Showing 741 - 760 results of 1,978 for search 'since algorithm', query time: 0.10s Refine Results
  1. 741

    MATERIALITY LEVEL ACCOUNTING UNDER BUSINESS REPUTATION ASSESSMENT BY FUTURE DISCOUNT CASHFLOW TECHNIQUE by Natalia Anatolyevna Anikina, Lyudmila Veniaminovna Myasoyedova

    Published 2013-09-01
    “…The described algorithm of the business reputation valuation by the future discount cashflow (DCF) technique allows the justified investment decision-making. …”
    Get full text
    Article
  2. 742

    5-pass zero-knowledge identity authentication scheme based on matrix completion problem by Houzhen WANG, Xinwei CAI, Yan GUO, Huanguo ZHANG

    Published 2021-11-01
    “…To solve the problem that most identity authentication schemes are vulnerable to quantum-computing attacks and low efficiency, a new 5-pass zero-knowledge identity authentication scheme was designed based on the matrix completion problem (MCP).Since the MCP is NP-complete, the proposed scheme has the potential to avoid quantum-computing attacks.Compared with the existing similar protocols, the proposed scheme reduced the fraud probability from 2/3 to 1/2 by adding a single round of interaction, and had the advantages of easy implementation and small key size.Moreover, based on the proposed zero-knowledge authentication scheme and Fiat-Shamir standard transformation method, a secure and efficient digital signature algorithm against quantum-computing can be obtained.…”
    Get full text
    Article
  3. 743

    DOA Estimation of Noncircular Signals Using Quaternions by Tianzhen Meng, Minjie Wu, Naichang Yuan

    Published 2017-01-01
    “…Simulation results are presented verifying the efficacy of the algorithm.…”
    Get full text
    Article
  4. 744

    Online Discrete Anchor Graph Hashing for Mobile Person Re-Identification by Liang Xie, Xi Fang

    Published 2021-01-01
    “…In ODAGH, we propose an online discrete optimization algorithm to improve the efficiency of anchor graph learning in the online scenario. …”
    Get full text
    Article
  5. 745

    OPTIMIZATION PROBLEM FOR NUMBER OF LOGIC GATES NEEDED TO IMPLEMENT MULTIPLE BOOLEAN FUNCTIONS USING DECODER by M. Onai, H. Skopyk

    Published 2024-10-01
    “…Among them, the greedy algorithm is chosen for its simplicity in program implementation. …”
    Get full text
    Article
  6. 746

    Optimizing TCP Performance in Multi-AP Residential Broadband Connections via Minislot Access by Domenico Giustiniano, Eduard Goma, Alberto Lopez Toledo, George Athanasiou

    Published 2013-01-01
    “…We finally show that the throughput achieved by our algorithm is very close to the theoretical upper bound in key simulation scenarios.…”
    Get full text
    Article
  7. 747

    Observability-Based Gaussian Sum Cubature Kalman Filter for Three-Dimensional Target Tracking Using a Single Two-Dimensional Radar by Haonan Jiang, Yingjie Zhang, Xiaotong Wang, Yuanli Cai

    Published 2024-11-01
    “…Finally, the effectiveness of the presented filtering algorithm is validated through lots of simulation experiments.…”
    Get full text
    Article
  8. 748

    Annealing-inspired training of an optical neural network with ternary weights by Anas Skalli, Mirko Goldmann, Nasibeh Haghighi, Stephan Reitzenstein, James A. Lott, Daniel Brunner

    Published 2025-02-01
    “…To fully leverage ANNs, optimization algorithms must account for hardware limitations and imperfections. …”
    Get full text
    Article
  9. 749

    Novel Hybrid Function Operational Matrices of Fractional Integration: An Application for Solving Multi-Order Fractional Differential Equations by Seshu Kumar Damarla, Madhusree Kundu

    Published 2025-05-01
    “…Although fractional calculus has evolved significantly since its origin in the 1695 correspondence between Leibniz and L’Hôpital, the numerical treatment of multi-order fractional differential equations remains a challenge. …”
    Get full text
    Article
  10. 750

    Application of Wavelet in Quantitative Evaluation of Gait Events of Parkinson’s Disease by Noore Zahra

    Published 2021-01-01
    “…Paroxysmal dyskinesia (commonly termed as freezing of gait) is one of the extreme cases of motor blocks. Since the last two decades, automated methods for monitoring motor activities, their data analysis, and algorithm techniques have been subjects of research for Parkinson’s disease (PD). …”
    Get full text
    Article
  11. 751

    The Principles of Examination of Patients with Detected Melanoma Suspected Skin Neoplasm in the Primary Health Care Stage by V. N. Larina, T. A. Gaydina, A. S. Dvornikov, K. E. Nazimkin

    Published 2022-03-01
    “…The significance of the criteria of the ABCDE algorithm, the “Argenziano” algorithm in the study of pigmented skin lesions with further analysis of the results by artificial intelligence for decision-making is discussed.…”
    Get full text
    Article
  12. 752

    An efficient binary Harris hawks optimization based on logical operators for wind turbine layout according to various wind scenarios by Ayşe Beşkirli

    Published 2025-06-01
    “…However, since the wind turbine layout problem is binary, the HHO algorithm is adapted to binary with logic operators. …”
    Get full text
    Article
  13. 753

    Probabilistic Entropy EMD Thresholding for Periodic Fault Signal Enhancement in Rotating Machine by Jian Dang, Rong Jia, Hua Wu, Xingqi Luo, Diyi Chen

    Published 2017-01-01
    “…Since the slight fault feature of incipient fault is usually polluted by heavy background noise, it is difficult to extract the weak feature signal in rotating machine. …”
    Get full text
    Article
  14. 754

    A Distributed Energy Optimized Routing Using Virtual Potential Field in Wireless Sensor Networks by Haifeng Jiang, Yanjing Sun, Renke Sun, Wei Chen, Shanshan Ma, Jing Gao

    Published 2014-07-01
    “…Energy is an extremely critical resource for battery-powered wireless sensor networks. Since data transmission typically consumes more energy than any other activities on a sensor node, it is of great importance to design energy optimized routing algorithm to achieve both energy efficiency and energy balance together, in order to prolong the network lifetime. …”
    Get full text
    Article
  15. 755

    An improved and advanced method for dehazing coal mine dust images by Pingping Cao, Xianchao Wang, Linguo Li, Mingjun Liu, Mengting Wang

    Published 2025-04-01
    “…Extensive experimental results on the ground, underwater, sand and dust images and real coal mine images show that our method outperforms state-of-the-art coal mine dust image defogging algorithms and has good generality.…”
    Get full text
    Article
  16. 756

    Polarimetric Channel Imbalance Evaluation of GF-3 SAR Products by Bragg-Like Targets by Hanglan Guo, Xingjie Zhao, Xiuqing Liu, Weidong Yu

    Published 2024-01-01
    “…In this article, we proposed an improved algorithm based on zero helix component of Bragg-like targets. …”
    Get full text
    Article
  17. 757

    Automatic Fall Risk Detection Based on Imbalanced Data by Yen-Hung Liu, Patrick C. K. Hung, Farkhund Iqbal, Benjamin C. M. Fung

    Published 2021-01-01
    “…We assess not only different imbalanced data handling methods but also different machine learning algorithms. After oversampling on our training data, the K-Nearest Neighbors (KNN) algorithm achieves the best performance. …”
    Get full text
    Article
  18. 758

    Eye Movement Tracking Using Opencv Python by mohammed satar, Basim Alshammari, Hayder Jasim

    Published 2023-08-01
    “…For this reason, open-source libraries like OpenCV enable high-level programming to implement reliable and accurate detection algorithms like Haar Cascade. Since everything is processed in real-time, payment must be made quickly. …”
    Get full text
    Article
  19. 759

    Determination of Optimal Parameters of the Ground Filling During the Laying of Power Cable Lines by M. E. Vysotski

    Published 2025-04-01
    “…To solve the optimization problem, a genetic algorithm implemented in the MS Excel environment was used. …”
    Get full text
    Article
  20. 760

    Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments by Faeiz Alserhani

    Published 2024-12-01
    “…User selection is accomplished through robust Deep Reinforcement Learning with the Tabu Search (DRL-TS) algorithm, while channel selection is optimized through rigorous training employing Proximal Policy Optimization (PPO). …”
    Get full text
    Article