-
741
MATERIALITY LEVEL ACCOUNTING UNDER BUSINESS REPUTATION ASSESSMENT BY FUTURE DISCOUNT CASHFLOW TECHNIQUE
Published 2013-09-01“…The described algorithm of the business reputation valuation by the future discount cashflow (DCF) technique allows the justified investment decision-making. …”
Get full text
Article -
742
5-pass zero-knowledge identity authentication scheme based on matrix completion problem
Published 2021-11-01“…To solve the problem that most identity authentication schemes are vulnerable to quantum-computing attacks and low efficiency, a new 5-pass zero-knowledge identity authentication scheme was designed based on the matrix completion problem (MCP).Since the MCP is NP-complete, the proposed scheme has the potential to avoid quantum-computing attacks.Compared with the existing similar protocols, the proposed scheme reduced the fraud probability from 2/3 to 1/2 by adding a single round of interaction, and had the advantages of easy implementation and small key size.Moreover, based on the proposed zero-knowledge authentication scheme and Fiat-Shamir standard transformation method, a secure and efficient digital signature algorithm against quantum-computing can be obtained.…”
Get full text
Article -
743
DOA Estimation of Noncircular Signals Using Quaternions
Published 2017-01-01“…Simulation results are presented verifying the efficacy of the algorithm.…”
Get full text
Article -
744
Online Discrete Anchor Graph Hashing for Mobile Person Re-Identification
Published 2021-01-01“…In ODAGH, we propose an online discrete optimization algorithm to improve the efficiency of anchor graph learning in the online scenario. …”
Get full text
Article -
745
OPTIMIZATION PROBLEM FOR NUMBER OF LOGIC GATES NEEDED TO IMPLEMENT MULTIPLE BOOLEAN FUNCTIONS USING DECODER
Published 2024-10-01“…Among them, the greedy algorithm is chosen for its simplicity in program implementation. …”
Get full text
Article -
746
Optimizing TCP Performance in Multi-AP Residential Broadband Connections via Minislot Access
Published 2013-01-01“…We finally show that the throughput achieved by our algorithm is very close to the theoretical upper bound in key simulation scenarios.…”
Get full text
Article -
747
Observability-Based Gaussian Sum Cubature Kalman Filter for Three-Dimensional Target Tracking Using a Single Two-Dimensional Radar
Published 2024-11-01“…Finally, the effectiveness of the presented filtering algorithm is validated through lots of simulation experiments.…”
Get full text
Article -
748
Annealing-inspired training of an optical neural network with ternary weights
Published 2025-02-01“…To fully leverage ANNs, optimization algorithms must account for hardware limitations and imperfections. …”
Get full text
Article -
749
Novel Hybrid Function Operational Matrices of Fractional Integration: An Application for Solving Multi-Order Fractional Differential Equations
Published 2025-05-01“…Although fractional calculus has evolved significantly since its origin in the 1695 correspondence between Leibniz and L’Hôpital, the numerical treatment of multi-order fractional differential equations remains a challenge. …”
Get full text
Article -
750
Application of Wavelet in Quantitative Evaluation of Gait Events of Parkinson’s Disease
Published 2021-01-01“…Paroxysmal dyskinesia (commonly termed as freezing of gait) is one of the extreme cases of motor blocks. Since the last two decades, automated methods for monitoring motor activities, their data analysis, and algorithm techniques have been subjects of research for Parkinson’s disease (PD). …”
Get full text
Article -
751
The Principles of Examination of Patients with Detected Melanoma Suspected Skin Neoplasm in the Primary Health Care Stage
Published 2022-03-01“…The significance of the criteria of the ABCDE algorithm, the “Argenziano” algorithm in the study of pigmented skin lesions with further analysis of the results by artificial intelligence for decision-making is discussed.…”
Get full text
Article -
752
An efficient binary Harris hawks optimization based on logical operators for wind turbine layout according to various wind scenarios
Published 2025-06-01“…However, since the wind turbine layout problem is binary, the HHO algorithm is adapted to binary with logic operators. …”
Get full text
Article -
753
Probabilistic Entropy EMD Thresholding for Periodic Fault Signal Enhancement in Rotating Machine
Published 2017-01-01“…Since the slight fault feature of incipient fault is usually polluted by heavy background noise, it is difficult to extract the weak feature signal in rotating machine. …”
Get full text
Article -
754
A Distributed Energy Optimized Routing Using Virtual Potential Field in Wireless Sensor Networks
Published 2014-07-01“…Energy is an extremely critical resource for battery-powered wireless sensor networks. Since data transmission typically consumes more energy than any other activities on a sensor node, it is of great importance to design energy optimized routing algorithm to achieve both energy efficiency and energy balance together, in order to prolong the network lifetime. …”
Get full text
Article -
755
An improved and advanced method for dehazing coal mine dust images
Published 2025-04-01“…Extensive experimental results on the ground, underwater, sand and dust images and real coal mine images show that our method outperforms state-of-the-art coal mine dust image defogging algorithms and has good generality.…”
Get full text
Article -
756
Polarimetric Channel Imbalance Evaluation of GF-3 SAR Products by Bragg-Like Targets
Published 2024-01-01“…In this article, we proposed an improved algorithm based on zero helix component of Bragg-like targets. …”
Get full text
Article -
757
Automatic Fall Risk Detection Based on Imbalanced Data
Published 2021-01-01“…We assess not only different imbalanced data handling methods but also different machine learning algorithms. After oversampling on our training data, the K-Nearest Neighbors (KNN) algorithm achieves the best performance. …”
Get full text
Article -
758
Eye Movement Tracking Using Opencv Python
Published 2023-08-01“…For this reason, open-source libraries like OpenCV enable high-level programming to implement reliable and accurate detection algorithms like Haar Cascade. Since everything is processed in real-time, payment must be made quickly. …”
Get full text
Article -
759
Determination of Optimal Parameters of the Ground Filling During the Laying of Power Cable Lines
Published 2025-04-01“…To solve the optimization problem, a genetic algorithm implemented in the MS Excel environment was used. …”
Get full text
Article -
760
Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments
Published 2024-12-01“…User selection is accomplished through robust Deep Reinforcement Learning with the Tabu Search (DRL-TS) algorithm, while channel selection is optimized through rigorous training employing Proximal Policy Optimization (PPO). …”
Get full text
Article