Showing 81 - 100 results of 1,978 for search 'since algorithm', query time: 0.07s Refine Results
  1. 81

    ALGORITHMIC AND PROGRAM IMPLEMENTATION OF THE PLAGIARISM DEFINITION IN LEARNING MANAGEMENT SYSTEMS by Y. B. Popova, A. V. Goloburda

    Published 2018-06-01
    “…The software implementation of the proposed algorithms is implemented as a web service in the Java language.…”
    Get full text
    Article
  2. 82

    A Multicriteria Evaluation of Single Underwater Image Improvement Algorithms by Iracema del P. Angulo-Fernández, Javier Bello-Pineda, J. Alejandro Vásquez-Santacruz, Rogelio de J. Portillo-Vélez, Pedro J. García-Ramírez, Luis F. Marín-Urías

    Published 2025-07-01
    “…Enhancement and restoration algorithms are widely used in the exploration of coral reefs for improving underwater images. …”
    Get full text
    Article
  3. 83

    Karatsuba Algorithm Revisited for 2D Convolution Computation Optimization by Qi Wang, Jianghan Zhu, Can He, Shihang Wang, Xingbo Wang, Yuan Ren, Terry Tao Ye

    Published 2025-05-01
    “…The Karatsuba algorithm, since its introduction in the 1960s, has been traditionally used as a fast arithmetic method to perform multiplication between large-bit-width operands. …”
    Get full text
    Article
  4. 84

    NFT Cryptopunk Generation Using Machine Learning Algorithm (DCGAN) by Pooja Singhal, Deepak Aneja, Musaed Alhussein, Ritu Gupta, Khursheed Aurangzeb, Nitish Pathak

    Published 2024-10-01
    “…These results highlight the effectiveness of our machine learning algorithms in improving the quality and uniqueness of NFT assets.…”
    Get full text
    Article
  5. 85

    FPGA implementation of a chaos-based image encryption algorithm by Mohamed Maazouz, Abdelmoughni Toubal, Billel Bengherbia, Oussama Houhou, Noureddine Batel

    Published 2022-11-01
    “…The importance of this matrix lies both in its use to generate encryption keys and in the encryption algorithm itself. In formulating the proposed encryption algorithm, we adopted the Feistel network in addition to some steps of the Advanced Encryption Standard (AES). …”
    Get full text
    Article
  6. 86

    A fast algorithm for constructing suffix arrays for DNA alphabets by Zeinab Rabea, Sara El-Metwally, Samir Elmougy, Magdi Zakaria

    Published 2022-07-01
    “…The continuous improvement of sequencing technologies has been paralleled by the development of efficient algorithms and data structures for sequencing data analysis and processing. …”
    Get full text
    Article
  7. 87

    Anti-Jamming RIS Communications Using DQN-Based Algorithm by Pham Duy Thanh, Hoang Thi Huong Giang, Ic-Pyo Hong

    Published 2022-01-01
    “…The Python simulation results conducted by averaging 10<sup>4</sup> time slots show that the proposed algorithm is not only able to learn from environment, but also yields better performance than baseline schemes under network changes. …”
    Get full text
    Article
  8. 88
  9. 89

    Numerical Solutions to the Variational Problems by Dijkstra’s Path-Finding Algorithm by Thanaporn Arunthong, Laddawan Rianthakool, Khanchai Prasanai, Chakrit Na Takuathung, Sakchai Chomkokard, Wiwat Wongkokua, Noparit Jinuntuya

    Published 2024-11-01
    “…In this work, we propose the general idea of using a path-finding algorithm to solve a variational problem. By interpreting a variational problem of finding the function that minimizes a functional integral as a shortest path finding, we can apply the shortest path-finding algorithm to numerically estimate the optimal function. …”
    Get full text
    Article
  10. 90

    An Extended Analysis of the Correlation Extraction Algorithm in the Context of Linear Cryptanalysis by Christoph Graebnitz, Valentin Pickel, Holger Eble, Frank Morgner, Hannes Hattenbach, Marian Margraf

    Published 2024-12-01
    “…For this purpose, the Correlation Extraction Algorithm (CEA), which leverages the emerging field of quantum computing, appears promising. …”
    Get full text
    Article
  11. 91

    Binary Secretary Bird Optimization Algorithm for the Set Covering Problem by Broderick Crawford, Felipe Cisternas-Caneo, Ricardo Soto, Claudio Patricio Toledo Mac-lean, José Lara Arce, Fabián Solís-Piñones, Gino Astorga, Giovanni Giachetti

    Published 2025-08-01
    “…Since the SBOA was originally designed for optimization problems in continuous space and the SCP is a binary problem, this paper proposes the implementation of several binarization techniques to adapt the algorithm to the discrete domain. …”
    Get full text
    Article
  12. 92
  13. 93

    Predicting Voluntary Auditor Change Using the Water Cycle Algorithm by Erfan Safdel, Hoda Eskandar, Hassan Yazdifar

    Published 2024-06-01
    “…Additionally, these algorithms were run 10 times to ensure the reliability of the results.ResultsIn almost all implementations and based on all 4 performance evaluation criteria, the Water Cycle Algorithm is more suitable than logistic regression for predicting auditor change. …”
    Get full text
    Article
  14. 94
  15. 95

    RETRACTED: Comparative analysis of compression algorithms for four-dimensional light fields by R. G. Bolbakov, V. A. Mordvinov, A. D. Makarevich

    Published 2022-07-01
    “…It has also been shown that with a small distance between the optical centers of the captured images, the use of video compression algorithms is preferable to the use of image compression algorithms, since they show better results in both three-dimensional and four-dimensional versions.Conclusions. …”
    Get full text
    Article
  16. 96

    A new binary grasshopper optimization algorithm for feature selection problem by Haouassi Hichem, Merah Elkamel, Mehdaoui Rafik, Maarouk Toufik Mesaaoud, Chouhal Ouahiba

    Published 2022-02-01
    “…It is an efficient optimization algorithm and since demonstrates excellent performance in solving continuous problems, but cannot resolve directly binary optimization problems. …”
    Get full text
    Article
  17. 97

    Analysis of solving methods and complexity of algorithmics problems in Lithuanian and Baltic Olympiads by Valentina Dagienė, Jūratė Skūpienė

    Published 2003-12-01
    “… Lithuanian Olympiads in Informatics are being organized since 1990. Each Olympiad consists of three rounds. …”
    Get full text
    Article
  18. 98

    A Modified Key Generation Algorithm to Rebalanced-RSA and RPower-RSA by İsrafil Okumuş, Ercan Celık

    Published 2024-12-01
    “…A theoretical analysis of all variants, including the proposed modifications, demonstrates that these key generation algorithms improve the encryption process compared to the original variants, and since the encryption key size and one of the decryption key sizes are approximately equal in length, they achieve a more balanced computational effort between encryption and decryption.…”
    Get full text
    Article
  19. 99

    Research on Target Tracking Algorithm of Micro-UAV Based on Monocular Vision by Yingbin Feng, Dian Wang, Kun Yang

    Published 2023-01-01
    “…Aiming at the problem of limited payload and endurance of micro-UAV, the target tracking algorithm based on monocular vision is proposed. Since monocular vision cannot directly measure distance between the UAV and the target, triangulation and triangle similarity are used to calculate the distance information. …”
    Get full text
    Article
  20. 100

    A secure communication algorithm for UAV swarms based on cooperative beamforming by HAN Dongsheng, ZHAO Yishuo

    Published 2025-06-01
    “…To maximize the confidentiality of the system, the relative position and energy of each drone in the swarm, as well as the overall movement of the swarm and the beam of the antenna array, were comprehensively considered. Since this optimization problem was characterized by highly coupled non-convex terms, the initial problem was decomposed into two sub-problems and a cyclic iterative successive convex approximation algorithm was designsed to solve it through Taylor expansion and convex relaxation. …”
    Get full text
    Article