Showing 2,441 - 2,460 results of 12,962 for search 'while algorithm', query time: 0.16s Refine Results
  1. 2441
  2. 2442

    Mars Robot Puzzle (a Multiagent Approach to the Dijkstra Problem) by E. V. Bodin, N. O. Garanina, N. V. Shilov

    Published 2011-06-01
    “…All our algorithms are multiagent in contrast to "centralized" graph and combinatorial algoritms; correctness of our algorithms is formally proven, while the testing is used for validation of path-planning algorithms.…”
    Get full text
    Article
  3. 2443

    Lightweight malicious domain name detection model based on separable convolution by Luhui YANG, Huiwen BAI, Guangjie LIU, Yuewei DAI

    Published 2020-12-01
    “…The application of artificial intelligence in the detection of malicious domain names needs to consider both accuracy and calculation speed,which can make it closer to the actual application.Based on the above considerations,a lightweight malicious domain name detection model based on separable convolution was proposed.The model uses a separable convolution structure.It first applies depthwise convolution on every input channel,and then performs pointwise convolution on all output channels.This can effectively reduce the parameters of convolution process without impacting the effectiveness of convolution feature extraction,and realize faster convolution process while keeping high accuracy.To improve the detection accuracy considering the imbalance of the number and difficulty of positive and negative samples,a focal loss function was introduced in the training process of the model.The proposed algorithm was compared with three typical deep-learning-based detection models on a public data set.Experimental results denote that the proposed algorithm achieves detection accuracy close to the state-of-the-art model,and can significantly improve model inference speed on CPU.…”
    Get full text
    Article
  4. 2444

    Hybrid Technique Used for Straight Line Detection by Fawziya Ramo, Nidhal Al-Assady, Khalil Al-Saif

    Published 2011-07-01
    “…These techniques are:1-Hough Transform(HT), Develpoed Baron’s Method (DBM)and-Genetic Developed Baron’s Method(GDBM)     First technique was applied as it, while the second technique was applied after performing some modification in its algorithm. …”
    Get full text
    Article
  5. 2445

    A computation offloading scheme for energy consumption optimization in Internet of vehicles by Wenxuan GAO, Xinjie YANG

    Published 2023-10-01
    “…In Internet of vehicles (IoV), vehicle-oriented applications are generally computation-intensive and latency-sensitive.Introducing idle computing resources from mobile vehicles as a supplement to network computing power can effectively alleviate the load pressure on edge servers.The problem of task allocation for edge computation offloading in the context of IoV environment were researched.By fully leveraging the combined computing resources of roadside units (RSU), user vehicles, and mobile vehicles within the RSU service range, a computation offloading strategy based on the sparrow search algorithm was proposed and referred to as sparrow search based computation offloading scheme (S<sup>2</sup>COS), aiming to optimize the overall system energy consumption.In addition, this strategy fully taked into account practical network issues such as service time constraints caused by vehicle mobility and the potential occurrence of computation node failures.The simulation results demonstrate that S<sup>2</sup>COS can meet the latency requirements for computation-intensive and latency-sensitive tasks, while significantly reducing system energy consumption.…”
    Get full text
    Article
  6. 2446

    WFQ ENHANCEMENT USING INTELLIGENT DISTRIBUTED QUEUE BASED ANFIS FOR PACKET SWITCHING NETWORK by Sh. A. Ali, K. A. Nassar

    Published 2019-06-01
    “…The diversity of Internet traffic requires some prioritization and prioritization because some visits deserve great attention while reducing delays and packet losses compared to others. …”
    Get full text
    Article
  7. 2447

    A Study of Ethical Implications of AI Tools Enhancing User Conveniences in the Indian Digital Landscape by Biju P. R., Gayathri O.

    Published 2024-09-01
    “…This paper examines how the intelligent algorithms affect personal freedoms of weaker sections, particularly the right to choice, and whether they reinforce existing social biases within Indian society. …”
    Get full text
    Article
  8. 2448
  9. 2449

    Optimization of Production Scheduling for the Additive Manufacturing of Ship Models Using a Hybrid Method by Kyeongho Kim, Soonjo Kwon, Minjoo Choi

    Published 2024-11-01
    “…This paper introduces a hybrid optimization method that leverages either linear programming (LP) or a genetic algorithm (GA) based on the problem size to enhance the parallel additive manufacturing (AM) process for ship models. …”
    Get full text
    Article
  10. 2450

    Finding Key Nodes in Complex Networks Through Quantum Deep Reinforcement Learning by Juechan Xiong, Xiao-Long Ren, Linyuan Lü

    Published 2025-04-01
    “…We compared the proposed algorithm with some classical node ranking and network dismantling algorithms on various synthetical and empirical networks. …”
    Get full text
    Article
  11. 2451

    Providing QoS and Resiliency for Video Streaming Over MPTCP by Shadi Bikas, Muge Sayit

    Published 2025-01-01
    “…Additionally, we assess the resiliency of the proposed algorithm in scenarios involving subflow failures within the MPTCP connection. …”
    Get full text
    Article
  12. 2452

    Remaining useful life prediction of a small sample of aero-engine based on an improved gray Markov model by Dong-hai Li, Ji-liang Tu, Hui Liu, Nai-zhi Liao

    Published 2025-06-01
    “…To enhance adaptability, a genetic algorithm dynamically optimizes the time response parameters of the grey model, overcoming the limitation of a fixed structure in traditional methods. …”
    Get full text
    Article
  13. 2453

    Generative design recommendations for the historical Mardiṅ High School and Gaziṗaşa Primary School buildings, Turkey by Mizgin Gökçe Salık, Fatma Demet Aykal

    Published 2025-07-01
    “…The genetic algorithm (GA) is inspired by natural selection, emphasizing the survival of the fittest. …”
    Get full text
    Article
  14. 2454

    Brain age prediction from MRI images based on a convolutional neural network with MRMR feature selection layer by Mustafa Hatem Al Ghariri, Seyed Omid Shahdi

    Published 2025-05-01
    “…The feature selection layer uses MRMR algorithm which identifies essential characteristics for a target variable while minimizing feature redundancy to select the optimal feature subset. …”
    Get full text
    Article
  15. 2455
  16. 2456

    Mapping Kuwait bathymetry using passive multispectral remote sensing by Jasem A Albanai

    Published 2021-08-01
    “…Some are commercial, such as IKONAS and WorldView, while others are freely available, such as Landsat 8 and sentainel-2. …”
    Get full text
    Article
  17. 2457

    Low pressure PEM electrolyzer system modeling with heat loss representation by Asmaa A. Ghany, Mohamed Mahmoud Samy

    Published 2025-09-01
    “…A recursive identification algorithm method is utilized to estimate the additional resistance associated with heat loss. …”
    Get full text
    Article
  18. 2458

    A dimension reduction assisted credit scoring method for big data with categorical features by Tatjana Miljkovic, Pei Wang

    Published 2025-01-01
    “…The evidence suggests that even small improvements in the accuracy of existing credit-scoring models may optimize profits while effectively managing risk exposure. Despite continuing efforts, the majority of existing credit scoring models still include some judgment-based assumptions that are sometimes supported by the significant findings of previous studies but are not validated using the institution’s internal data. …”
    Get full text
    Article
  19. 2459
  20. 2460

    Optimized SPR-PCF sensor for sucrose detection inspired by vertical pupil geometry by Mohammad Reza Khodatars Dashtmian, Vahid Fallahi, Mahmood Seifouri, Saeed Olyaee

    Published 2025-08-01
    “…The primary objective is achieving superior amplitude sensitivity (AS) while minimizing losses. To ensure this, we have applied the Nelder-Mead algorithm for precise optimization of the structural parameters. …”
    Get full text
    Article