Showing 3,901 - 3,920 results of 12,962 for search 'while algorithm', query time: 0.13s Refine Results
  1. 3901

    A Cloud-Computing-Based Data Placement Strategy in High-Speed Railway by Hanning Wang, Weixiang Xu, Futian Wang, Chaolong Jia

    Published 2012-01-01
    “…The semi-definite programming algorithm is suitable for the placement of files with various replications, ensuring that different replications of a file are placed on different storage devices, while the dynamic interval mapping algorithm ensures better self-adaptability of the data storage system. …”
    Get full text
    Article
  2. 3902

    Ant Colony Optimization for Jakarta Historical Tours: A Comparative Analysis of GPS and Map Image Approaches by Gabriel Bodhi, Charleen, Devi Fitrianah

    Published 2025-02-01
    “…The ant colony optimization (ACO) algorithm is implemented in several topics, particularly in solving combinatorial optimization problems. …”
    Get full text
    Article
  3. 3903

    Abnormality detection and privacy protection strategies for power marketing inspection business of cyber–physical–social systems using big data and artificial intelligence by Li Kai, Mo Pingyan, Yang Yongjiao, Xie Hanyang, Shen Zhixiong

    Published 2025-07-01
    “…The proposed model incorporates a work order correlation matching algorithm, a fault interval detection algorithm, an electricity consumption prediction algorithm, and a business anomaly identification algorithm. …”
    Get full text
    Article
  4. 3904

    Calibration and Uncertainty Analysis of Freundlich and Langmuir Isotherms Using the Markov Chain Monte Carlo (MCMC) Approach by Haniyeh Sharifi Moghadam, Saeed Alimohammadi

    Published 2024-10-01
    “…The Metropolis algorithm’s runtime was 5.8 times that of the Gibbs algorithm. …”
    Get full text
    Article
  5. 3905

    Federated Reinforcement Learning-Based Dynamic Resource Allocation and Task Scheduling in Edge for IoT Applications by Saroj Mali, Feng Zeng, Deepak Adhikari, Inam Ullah, Mahmoud Ahmad Al-Khasawneh, Osama Alfarraj, Fahad Alblehai

    Published 2025-03-01
    “…Experimental outcomes show that the method we suggest is better than those used in best-fit, first-fit, and worst-fit basic algorithms. It maintains power stability usage among edge servers while surpassing old-fashioned heuristic techniques. …”
    Get full text
    Article
  6. 3906

    Self-Adjusting Look-Ahead Distance of Precision Path Tracking for High-Clearance Sprayers in Field Navigation by Xu Wang, Bo Zhang, Xintong Du, Huailin Chen, Tianwen Zhu, Chundu Wu

    Published 2025-06-01
    “…The tracking accuracy has been improved and the applicability of the algorithm for rapid deployment has been enhanced.…”
    Get full text
    Article
  7. 3907

    Multi-Humanoid Robot Arm Motion Imitation and Collaboration Based on Improved Retargeting by Xisheng Jiang, Baolei Wu, Simin Li, Yongtong Zhu, Guoxiang Liang, Ye Yuan, Qingdu Li, Jianwei Zhang

    Published 2025-03-01
    “…Traditional retargeting algorithms, while effective in mapping human motion to robots, typically either ensure similarity in arm configuration (joint space-based) or focus solely on tracking the end-effector position (Cartesian space-based). …”
    Get full text
    Article
  8. 3908

    Research on range matching for wire-speed hardware NIDS by CHEN Shu-hui, SUN Zhi-gang, SU Jin-shu

    Published 2006-01-01
    “…To solve the rule matching problem of hardware NIDS,a range matching algorithm LRC-RM was proposed,with more efficient memory utilization.The approach mapped the port range into a compressed bit vector and organized the bit vectors as an extended balanced binary tree.Experiments were employed to show that NIDS using this approach can perform wire-speed range matching for OC-192 links,while saving 99% memory resource comparing to the existing methods.The algorithm is easy to be implemented within a chip without additional RAM.…”
    Get full text
    Article
  9. 3909

    Hierarchical location-diversity-based low-delay anonymous communication framework by CHEN Xin1, HU Hua-ping1, LIU Bo1, XIAO Feng-tao1, HUANG Zun-guo1

    Published 2009-01-01
    “…First, a router selecting based algorithm on location diversity and RTT was proposed; then a hierarchical location-diversity-based low-delay anonymous communication framework was presented.The framework’s security was analyzed and an evaluation algorithm for security was presented. …”
    Get full text
    Article
  10. 3910

    Integrated Guidance and Control for Strap-Down Flight Vehicle: A Deep Reinforcement Learning Approach by Qinglong Zhang, Bin Zhao, Yifu Jiang, Jingyan Zhang, Jiale Zhang

    Published 2025-05-01
    “…Secondly, a channel-by-channel progressive training method based on the twin delayed deep deterministic policy gradient (TD3) algorithm is proposed. The agents of the pitch and yaw channels are trained using the TD3 algorithm independently, which substantially alleviates the complexity of the training process, while the roll channel is stabilized through the application of the back-stepping method. …”
    Get full text
    Article
  11. 3911

    Enhancing AES image encryption with a three-dimensional hyperchaotic system for increased security and efficiency. by Mingyi Huo, Yanpei Zheng, Jun Huang

    Published 2025-01-01
    “…The proposed algorithm markedly reduces the number of encryption rounds to one while enhancing both efficiency and security. …”
    Get full text
    Article
  12. 3912

    Integrated Navigation Method for Orchard-Dosing Robot Based on LiDAR/IMU/GNSS by Wang Wang, Jifeng Qin, Dezhao Huang, Furui Zhang, Zhijie Liu, Zheng Wang, Fuzeng Yang

    Published 2024-10-01
    “…Next, an improved A* algorithm was introduced to ensure the global operational path maintained a safe distance from obstacles, while the DWA algorithm handled dynamic obstacle avoidance. …”
    Get full text
    Article
  13. 3913

    Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain by Lin JIN, Youliang TIAN

    Published 2022-08-01
    “…Currently, there is no data exchanging and sharing between different hospitals, and it is easy to form data islands.At the same time, regional medical data contains a large amount of sensitive information of patients.The public acquisition, sharing and circulation of these data will lead to malicious tampering, theft, abuse and loss of ownership, thereby revealing patient privacy.In addition, the size of medical data is enormous and the data is unstructured, then it is more difficult to prevent and hold accountable some highly targeted malicious attacks, such as malicious attacks on medical data theft, tampering, and extortion.In view of the above problems, a blockchain-based on multi-authority attribute hidden electronic medical record sharing scheme was proposed to achieve fine-grained access to shared electronic medical records while ensuring patient privacy.The Multi-Authorization Attribute Encryption (MA-ABE) algorithm was introduced, which used multi-authority organizations to manage decentralized attributes.It also used hash functions to identify different users, in order to effectively resist collusion attacks between users with different authorizations.Besides, the linear secrets sharing scheme (LSSS) was used to realize partial hiding of attributes, and the attributes were divided into two parts:attribute name and attribute value.In addition, combined with the characteristics of blockchain openness, transparency and tamper-proof, the design of access policy can update the algorithm.Based on the access policy update algorithm, the policy block was added.The new access policy was uploaded to the blockchain to form a policy update traceability chain, which can realize distributed and reliable access control management under the condition of hidden policy.It can also support data privacy protection at the same time, and traceability of user behavior.The theoretical proof and experimental analysis have proved that this scheme protect attribute privacy effectively, while reduces computational overhead.…”
    Get full text
    Article
  14. 3914

    Optimized Airspace Structures and Sequencing Method for Urban Logistics Droneport by Yuan Zheng, Die Li, Zhou Shen, Chenglong Li, Zhaoxuan Zhang

    Published 2025-03-01
    “…Experimental results demonstrate that the proposed airspace design reduces take-off/landing time by 34.8% compared to conventional funnel-shaped configurations. The sequencing algorithm prioritizes high-value missions while reducing the average waiting time for low-battery drones by 47.3%, effectively alleviating endurance pressures. …”
    Get full text
    Article
  15. 3915

    Bandit-Based Multiple Access Approach for Multi-Link Operation in Heterogeneous Dynamic Networks by Mingqi Han, Zhenyu Chen, Xinghua Sun

    Published 2025-01-01
    “…The MP-CUCB algorithm enables each MLD to independently make access decisions to improve throughput while guaranteeing the fairness requirements of SLDs. …”
    Get full text
    Article
  16. 3916

    Ambiguity-aware semi-supervised learning for leaf disease classification by Tri-Cong Pham, Tien-Nam Nguyen, Van-Duy Nguyen

    Published 2025-04-01
    “…The results indicate that our semi-supervised method reduces the reliance for fully labeled datasets while preserving high accuracy by utilizing the ambiguity rejection algorithm. …”
    Get full text
    Article
  17. 3917

    A hybrid blockchain-based solution for secure sharing of electronic medical record data by Gang Han, Yan Ma, Zhongliang Zhang, Yuxin Wang

    Published 2025-01-01
    “…This structure enhances both security and transparency while fostering collaborative efforts across different stakeholders. …”
    Get full text
    Article
  18. 3918

    Generalized Singular Value Decomposition-Based Secure Beam Hybrid Precoding for Millimeter Wave Massive Multiple-Input Multiple-Output Systems by Boqing Chen, Lijun Yang, Meng Wu

    Published 2025-04-01
    “…In a hybrid precoding system, the low-complexity GSVD-Sparsity algorithm can achieve a spectral efficiency close to that of the GSVD-based scheme in a fully digital system while maintaining anti-eavesdropping capabilities.…”
    Get full text
    Article
  19. 3919

    Research on GNNs with stable learning by Wenbin Li, Wenxuan Wei, Peiyang Wang, Li Pan, Bo Yang, Yanling Xu

    Published 2025-08-01
    “…The aim is to extract genuine causal features while eliminating spurious causal features. By introducing a feature sample weighting decorrelation technique in the random Fourier transform space and combining it with a baseline GNN model, a Stable-GNN model and a constrained sampling weight gradient update algorithm are designed. …”
    Get full text
    Article
  20. 3920

    A Study on Multi-ship Avoidance System for Unmanned Surface Vehicles Using the Quaternion Ship Domain and Collision Risk Index by Dong-Hun Lee, Mu-Yeong Seo, Hyo-Geun Lee, Won-Jun Yoo, Sanghyun Kim, Kwang-Jun Paik

    Published 2025-02-01
    “…The algorithm was used to evaluate target ships (TS) using the CRI values, adapt the ship domain based on QSD, and use the velocity obstacle (VO) method to determine feasible avoidance paths while adhering to the International Regulations for Preventing Collisions at Sea (COLREGs). …”
    Get full text
    Article