-
721
LTL-Specification of Counter Machines
Published 2021-03-01“…It is known that any algorithm (hypothetically) can be implemented in the form of a Minsky three-counter machine.…”
Get full text
Article -
722
Using Time Clusters for Following Users’ Shifts in Rating Practices
Published 2017-12-01“…The proposed algorithm incorporates the aforementioned concept and is able to follow more successfully shifts in users’ rating practices. …”
Get full text
Article -
723
Distributed Multi-Energy Trading in Energy Internet: An Aggregative Game Approach
Published 2025-01-01“…Aiming at this problem, an aggregation game among WEs is proposed for two-way multi-energy trading, and a distributed algorithm is designed to solve the Nash equilibrium. …”
Get full text
Article -
724
X-FuseRLSTM: A Cross-Domain Explainable Intrusion Detection Framework in IoT Using the Attention-Guided Dual-Path Feature Fusion and Residual LSTM
Published 2025-06-01“…For cross-domain intrusion detection, this paper proposes a novel algorithm, X-FuseRLSTM, a dual-path feature fusion framework that is attention guided and coupled with a residual LSTM architecture. …”
Get full text
Article -
725
Application of the Variable Precision Rough Sets Model to Estimate the Outlier Probability of Each Element
Published 2018-01-01“…The experiments conducted demonstrate the feasibility of the proposed algorithm, whose usefulness is contextualised by comparison to different algorithms analysed in the literature.…”
Get full text
Article -
726
Using a Machine Learning Approach to Predict the Thailand Underground Train’s Passenger
Published 2022-01-01“…Analysis approaches included the analysis phase, classification, and regression algorithm. However, the regression algorithm’s accuracy is poor and therefore cannot be used. …”
Get full text
Article -
727
Deep reinforcement learning based resource provisioning for federated edge learning
Published 2025-06-01“…The MFLD algorithm leverages Deep Reinforcement Learning (DRL) techniques to automatically select UEs and allocate the computation resources according to the task requirement. …”
Get full text
Article -
728
Minimization Electric Losses in Transistor DC Drives
Published 2022-11-01“…This work is devoted to develop the algorithm for determining the optimal switching frequency of a transistor pulse-width converter (PWM) to minimize the total electric losses in a DC drive. …”
Get full text
Article -
729
AIMP-Based Power Allocation for Radar Network Tracking Under Countermeasures Environment
Published 2025-05-01“…Next, the target RCS prediction algorithm is introduced, and the AIMP power allocation method is proposed jointly considering the electronic jamming and the impact of the target RCS. …”
Get full text
Article -
730
Gas adsorption meets geometric deep learning: points, set and match
Published 2024-11-01“…These are typically built in a descriptor-based manner, meaning that the structure must be first coarse-grained into a 1D fingerprint before it is fed to the ML algorithm. As such, the latter can not fully exploit the 3D structural information, potentially resulting in a model of lower quality. …”
Get full text
Article -
731
Reducing the resources required by ADAPT-VQE using coupled exchange operators and improved subroutines
Published 2025-05-01“…Since the inception of the first such algorithm, the Adaptive Derivative-Assembled Problem-Tailored Variational Quantum Eigensolver (ADAPT-VQE), many improvements have appeared in the literature. …”
Get full text
Article -
732
Cooperative Spectrum Sensing for Cognitive Heterogeneous Networking Using Iterative Gauss-Seidel Process
Published 2015-12-01“…Then, a discrete iterative algorithm based on Gauss-Seidel process is applied to optimize the local cognitive user decision rules under a fixed fusion rule. …”
Get full text
Article -
733
A Filled Function Method Dominated by Filter for Nonlinearly Global Optimization
Published 2015-01-01“…Filled function method is one of the effective methods for nonlinear global optimization, since it can effectively find a better minimizer. …”
Get full text
Article -
734
Particle filtering based semi-blind estimation for MIMO-OFDM time-varying channel
Published 2007-01-01“…A semi-blind channel estimation method based on the particle filtering was proposed for the MIMO-OFDM wireless communication system.By optimizing the particles distribution locally,the traditional particle filtering algorithm was modified,and a local optimized particle filtering was proposed.This local optimized particle filtering can achieve the low MSE,and improve the precision of the MIMO-OFDM time-varying channel estimation.Since this method was per-formed in frequency domain,it was not necessary to know(or estimate) the length of the channel.Compared with exist-ing approaches,the proposed method was more robust to the non-gauss distribution noise and the detection performance is nearly optimal.The simulation results show the effectiveness of the proposed method.…”
Get full text
Article -
735
Breaking novel and lightweight digital <sub>s</sub> ignature scheme
Published 2013-07-01“…The signature schemes based on RSA and ECC do not seem suitable for special application area such as wire-less sensor network, smart card and wireless RFID since they suffer from low computing efficiency. …”
Get full text
Article -
736
A Kalman Framework Based Mobile Node Localization in Rough Environment Using Wireless Sensor Network
Published 2015-05-01“…Since the wireless sensor network (WSN) has the performance of sensing, processing, and communicating, it has been widely used in various environments. …”
Get full text
Article -
737
5-pass zero-knowledge identity authentication scheme based on matrix completion problem
Published 2021-11-01“…To solve the problem that most identity authentication schemes are vulnerable to quantum-computing attacks and low efficiency, a new 5-pass zero-knowledge identity authentication scheme was designed based on the matrix completion problem (MCP).Since the MCP is NP-complete, the proposed scheme has the potential to avoid quantum-computing attacks.Compared with the existing similar protocols, the proposed scheme reduced the fraud probability from 2/3 to 1/2 by adding a single round of interaction, and had the advantages of easy implementation and small key size.Moreover, based on the proposed zero-knowledge authentication scheme and Fiat-Shamir standard transformation method, a secure and efficient digital signature algorithm against quantum-computing can be obtained.…”
Get full text
Article -
738
Wallenberg–Zakharchenko syndrome in vascular neurology emergency care: A review
Published 2024-12-01“…In conclusion, a diagnostic algorithm that can be used in everyday practice is given.…”
Get full text
Article -
739
Finding N bits using O(N/Log(N)) sums
Published 2023-09-01“…We will show a technique which enables finding the values of $N$ bits using $O(\frac{N}{\log N})$ subsequence-sum queries. The algorithm consists of two phases: Constructing the queries for each layer and using the queries for a particular layer to get the value of every bit. …”
Get full text
Article -
740
A mobile sensing method to counteract social media website impersonation
Published 2016-10-01“…However, the phishers make the unnoticed changes to fool the similarity algorithms as well. In this article, we propose an efficient phishing website detection algorithm using three-step checking. …”
Get full text
Article