV system. …”
    Get full text
    Article
  17. 7077
  18. 7078
  19. 7079

    Single Machine Problem with Multi-Rate-Modifying Activities under a Time-Dependent Deterioration by M. Huang, Huaping Wu, Vincent Cho, W. H. Ip, Xingwei Wang, C. K. Ng

    Published 2013-01-01
    “…The computational experiments show that, for the situation with a rate-modifying activity, the proposed branch and bound algorithm can solve situations with 50 jobs within a reasonable time, and the heuristic algorithm can obtain the near-optimal solution with an error percentage less than 0.053 in a very short time. …”
    Get full text
    Article
  20. 7080

    Molecular subtype of recurrent implantation failure reveals distinct endometrial etiology of female infertility by Jing Yang, Lingtao Yang, Ying Zhou, Fengyang Cao, Hongkun Fang, Huan Ma, Jun Ren, Chunyu Huang, Lianghui Diao, Qiyuan Li, Qionghua Chen

    Published 2025-07-01
    “…A molecular classifier (MetaRIF) was developed using the optimal F-score from 64 combinations of machine learning algorithms. …”
    Get full text
    Article