Showing 5,041 - 5,060 results of 12,962 for search 'while algorithm', query time: 0.12s Refine Results
  1. 5041

    The Effectiveness of Peyton’s 4-Step Approach to Teach Resuscitation Skills: A Randomized Controlled Clarification Study by Denisa Cenaj, Leonie Schulte-Uentrop, Leonie Fee Laura Kröger, Josephine Küllmei, Jan-Marcus Haus, Parisa Moll-Khosrawi

    Published 2025-07-01
    “…Undergraduates of the intervention group reported significant higher learning gains for procedural ACLS skills, like performing the algorithm ( P  < .001). Conclusion Integrating Peyton's 4-step approach into structured ACLS training enhances procedural cardiopulmonary resuscitation skills, adherence to the ACLS algorithm, and skill retention in advanced stages of medical education, especially when undergraduates have prior resuscitation experience. …”
    Get full text
    Article
  2. 5042

    E²VRP-CPP: An Energy-Efficient Approach for Multi-UAV Multi-Region Coverage Path Planning Optimization in the Enhanced Vehicle Routing Problem by Yuechao Zang, Xueqin Huang, Min Lu, Qianzhen Zhang, Xianqiang Zhu

    Published 2025-03-01
    “…We propose an approach that optimizes UAV flight speeds to minimize energy consumption, supported by an accurate energy estimation algorithm. In addition, a heuristic algorithm is developed to balance the distribution of tasks among UAVs, considering both the scanning and transit times. …”
    Get full text
    Article
  3. 5043

    Secure and efficient trust enabled routing in mobile ad hoc network using game theory and grey wolf optimisation techniques by Ujwala Ravale, Gautam M. Borkar

    Published 2024-12-01
    “…This protocol's novel ability to dynamically scale performance measures as nodes expand improves efficiency and adaptability. While improving performance metrics, the proposed algorithm also efficiently identifies malicious nodes and re‐routes the transmission, excluding the found malicious nodes. …”
    Get full text
    Article
  4. 5044

    Efficient resource allocation for D2D-enabled social IoT networks: A tripartite and time-scale optimization approach by Saurabh Chandra, Rajeev Arya, Maheshwari Prasad Singh

    Published 2024-12-01
    “…The proposed approach prioritizes maintaining Quality of Service (QoS) and resource allocation to minimize power consumption while maximizing sum throughput. Simulated results demonstrate the superiority of the proposed algorithm over standard benchmark schemes. …”
    Get full text
    Article
  5. 5045

    A Collaborative Transit Signal Priority Method Considering Gaming among Traffic Participants by Bing Wu, Haishan Wang, Yanli Wang, Ben Zhai, TanXing Xue

    Published 2023-01-01
    “…A finite state machine-based algorithm is developed to estimate the average delays of nontransit vehicles. …”
    Get full text
    Article
  6. 5046

    Deep Reinforcement Learning-Based Impact Angle-Constrained Adaptive Guidance Law by Zhe Hu, Wenjun Yi, Liang Xiao

    Published 2025-03-01
    “…We introduce a parameter to the super-twisting algorithm and subsequently improve an intelligent parameter-adaptive algorithm grounded in the Twin-Delayed Deep Deterministic Policy Gradient (TD3) framework. …”
    Get full text
    Article
  7. 5047

    In situ fully vectorial tomography and pupil function retrieval of tightly focused fields by Xin Liu, Shijie Tu, Yiwen Hu, Yifan Peng, Yubing Han, Cuifang Kuang, Xu Liu, Xiang Hao

    Published 2025-04-01
    “…When combined with our decoding algorithm, this strategy mitigates the imperfections in the detection path. …”
    Get full text
    Article
  8. 5048

    Two-Timescale Cross-Layer Design for URLLC Over Parallel Fading Channels With Imperfect CSI by Hongsen Peng, Meixia Tao

    Published 2025-01-01
    “…Based on the small timescale optimization method, we adopt the ternary search algorithm to optimize the pilot length and pilot power through Monte Carlo evaluations in the large timescale. …”
    Get full text
    Article
  9. 5049

    Automatic Identification of the Main Ionospheric Trough in Total Electron Content Images by Gregory Starr, Sebastijan Mrak, Yukitoshi Nishimura, Michael Hirsch, Prakash Ishwar, Joshua Semeter

    Published 2022-06-01
    “…Because no ground truth labels exist for the MIT, we extensively characterize the behavior of the algorithm by comparing it to the method developed by Aa, Zou, et al. (2020, doi:https://doi.org/10.1029/2019JA027583). …”
    Get full text
    Article
  10. 5050

    Investigating the Machining Behavior of the Additively Manufactured Polymer-Based Composite Using Adaptive Neuro-Fuzzy Learning by Anastasios Tzotzis, Dumitru Nedelcu, Simona-Nicoleta Mazurchevici, Panagiotis Kyratsis

    Published 2025-05-01
    “…Multi-objective optimization using the Non-Dominated Sorting Genetic Algorithm 2 (NSGA-II) algorithm was employed to minimize both <i>Ra</i> and <i>T</i> simultaneously. …”
    Get full text
    Article
  11. 5051

    Optimizing Medical IoT Disaster Management with Data Compression by Nunudzai Mrewa, Athirah Mohd Ramly, Angela Amphawan, Tse Kian Neo

    Published 2024-02-01
    “…To tackle this issue, we introduce "Beyond Orion," a novel lossless compression method designed to optimize data compression in IoT systems. The algorithm employs advanced techniques such as Lempel Ziv-Welch and Huffman encoding, while also integrating strategies like pipelining, parallelism, and serialization for greater efficiency and lower resource usage. …”
    Get full text
    Article
  12. 5052

    System identification and robust PID controller tuning of quarter car suspension system using hybrid optimization techniques by S. Sakthiya Ram, C. Kumar, R. Saravanakumar, David Banjerdpongchai

    Published 2025-07-01
    “…After validating the resulting dynamic model, various PID controllers are designed using standard metaheuristic algorithms—Particle Swarm Optimization (PSO), Genetic Algorithm (GA), and Simulated Annealing (SA). …”
    Get full text
    Article
  13. 5053

    FEXGBIDS: Federated XGBoost-Based Intrusion Detection System for In-Vehicle Network by Jie Li, Yuanyuan Song, Ming-Gang Zheng, Shuo Zhang, Han Liang

    Published 2025-01-01
    “…We use the BatchCrypt algorithm to batch encrypt first- and second-order gradients to reduce the computational and communication overhead of Paillier homomorphic encryption. …”
    Get full text
    Article
  14. 5054

    Sensitivity Analysis for Dynamic Parameters of High–Speed Train Based on Multimodal–Optimization Improved Kriging Model and Distance Correlation by Jie JIANG, Xufeng YANG, Guofu DING

    Published 2024-07-01
    “…Contrasting with traditional single-objective intelligent optimization algorithms, the algorithm presented here transforms a single-objective optimization problem into a double-objective optimization problem by introducing the population-diversity index. …”
    Get full text
    Article
  15. 5055

    Enhancing high pressure pulsation test bench performance: a machine learning approach to failure condition tracking by Aslı Aksoy, Ömer Haki

    Published 2025-05-01
    “…The objective of this study is to enhance the efficiency of HPPT benches by addressing specimen, bench, and test environment- based problems and to develop a failure condition tracking tool (FCTT) by using machine learning (ML) algorithms. The findings of this study provide a basis for the development of the company’s data-driven smart predictive maintenance applications while providing an increase in the operational efficiency of HPPT benches. …”
    Get full text
    Article
  16. 5056

    Enhancing circular economy project outcomes via molecular fuzzy-based decision support system by Gang Kou, Serhat Yüksel, Hasan Dinçer, Serkan Eti, Gabriela Oana Olaru, Ümit Hacıoğlu

    Published 2025-09-01
    “…To ensure robustness, a balanced expert dataset is constructed using the Q-learning algorithm, while molecular geometry is considered to reduce complexity and uncertainty in decision-making processes. …”
    Get full text
    Article
  17. 5057

    Exploring “Many Objective Robust Decision Making” for managing uncertainty in climate policy analysis for the transport sector by Albin Engholm, Ida Kristoffersson

    Published 2025-07-01
    “…Candidate policies are generated using a multi-objective evolutionary algorithm. This algorithm searches for policies that meet the climate target while trying to minimize adverse impacts on driving-based accessibility and limiting the use of biofuels and electricity for a reference scenario for 2040. …”
    Get full text
    Article
  18. 5058

    Cancelable speaker identification system for the handicapped access to healthcare networks by Samia A. El-Moneim Kabel, Walid El-Shafai, Naglaa F. Soliman, Reem Alkanhel, Fathi E. Abd El-Samie

    Published 2025-07-01
    “…This paper proposes a cancelable speech encryption algorithm based on the fast Walsh–Hadamard transform (FWHT) and the RSA encryption algorithm, designed specifically for IoT network access control. …”
    Get full text
    Article
  19. 5059

    Cell Outage Detection and Compensation in Two-Tier Heterogeneous Networks by Wenqian Xue, Hengzhi Zhang, Yong Li, Dong Liang, Mugen Peng

    Published 2014-01-01
    “…A K-nearest neighbor (KNN) classification algorithm is employed to detect the cell outage automatically. …”
    Get full text
    Article
  20. 5060

    Optimizing multimodal timetable synchronization of intercity railway and metro for the first service period during holidays by Yan Liu, Quan Zhang, Xuan Li, Yang Shi

    Published 2025-03-01
    “…The effectiveness of the model and algorithm is verified using the Shanghai metro network and Hongqiao Railway Station. …”
    Get full text
    Article