Showing 4,141 - 4,160 results of 12,962 for search 'while algorithm', query time: 0.11s Refine Results
  1. 4141

    Anderson impurity solver integrating tensor network methods with quantum computing by François Jamet, Lachlan P. Lindoy, Yannic Rath, Connor Lenihan, Abhishek Agarwal, Enrico Fontana, Fedor Simkovic IV, Baptiste Anselme Martin, Ivan Rungger

    Published 2025-03-01
    “…The tensor network based ground state quantum circuit preparation algorithm can also be performed for up to 60 qubits with our available computing resources, while the state vector emulation of the quantum algorithm for time evolution is beyond what is accessible with such resources. …”
    Get full text
    Article
  2. 4142

    Strobing of Radar Marks for Trajectory Filtration in a Body-Fixed Frame by Konstantin K. Vasiliev, Alexey V. Mattis, Oleg V. Saverkin

    Published 2019-12-01
    “…Modern air targets, particularly drones, are becoming less noticeable, while their manoeuvrability continues to improve. …”
    Get full text
    Article
  3. 4143

    Multi-UAV assisted air-to-ground data collection for ground sensors with unknown positions by Cheng Yiran, Dong Yangrui

    Published 2025-06-01
    “…Simulation results reveal that, compared to the existing algorithms, the proposed approach adeptly tackles the data collection challenge when sensor positions remain unknown while significantly enhancing task execution efficiency across diverse environmental conditions. …”
    Get full text
    Article
  4. 4144

    A high-entropy image encryption scheme using optimized chaotic maps with Josephus permutation strategy by Nawal El Ghouate, Mohamed Amine Tahiri, Ahmed Bencherqui, Hanaa Mansouri, Ahmed El Maloufy, Hicham Karmouni, Mhamed Sayyouri, Sameh Askar, Mohamed Abouhawwash

    Published 2025-08-01
    “…This algorithm uses Kepler Chaotic Optimisation Algorithm (CKOA) to select the most suitable chaotic maps, guaranteeing optimal diffusion and complex pixel confusion. …”
    Get full text
    Article
  5. 4145

    Optimizing energy and load management in island microgrids for enhancing resilience against resource interruptions by Majid Hosseina, Mahmoud Samiei Moghaddam, Amir Hassannia

    Published 2025-05-01
    “…To effectively solve this high-dimensional, nonlinear problem, we employ the Multi-objective Moth Flame Algorithm (MOMFA), an enhanced metaheuristic evolutionary algorithm designed to handle complex trade-offs between cost, reliability, and resilience. …”
    Get full text
    Article
  6. 4146

    Multiobjective Optimization for Topology and Coverage Control in Wireless Sensor Networks by Seyed Mahdi Jameii, Karim Faez, Mehdi Dehghan

    Published 2015-02-01
    “…Simulation results demonstrate that the proposed algorithm can improve the network lifetime and coverage while maintaining the network connectivity.…”
    Get full text
    Article
  7. 4147

    Alzheimer’s Disease Detection Using Deep Learning and Federated Learning by Taha Bin Niaz, Usman Amjad, Humera

    Published 2025-07-01
    “…The success and accuracy of the proposed algorithm are established with empirically defined metrics such as accuracy and defined thresholds. …”
    Get full text
    Article
  8. 4148

    Programmable data processing method and system design for polymorphic network by Jinlin WANG, Li’nan JING, Xiao CHEN, Jiali YOU

    Published 2022-04-01
    “…Aiming at the problems of compatible with multiple route identification, network protocols and network application data processing faced by multimodal networks, a programmable data processing method compatible with multiple modes was proposed.Through the mode recognition and classify module to identify packets of different network modes, the data type, offset and length were used to represent multiple types of data, and the modal data processing pipeline was formed by using the matching action data table with selectable matching algorithm and processing action to process data of different types of network.A prototype system for data processing of polymorphic network was implemented and verified by using the proposed method.Experimental results show that the modal data processing pipeline can isolate the network of different modes and ensure the performance independence, the type of matching algorithm and the length of the processed data will affect the forwarding performance of the system, while the type of data will not.…”
    Get full text
    Article
  9. 4149

    Research on the WSN Node Localization Based on TOA by Qing-hui Wang, Ting-ting Lu, Meng-long Liu, Li-feng Wei

    Published 2013-01-01
    “…Regarding the tracking of moving target in the large-scale fixed scene, a new routing algorithm of LAODV in the principle of TOA localization is proposed. …”
    Get full text
    Article
  10. 4150

    High-confidence assessment of functional impact of human mitochondrial non-synonymous genome variations by APOGEE. by Stefano Castellana, Caterina Fusilli, Gianluigi Mazzoccoli, Tommaso Biagini, Daniele Capocefalo, Massimo Carella, Angelo Luigi Vescovi, Tommaso Mazza

    Published 2017-06-01
    “…Only a tiny subset was functionally evaluated with certainty so far, while the pathogenicity of the vast majority was only assessed in-silico by software predictors. …”
    Get full text
    Article
  11. 4151

    Distributed Transmission Probability Control in Fading Channel with State Information by S. Xie, K.S. Low, E. Gunawan

    Published 2015-05-01
    “…In this system, each user tries to minimize its number of transmission attempts while meeting the throughput demand. The user interaction in such an ALOHA network is modeled as a random access game. …”
    Get full text
    Article
  12. 4152

    Programmable data processing method and system design for polymorphic network by Jinlin WANG, Li’nan JING, Xiao CHEN, Jiali YOU

    Published 2022-04-01
    “…Aiming at the problems of compatible with multiple route identification, network protocols and network application data processing faced by multimodal networks, a programmable data processing method compatible with multiple modes was proposed.Through the mode recognition and classify module to identify packets of different network modes, the data type, offset and length were used to represent multiple types of data, and the modal data processing pipeline was formed by using the matching action data table with selectable matching algorithm and processing action to process data of different types of network.A prototype system for data processing of polymorphic network was implemented and verified by using the proposed method.Experimental results show that the modal data processing pipeline can isolate the network of different modes and ensure the performance independence, the type of matching algorithm and the length of the processed data will affect the forwarding performance of the system, while the type of data will not.…”
    Get full text
    Article
  13. 4153

    旋转叶片异步振动参数辨识方法及试验验证 by 王茜, 雷晓波

    Published 2021-01-01
    “…Based on the principle of blade tip timing( BTT) and the vibration principle of one degree of freedom,the parameter identification algorithm of rotating blade asynchronous vibration is established by using all phase FFT( apFFT) and least square method.The algorithm is verified by numerical simulation,and the test parameter and empirical value of the rationality for sensor layout are given.The tests of asynchronous vibration parameter identification were launched on a fan rotor,while high pressure nitrogen was used to shock the blades to produce single frequency absolute occupancy vibration.Results show that the method for asynchronous vibration identification could accurately identify blade vibration parameters,and the vibration frequencies of all blades obtained are exactly the same.Frequency identification accuracy is high with the maximum relative error of 1.12% using strain analysis frequency as a baseline.Results verify that the method of asynchronous vibration parameter identification is correct.…”
    Get full text
    Article
  14. 4154

    A blockchain sharding scheme in edge computing by Jun WANG, Jianwei MA, Jinxi LUO

    Published 2023-12-01
    “…The low security and poor privacy of the data in edge computing restrict the development of edge computing.Block chains can provide security for data in edge computing using their own tamper resistance, while protecting privacy by use of traceability.But the bottleneck of blockchain's scalability has become a barrier to their application in the field of edge computing.To solve the problem that blockchain can not meet the needs of a large number of nodes to process data at the same time when applied to edge computing, a two-layer sharding scheme was presented, which meets the needs of edge computing scenarios.Geographic location-based partitioning of nodes was implemented using the improved K-means algorithm, and a local blockchain network consensus (LBNC) algorithm was designed based on the idea of delegated proof of stake (DPoS) and practical Byzantine fault tolerance (PBFT).Simulation results show that the proposed scheme has less delay and higher throughput than those of PBFT, and the total throughput increases with the number of shards.…”
    Get full text
    Article
  15. 4155

    Artificial intelligence-driven sentiment analysis and optimization of movie scripts by Hong Zheng

    Published 2025-06-01
    “…Additionally, the emotion optimization algorithm enhances the accuracy of sentiment analysis results while boosting emotional depth. …”
    Get full text
    Article
  16. 4156

    A spectral Fletcher-Reeves conjugate gradient method with integrated strategy for unconstrained optimization and portfolio selection. by Nasiru Salihu, Sulaiman M Ibrahim, P Kaelo, Issam A R Moghrabi, Elissa Nadia Madi

    Published 2025-01-01
    “…We rigorously establish the global convergence of the algorithm for general functions, using criteria from a Wolfe-line search. …”
    Get full text
    Article
  17. 4157

    A Distributed Q Learning Spectrum Decision Scheme for Cognitive Radio Sensor Network by Jian He, Jun Peng, Fu Jiang, Gaorong Qin, Weirong Liu

    Published 2015-05-01
    “…Cognitive spectrum management can improve the utilization efficiency of spectrum while increasing the energy consumption of sensor network nodes. …”
    Get full text
    Article
  18. 4158

    3D Point Cloud Simplification Based on k-Nearest Neighbor and Clustering by Abdelaaziz Mahdaoui, El Hassan Sbai

    Published 2020-01-01
    “…While the reconstruction of 3D objects is increasingly used today, the simplification of 3D point cloud, however, becomes a substantial phase in this process of reconstruction. …”
    Get full text
    Article
  19. 4159

    Design of precoding matrices in MIMO full duplex two-way security communication system by Weijia LEI, Yang ZHOU, Xianzhong XIE, Hongjiang LEI

    Published 2020-10-01
    “…The design of precoding matrices was studied in the multiple input multiple output (MIMO) full-duplex two-way security communication system where legitimate nodes transmit the confidential information accompanied by the artificial noise while receiving information.For the scenario where the perfect channel state information (CSI) of legitimate channels and eavesdropping channels was available,the difference of concave/convex (DC) programming was used to optimize the precoding matrices of the information signal and the artificial noise for the maximization of the secrecy sum rate.For the scenario where the CSI was imperfect,the channels were modeled by using worst-case criterion and the weighted minimum mean square error algorithm was used to get the robust precoding matrices of the information signal and the artificial noise.The simulation results prove that the proposed algorithm can effectively promote the secrecy sum rate of the system.…”
    Get full text
    Article
  20. 4160

    Research on accurate ranging of UWB under indoor environments by WU Shao-hua, ZHANG Nai-tong

    Published 2007-01-01
    “…The accurate ranging ability of ultra wideband(UWB) signal under IEEE 802.15.4a indoor channel model was studied.An improved time-of-arrival(TOA) estimation algorithm which utilizes region search and threshold comparison was proposed.By statistical analysis on certain characteristics of the CM1 and CM2 channel profiles,the probability model of TOA estimation error was deduced.The thresholds of the proposed TOA estimation algorithm were then set by limiting the error probability to the lowest level.The mean absolute ranging errors under different SNR were simulated.Results show that high enough SNR should be guaranteed in order to obtain centimeter-level ranging precision under in-door environments,while extremely high SNR would not help to improve the ranging precision any more but lead to a performance floor.The results have instructional significance on designing localization algorithms and transmission power control in practical ranging.…”
    Get full text
    Article