Showing 3,981 - 4,000 results of 12,962 for search 'while algorithm', query time: 0.12s Refine Results
  1. 3981

    Robust mesh generation for electromagnetic models with geometric defects through node alignment and mesh boolean operations by Z. H. Gao, Fei Yu, Jie Cao, Xin Yang, J. H. Xie, Z. Q. Guan

    Published 2025-07-01
    “…Abstract This paper presents a mesh fault-tolerant repair algorithm tailored to address common geometric issues inherent in electromagnetic models. …”
    Get full text
    Article
  2. 3982

    Multi task detection method for operating status of belt conveyor based on DR-YOLOM by Yongan LI, Tengjie CHEN, Hongwei WANG, Zhihao ZHANG

    Published 2025-06-01
    “…The results show that compared to mainstream single detection algorithms, DR-YOLOM multi task detection algorithm has better comprehensive detection ability, and this algorithm can ensure high target recognition accuracy, segmentation accuracy, and appropriate inference speed with a small number of parameters. …”
    Get full text
    Article
  3. 3983

    A Vision-Based End-to-End Reinforcement Learning Framework for Drone Target Tracking by Xun Zhao, Xinjian Huang, Jianheng Cheng, Zhendong Xia, Zhiheng Tu

    Published 2024-10-01
    “…This framework focuses on controlling the drone to follow a moving target while maintaining a specific distance. VTD3 is a pure vision-based tracking algorithm which integrates the YOLOv8 detector, the BoT-SORT tracking algorithm, and the Twin Delayed Deep Deterministic Policy Gradient (TD3) algorithm. …”
    Get full text
    Article
  4. 3984

    Web service discovery method based on semantic expansion by ZHANG Zheng, ZUO Chun, WANG Yu-guo

    Published 2007-01-01
    “…A Web service discovery method based on semantic expansion was provided.It semantically expanded the conception of service description and service request.The semantic expansion way includes equivalent expansion,feature expansion and compose expansion.It gave the definition of extend semantic subsume during the period of input/output matching.The experiment tells that this algorithm can improve the recall while maintaining a high level precision.If sin-gle service can not match the service request,the way can attempt service composition to match service request.The heu-ristic algorithm based on H*changed the composition problem to searching problem.Because of the adoption of estima-tion function,the efficiency is improved distinctly.…”
    Get full text
    Article
  5. 3985

    Exploration of indoor environment perception and design model based on virtual reality technology by Zhang Mingli

    Published 2025-04-01
    “…(a) Error changes before applying filtering algorithms. (b) Error changes after applying filtering algorithms.…”
    Get full text
    Article
  6. 3986

    EXTRAPOLATION BY ATTRACTION METHOD FOR IDENTIFICATION OF TRACKS AND PLOTS IN SYSTEM OF SECONDARY RADAR INFORMATION PROCESSING by U. A. Aparovich, R. V. Bondarenko

    Published 2019-06-01
    “…One of the main problems in the secondary radar information processing (trace-while-scan) is the correct identification of sensed plots with corresponding tracks of targets being tracked by extrapolated marks. …”
    Get full text
    Article
  7. 3987

    Web service discovery method based on semantic expansion by ZHANG Zheng, ZUO Chun, WANG Yu-guo

    Published 2007-01-01
    “…A Web service discovery method based on semantic expansion was provided.It semantically expanded the conception of service description and service request.The semantic expansion way includes equivalent expansion,feature expansion and compose expansion.It gave the definition of extend semantic subsume during the period of input/output matching.The experiment tells that this algorithm can improve the recall while maintaining a high level precision.If sin-gle service can not match the service request,the way can attempt service composition to match service request.The heu-ristic algorithm based on H*changed the composition problem to searching problem.Because of the adoption of estima-tion function,the efficiency is improved distinctly.…”
    Get full text
    Article
  8. 3988

    Efficient multiplication for finite fields of p characteristic by LI Yin 1, CHEN Gong-liang1, LI Jian-hua1

    Published 2009-01-01
    “…Based on residue arithmetic,a new form of polynomial named PAPB in Fp[x] had been constructed.The amount and distribution of such irreducible polynomials had also been investigated.Then,an efficient algorithm for multiplication modulo PAPB had been proposed using residue arithmetic and Chinese remainder theorem.In the end,the result analysis was given.The theoretic analysis and simulation experiment show that for some finite field of medium prime characteristic,the given algorithm only costs O(k1.5) operations in Fp while the multiplication modulo irreducible binomial cost O(k2) operations,which shows a better performance.As a result,the work presents an interesting perspective for optimal extension field and elliptic curve cryptography.…”
    Get full text
    Article
  9. 3989

    Dynamic pilot assignment in massive MIMO system based on user classification by Jinyan ZHANG, Feng JIN, Lixin YIN

    Published 2017-09-01
    “…Aiming at the problem of pilot contamination in massive MIMO system,a dynamic pilot assignment strategy based on user classification was proposed.The target cell user was divided into the central user and the edge user based on the variance of target cell user signal intensity.The central user used the maximum C/I algorithm to assign pilots to maximize the channel capacity of the central user.The edge user used greedy algorithm to assign pilots to improve the signal to interference and noise ratio of each edge user.Simulation results show that the proposed strategy can improve the channel capacity of the system while improving the signal to interference and noise ratio of the edge user.…”
    Get full text
    Article
  10. 3990

    Program Complex for Calculation and Optimization of the Regimes of Electric Power Systems by O. I. Alexandrov, A. M. Bakanovsky, V. A. Ustimovich

    Published 2003-04-01
    “…The possibilities of modem computers have permitted to apply more advanced algorithms. The algorithm of regime calculations is based on the modified New- ton-Raphson method. …”
    Get full text
    Article
  11. 3991

    Real-Time Optimally Adapting Meshes: Terrain Visualization in Games by Matthew White

    Published 2008-01-01
    “…One of the main challenges encountered by interactive graphics programmers involves presenting high-quality scenes while retaining real-time frame rates on the hardware. …”
    Get full text
    Article
  12. 3992

    Robust Multi-Sensor Fusion for Localization in Hazardous Environments Using Thermal, LiDAR, and GNSS Data by Lukas Schichler, Karin Festl, Selim Solmaz

    Published 2025-03-01
    “…To evaluate the algorithm, we conduct a field test in an urban environment using a vehicle equipped with the appropriate sensor suite while simulating an outage one at a time, to demonstrate the approach’s effectiveness under real-world conditions.…”
    Get full text
    Article
  13. 3993

    FedG2L: a privacy-preserving federated learning scheme base on “G2L” against poisoning attack by Mengfan Xu, Xinghua Li

    Published 2023-12-01
    “…Federated learning (FL) can push the limitation of “Data Island” while protecting data privacy has been a broad concern. …”
    Get full text
    Article
  14. 3994

    Application of LSB Steganography for Encrypted Data Using Triple Transposition Vigenere on Digital Images by Eko Aribowo, Windy Sayyida Amalya, Nur Rochmah Dyah Puji Astuti

    Published 2025-08-01
    “…Grayscale images offer advantages in terms of storage and algorithm efficiency, while RGB images provide broader color diversity and versatile applications. …”
    Get full text
    Article
  15. 3995

    Adaptive dimensionality reduction for neural network-based online principal component analysis. by Nico Migenda, Ralf Möller, Wolfram Schenck

    Published 2021-01-01
    “…This requires to update both the principal components and the dimensionality in every timestep. While the continuous update of the principal components is widely studied, the available algorithms for dimensionality adjustment are limited to an increment of one in neural network-based and incremental PCA. …”
    Get full text
    Article
  16. 3996

    Differentiable architecture search-based automatic modulation recognition for multi-carrier signals by LI Jie, LI Jing, LYU Lu, GONG Fengkui

    Published 2024-09-01
    “…Simulation results demonstrate that the proposed algorithm improves accuracy in urban multipath channels, especially at low SNR, while simultaneously providing better robustness to modulation parameter variations and small-sample scenarios.…”
    Get full text
    Article
  17. 3997

    Non-Holonomic Mobile Manipulator Obstacle Avoidance with Adaptive Prioritization by Federico Neri, Giacomo Palmieri, Massimo Callegari

    Published 2025-04-01
    “…A series of examples are proposed in simulation using Matlab and analyzed to show how the algorithm works if the obstacle interferes with the manipulator or the base. …”
    Get full text
    Article
  18. 3998

    Reliable Process Tracking Under Incomplete Event Logs Using Timed Genetic-Inductive Process Mining by Yutika Amelia Effendi, Minsoo Kim

    Published 2025-03-01
    “…Experimental results using real-world event logs from a health service in Indonesia demonstrate that TGIPM achieves higher fitness, precision, and generalization compared to the sequential approach, while slightly compromising simplicity. Moreover, the TGIPM algorithm exhibits lower computational cost and more effectively captures parallelism, making it particularly suitable for large and incomplete datasets. …”
    Get full text
    Article
  19. 3999

    An Improved Large Neighborhood Search for Network-Level Airport Slot Allocation Optimization by Qiangzhe Wang, Yuanyuan Ma, Yifan Xu, Zhiyuan Shen, Dan Li

    Published 2025-01-01
    “…Validated through an extensive case study involving 4,695 requests across six hub airports, the algorithm achieves solutions within a 1.7% optimality gap while reducing computation time by up to 64%.…”
    Get full text
    Article
  20. 4000

    Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments by Faeiz Alserhani

    Published 2024-12-01
    “…User selection is accomplished through robust Deep Reinforcement Learning with the Tabu Search (DRL-TS) algorithm, while channel selection is optimized through rigorous training employing Proximal Policy Optimization (PPO). …”
    Get full text
    Article