Showing 881 - 900 results of 1,978 for search 'since algorithm', query time: 0.09s Refine Results
  1. 881

    Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications by Mohammad Kamrul Hasan, Shayla Islam, Rossilawati Sulaiman, Sheroz Khan, Aisha-Hassan Abdalla Hashim, Shabana Habib, Mohammad Islam, Saleh Alyahya, Musse Mohamed Ahmed, Samar Kamil, Md Arif Hassan

    Published 2021-01-01
    “…Numerous test images have been used to determine the performance of the proposed algorithm. Several experiments show that the proposed algorithm for image cryptosystems provides better efficiency than conventional techniques.…”
    Get full text
    Article
  2. 882

    Application-centric congestion control by Danny De Vleeschauwer, Chia-Yu Chang, Koen De Schepper, Chrysa Papagianni

    Published 2025-06-01
    “…Abstract Modern networked applications typically establish multiple connections to one or more servers to ensure that the virtual objects with which the user interacts are kept up to date. Since these connections usually share a common bottleneck, a congestion control algorithm is utilized to determine the throughput that can be sustained across each connection. …”
    Get full text
    Article
  3. 883

    Transparent Boundary Conditions for Finite Element Method-Based Parabolic Equation by Sungjin Ahn, Jongyoung Kim, Kyungil Kwon, Yongheui Cho, Young-Seek Chung

    Published 2025-07-01
    “…In this letter, a new TBC based on the matrix pencil method is proposed to suppress non-physical reflected waves. The proposed algorithm not only reduces the computational load, since it only needs to calculate up to the actual region of interest, but also shows that non-physical reflected waves at the boundary can also be effectively suppressed.…”
    Get full text
    Article
  4. 884

    HIV infection and cardiovascular pathology by T. A. Shekhovtsova, D. V. Duplyakov

    Published 2023-04-01
    “…It must be remembered that when using generally accepted algorithms and scales for assessing the risk of CVD, the real risk may remain underestimated in HIV-infected patients. …”
    Get full text
    Article
  5. 885

    METHODOLOGICAL APPROACH TO PRODUCTIVITY ASSESSMENT OF HYPOARCTIC SHRUBS ON THE TAIMYR PENINSULA by A. I. Bondarev, D. A. Mashukov

    Published 2025-06-01
    “…The authors present the algorithm for measuring and calculating the fractional composition of aboveground biomass and annual productivity using the index of biomass annual increment. …”
    Get full text
    Article
  6. 886

    Integration of Artificial Neural Network in a IEEE 5 BUS System by T. L. Makosso, A. Almaktoof, K. Abo-Al-Ez

    Published 2025-03-01
    “…In the context of Artificial Neural Networks (ANNs), the Levenberg-Marquardt (LM) algorithm is an extensively utilized optimization method. …”
    Get full text
    Article
  7. 887

    Mobile Robot Obstacle Avoidance Based on Neural Network with a Standardization Technique by Karoline Kamil A. Farag, Hussein Hamdy Shehata, Hesham M. El-Batsh

    Published 2021-01-01
    “…The adaption is related to the learning capacity since the network can consider and respond to new constraints and data related to the external environment.…”
    Get full text
    Article
  8. 888

    Dynamique du couvert végétal à la périphérie du Parc W du Burkina Faso by R. Noël Gansaonré, Benewindé J.-B. Zoungrana, P. Isidore Yanogo

    Published 2020-06-01
    “…This trend is mainly localized in the agropastoral zones, since 7.88% of these areas are located in fields.…”
    Get full text
    Article
  9. 889

    Security-driven service caching and computation offloading strategy in air-ground collaborative edge computing networks by WU Mengru, KONG Yawei, HAN Huimei, LU Haiquan, SI Peiyuan, LU Weidang, GUO Lei

    Published 2025-07-01
    “…Considering dual secrecy rate constraints and resource limitations suffered by a UAV server, UAV service caching, computation offloading decisions of ground devices, resource allocation, and UAV deployment were jointly optimized to minimize the task completion delay of ground devices. Since the formulated problem was a mixed-integer nonlinear programming problem that was difficult to solve, an effective bi-level optimization algorithm was developed based on alternating optimization and cross-entropy methods. …”
    Get full text
    Article
  10. 890
  11. 891

    EXPERIENCE OF TREATMENT FOR ACUTE ABDOMINAL DISEASES AND ABDOMINAL TRAUMA IN N.V. SKLIFOSOVSKY RESEARCH INSTITUTE FOR EMERGENCY MEDICINE by M. Sh. Khubutiya, P. A. Yartsev, A. A. Guliayev, V. D. Levitsky, I. I. Kirsanov, B. T. Tsuleiskiry

    Published 2016-03-01
    “…More than 5,000 emergency laparoscopy operations have been performed in our institute since 2000. Diagnostic and treatment algorithm for acute abdominal diseases and abdominal trauma has already been developed by now.…”
    Get full text
    Article
  12. 892

    Exact makespan minimization of unrelated parallel machines by Åblad, Edvin, Strömberg, Ann-Brith, Spensieri, Domenico

    Published 2021-05-01
    “…Our computational studies indicate that the proposed algorithm is competitive with state-of-the-art methods on different types of instances. …”
    Get full text
    Article
  13. 893

    Application of a Data-Driven Fuzzy Control Design to a Wind Turbine Benchmark Model by Silvio Simani

    Published 2012-01-01
    “…Accurate models should contain many degrees of freedom, and their control algorithm design must account for these complexities. …”
    Get full text
    Article
  14. 894

    Class-Based Weighted Fair Queuing Scheduling on Dual-Priority Delta Networks by D. C. Vasiliadis, G. E. Rizos, C. Vassilakis

    Published 2012-01-01
    “…In the presence of multiple priorities, a scheduling algorithm is employed to select each time the next packet to transmit over the data link. …”
    Get full text
    Article
  15. 895

    Single-Shot Imaging Without Reference Wave Using Binary Intensity Pattern for Optically-Secured-Based Correlation by Wen Chen

    Published 2016-01-01
    “…An additional security layer is established for the developed optical system, since optical verification is conducted based on optical encoding systems without direct observation of input information from the decoded images. …”
    Get full text
    Article
  16. 896

    Hybrid beamforming design for orthogonal frequency division multiplexing dual‐function radar‐communication system with optimised transmit beampattern by Weihuang Xiao, Ping Chu, Bin Liao

    Published 2022-09-01
    “…Finally, simulation results are demonstrated to verify the effectiveness of the proposed algorithm.…”
    Get full text
    Article
  17. 897

    Enhanced Multistage Differential Transform Method: Application to the Population Models by Younghae Do, Bongsoo Jang

    Published 2012-01-01
    “…We present an efficient computational algorithm, namely, the enhanced multistage differential transform method (E-MsDTM) for solving prey-predator systems. …”
    Get full text
    Article
  18. 898

    QUALITATIVE MODELING OF ECOLOGICAL TOURISM DEVELOPMENT IN ThE ALTAI REPUBLIC by D. S. Khazova

    Published 2017-10-01
    “…The qualitative modeling algorithm has an independent scientific and practical value and can be used for high-quality modeling of various systems of regional economy, including modeling of the tourist sector.…”
    Get full text
    Article
  19. 899

    Computationally Effective Modeling of Cold Rolling: Application to Al Alloys by János György Bátorfi, Jurij J. Sidor

    Published 2024-12-01
    “…An accurate and numerically efficient description of the rolling process is a challenging task since the degree of computational accuracy is directly related to the complexity of the algorithm employed. …”
    Get full text
    Article
  20. 900

    Adaptive Topology Reconfiguration from an Actor Failure in Wireless Sensor-Actor Networks by Shengfeng Zhang, Xiaobei Wu, Cheng Huang

    Published 2015-02-01
    “…Length-Aware Topology Reconfiguration Algorithm (LTRA) is proposed on the basis of two vital definitions named as length impact index (LII) and vertex cut set (VCS). …”
    Get full text
    Article