Showing 721 - 740 results of 1,978 for search 'since algorithm', query time: 0.09s Refine Results
  1. 721

    LTL-Specification of Counter Machines by Egor V. Kuzmin

    Published 2021-03-01
    “…It is known that any algorithm (hypothetically) can be implemented in the form of a Minsky three-counter machine.…”
    Get full text
    Article
  2. 722

    Using Time Clusters for Following Users’ Shifts in Rating Practices by Dionisis Margaris, Costas Vassilakis

    Published 2017-12-01
    “…The proposed algorithm incorporates the aforementioned concept and is able to follow more successfully shifts in users’ rating practices. …”
    Get full text
    Article
  3. 723

    Distributed Multi-Energy Trading in Energy Internet: An Aggregative Game Approach by Jingwei Hu, Enhui An, Qiuye Sun, Bonan Huang

    Published 2025-01-01
    “…Aiming at this problem, an aggregation game among WEs is proposed for two-way multi-energy trading, and a distributed algorithm is designed to solve the Nash equilibrium. …”
    Get full text
    Article
  4. 724

    X-FuseRLSTM: A Cross-Domain Explainable Intrusion Detection Framework in IoT Using the Attention-Guided Dual-Path Feature Fusion and Residual LSTM by Adel Alabbadi, Fuad Bajaber

    Published 2025-06-01
    “…For cross-domain intrusion detection, this paper proposes a novel algorithm, X-FuseRLSTM, a dual-path feature fusion framework that is attention guided and coupled with a residual LSTM architecture. …”
    Get full text
    Article
  5. 725

    Application of the Variable Precision Rough Sets Model to Estimate the Outlier Probability of Each Element by Francisco Maciá Pérez, Jose Vicente Berna Martienz, Alberto Fernández Oliva, Miguel Abreu Ortega

    Published 2018-01-01
    “…The experiments conducted demonstrate the feasibility of the proposed algorithm, whose usefulness is contextualised by comparison to different algorithms analysed in the literature.…”
    Get full text
    Article
  6. 726

    Using a Machine Learning Approach to Predict the Thailand Underground Train’s Passenger by Wuttipong Kusonkhum, Korb Srinavin, Narong Leungbootnak, Tanayut Chaitongrat

    Published 2022-01-01
    “…Analysis approaches included the analysis phase, classification, and regression algorithm. However, the regression algorithm’s accuracy is poor and therefore cannot be used. …”
    Get full text
    Article
  7. 727

    Deep reinforcement learning based resource provisioning for federated edge learning by Xingyun Chen, Junjie Pang, Tonghui Sun

    Published 2025-06-01
    “…The MFLD algorithm leverages Deep Reinforcement Learning (DRL) techniques to automatically select UEs and allocate the computation resources according to the task requirement. …”
    Get full text
    Article
  8. 728

    Minimization Electric Losses in Transistor DC Drives by Kovalov V., Kovalova Yu.

    Published 2022-11-01
    “…This work is devoted to develop the algorithm for determining the optimal switching frequency of a transistor pulse-width converter (PWM) to minimize the total electric losses in a DC drive. …”
    Get full text
    Article
  9. 729

    AIMP-Based Power Allocation for Radar Network Tracking Under Countermeasures Environment by Xiaoyou Xing, Longxiao Xu, Lvwan Nie, Xueting Li

    Published 2025-05-01
    “…Next, the target RCS prediction algorithm is introduced, and the AIMP power allocation method is proposed jointly considering the electronic jamming and the impact of the target RCS. …”
    Get full text
    Article
  10. 730

    Gas adsorption meets geometric deep learning: points, set and match by Antonios P. Sarikas, Konstantinos Gkagkas, George E. Froudakis

    Published 2024-11-01
    “…These are typically built in a descriptor-based manner, meaning that the structure must be first coarse-grained into a 1D fingerprint before it is fed to the ML algorithm. As such, the latter can not fully exploit the 3D structural information, potentially resulting in a model of lower quality. …”
    Get full text
    Article
  11. 731

    Reducing the resources required by ADAPT-VQE using coupled exchange operators and improved subroutines by Mafalda Ramôa, Panagiotis G. Anastasiou, Luis Paulo Santos, Nicholas J. Mayhall, Edwin Barnes, Sophia E. Economou

    Published 2025-05-01
    “…Since the inception of the first such algorithm, the Adaptive Derivative-Assembled Problem-Tailored Variational Quantum Eigensolver (ADAPT-VQE), many improvements have appeared in the literature. …”
    Get full text
    Article
  12. 732

    Cooperative Spectrum Sensing for Cognitive Heterogeneous Networking Using Iterative Gauss-Seidel Process by Haleh Hosseini, Kaamran Raahemifar, Sharifah Kamilah Syed Yusof, Alagan Anpalagan

    Published 2015-12-01
    “…Then, a discrete iterative algorithm based on Gauss-Seidel process is applied to optimize the local cognitive user decision rules under a fixed fusion rule. …”
    Get full text
    Article
  13. 733

    A Filled Function Method Dominated by Filter for Nonlinearly Global Optimization by Wei Wang, Xiaoshan Zhang, Min Li

    Published 2015-01-01
    “…Filled function method is one of the effective methods for nonlinear global optimization, since it can effectively find a better minimizer. …”
    Get full text
    Article
  14. 734

    Particle filtering based semi-blind estimation for MIMO-OFDM time-varying channel by JING Yuan, YIN Fu-liang, ZENG Shuo

    Published 2007-01-01
    “…A semi-blind channel estimation method based on the particle filtering was proposed for the MIMO-OFDM wireless communication system.By optimizing the particles distribution locally,the traditional particle filtering algorithm was modified,and a local optimized particle filtering was proposed.This local optimized particle filtering can achieve the low MSE,and improve the precision of the MIMO-OFDM time-varying channel estimation.Since this method was per-formed in frequency domain,it was not necessary to know(or estimate) the length of the channel.Compared with exist-ing approaches,the proposed method was more robust to the non-gauss distribution noise and the detection performance is nearly optimal.The simulation results show the effectiveness of the proposed method.…”
    Get full text
    Article
  15. 735

    Breaking novel and lightweight digital <sub>s</sub> ignature scheme by Chun-sheng GU

    Published 2013-07-01
    “…The signature schemes based on RSA and ECC do not seem suitable for special application area such as wire-less sensor network, smart card and wireless RFID since they suffer from low computing efficiency. …”
    Get full text
    Article
  16. 736

    A Kalman Framework Based Mobile Node Localization in Rough Environment Using Wireless Sensor Network by Hao Chu, Cheng-dong Wu

    Published 2015-05-01
    “…Since the wireless sensor network (WSN) has the performance of sensing, processing, and communicating, it has been widely used in various environments. …”
    Get full text
    Article
  17. 737

    5-pass zero-knowledge identity authentication scheme based on matrix completion problem by Houzhen WANG, Xinwei CAI, Yan GUO, Huanguo ZHANG

    Published 2021-11-01
    “…To solve the problem that most identity authentication schemes are vulnerable to quantum-computing attacks and low efficiency, a new 5-pass zero-knowledge identity authentication scheme was designed based on the matrix completion problem (MCP).Since the MCP is NP-complete, the proposed scheme has the potential to avoid quantum-computing attacks.Compared with the existing similar protocols, the proposed scheme reduced the fraud probability from 2/3 to 1/2 by adding a single round of interaction, and had the advantages of easy implementation and small key size.Moreover, based on the proposed zero-knowledge authentication scheme and Fiat-Shamir standard transformation method, a secure and efficient digital signature algorithm against quantum-computing can be obtained.…”
    Get full text
    Article
  18. 738

    Wallenberg–Zakharchenko syndrome in vascular neurology emergency care: A review by Aleksey A. Kulesh, Dmitry A. Demin

    Published 2024-12-01
    “…In conclusion, a diagnostic algorithm that can be used in everyday practice is given.…”
    Get full text
    Article
  19. 739

    Finding N bits using O(N/Log(N)) sums by Sergiu Corlat, Veaceslav Guzun, Victor Vorona

    Published 2023-09-01
    “…We will show a technique which enables finding the values of $N$ bits using $O(\frac{N}{\log N})$ subsequence-sum queries. The algorithm consists of two phases: Constructing the queries for each layer and using the queries for a particular layer to get the value of every bit. …”
    Get full text
    Article
  20. 740

    A mobile sensing method to counteract social media website impersonation by Mohamed Y ELMassry, Ahmad S AlMogren

    Published 2016-10-01
    “…However, the phishers make the unnoticed changes to fool the similarity algorithms as well. In this article, we propose an efficient phishing website detection algorithm using three-step checking. …”
    Get full text
    Article