Showing 6,121 - 6,140 results of 12,962 for search 'while algorithm', query time: 0.12s Refine Results
  1. 6121

    Application of Mordell–Weil lattices with large kissing numbers to acceleration of multiscalar multiplication on elliptic curves by Koshelev Dmitrii

    Published 2025-04-01
    “…As usual, the resulting curve points can be then regularly used in the main stage of an MSM algorithm to avoid repeating computations. Seemingly, this is the first usage of lattices with large kissing numbers in cryptography, while such lattices have already found numerous applications in other mathematical domains. …”
    Get full text
    Article
  2. 6122

    Remote Sensing Image Enhancement Via Edge-Preserving Multiscale Retinex by Lu Teng, Feng Xue, Qiudi Bai

    Published 2019-01-01
    “…In this paper, we propose a novel algorithm to enhance the contrast of remote sensing image while avoiding color distortion and detail loss. …”
    Get full text
    Article
  3. 6123

    Impact of dimensionality reduction techniques on student performance prediction using machine learning by Koushik Roy, Huu-Hoa Nguyen, Dewan Md. Farid

    Published 2023-10-01
    “…The results show that ADRA achieves an average dimensionality reduction factor of 6.2 while maintaing comprable accuracy with other mehtods. …”
    Get full text
    Article
  4. 6124

    Procedure for Separate Accounting of Interest and Exchange Rate Components of the Fair Value of a Set of Financial Instruments: IFRS by A. Yu. Kuz’min

    Published 2022-11-01
    “…In particular, it has worked out an algorithm for accounting and mathematical evaluation of exchange rate differences when hedging cash flows of debt instruments with currency forwards. …”
    Get full text
    Article
  5. 6125

    Hierarchical predictive optimal control for range extension of EV with ANN based torque control for IPMSM drives by Lekshmi S, Lal Priya P S

    Published 2024-12-01
    “…This study presents a novel methodology to enhance the energy efficiency of Electric Vehicles (EVs) while maintaining dynamic stability and driving comfort, even on uneven roads, using onboard vehicle measurements. …”
    Get full text
    Article
  6. 6126

    Improving data sharing and knowledge transfer via the Neuroelectrophysiology Analysis Ontology (NEAO) by Cristiano A. Köhler, Sonja Grün, Michael Denker

    Published 2025-05-01
    “…On the other hand, different software codes can implement the same analysis algorithm, while adopting different names to identify functions and parameters. …”
    Get full text
    Article
  7. 6127

    Dynamic emotion intensity estimation from physiological signals facilitating interpretation via appraisal theory. by Isabel Barradas, Reinhard Tschiesner, Angelika Peer

    Published 2025-01-01
    “…In our experiment, emotions of varying intensities are induced for three distinct qualities while physiological signals are measured, and participants assess their subjective feeling in real time. …”
    Get full text
    Article
  8. 6128

    Convergence Analysis for Differentially Private Federated Averaging in Heterogeneous Settings by Yiwei Li, Shuai Wang, Qilong Wu

    Published 2025-02-01
    “…Federated learning (FL) has emerged as a prominent approach for distributed machine learning, enabling collaborative model training while preserving data privacy. However, the presence of non-i.i.d. data and the need for robust privacy protection introduce significant challenges in theoretically analyzing the performance of FL algorithms. …”
    Get full text
    Article
  9. 6129

    Bidding strategies for virtual power plants under the electricity-carbon joint market taking into account wind and solar uncertainties by Shuangchi ZHAO, Hong LIN, Haiyun WANG

    Published 2025-05-01
    “…The upper level maximizes the VPP's profit, while the lower level maximizes social welfare in the joint market. …”
    Get full text
    Article
  10. 6130

    Sensor placement optimization for critical-grid coverage problem of indoor positioning by Hui Wu, Zhe Liu, Jin Hu, Weifeng Yin

    Published 2020-12-01
    “…As a conclusion, the proposed method could reduce the cost of sensor deployment while ensuring the accuracy of indoor positioning for critical areas. …”
    Get full text
    Article
  11. 6131

    Anomaly Detection Approach Based on Deep Neural Network and Dropout by Zaid Hussien et al.

    Published 2020-06-01
    “…However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. …”
    Get full text
    Article
  12. 6132

    Distributed Event-Triggered-Based Adaptive Formation Tracking Control for Multi-UAV Systems Under Fixed and Switched Topologies by Chengqing Liang, Lei Liu, Lei Li, Dongmei Yan

    Published 2025-03-01
    “…Finally, the validity of the designed algorithm is confirmed by numerical examples and software-in-the-loop (SIL) simulation experiments.…”
    Get full text
    Article
  13. 6133

    Lightweight anomaly detection model for UAV networks based on memory-enhanced autoencoders by HU Tianzhu, SHEN Yulong, REN Baoquan, HE Ji, LIU Chengliang, LI Hongjun

    Published 2024-04-01
    “…Experiments on public data sets and NS-3 simulation data sets show that while ensuring lightweight, the proposed model reduces the false negative rate by an average of 35.9% and 48% compared with the baseline method.…”
    Get full text
    Article
  14. 6134

    Hybrid modeling for optimizing electrospun polyurethane nanofibrous membranes in air filtration applications by Majid Sohrabi, Milad Razbin

    Published 2025-07-01
    “…However, optimizing their structural characteristics to maximize filtration efficiency while minimizing pressure drop remains challenging due to the complexity of the electrospinning process. …”
    Get full text
    Article
  15. 6135

    Accurate Solar Radiation Forecasting Through Feature-Enhanced Decision Trees and Wavelet Decomposition by Gaizen Soufiane, Abbou Ahmed, Fadi Ouafia

    Published 2025-01-01
    “…This study explores the efficacy of the decision tree algorithm in predicting solar power generation, addressing the inherent variability in photovoltaic (PV) energy production due to weather conditions. …”
    Get full text
    Article
  16. 6136

    Comparing the Effect of Age, Gender, and Desired Speed on Car-Following Behavior by Using Driving Simulator by Ehsan Ramezani-Khansari, Masoud Tabibi, Fereidoon Moghadas Nejad, Mahmoud Mesbah

    Published 2021-01-01
    “…The CF model for each driver was calibrated by genetic algorithm. Gender and DS were effective in CF behavior, while the age factor was not. …”
    Get full text
    Article
  17. 6137

    Automatic speech analysis combined with machine learning reliably predicts the motor state in people with Parkinson’s disease by Tabea Thies, Elisa Mallick, Johannes Tröger, Ebru Baykara, Doris Mücke, Michael T. Barbe

    Published 2025-05-01
    “…Acoustic speech features were automatically extracted with the algorithm given by the Dysarthria Analyzer. Results suggest that acute levodopa intake improves phonatory-respiratory speech functions and speech planning abilities, while the articulatory system remains unaffected. …”
    Get full text
    Article
  18. 6138

    New method for file deduplication in cloud storage by Chao YANG, Qian JI, Si-chun XIONG, Mao-zhen LIU, Jian-feng MA, Qi JIANG, Lin BAI

    Published 2017-03-01
    “…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
    Get full text
    Article
  19. 6139

    Authentication of an Indonesian ID Card with Simultaneous NFC and Face Recognition by Chairullah Chairullah, Yuwaldi Away, Maulisa Oktiana

    Published 2025-06-01
    “…The application, developed using Flutter, incorporates facial recognition for biometric verification, while NFC is employed as an additional authentication layer to provide dual-factor verification and reinforce identity security. …”
    Get full text
    Article
  20. 6140

    Effectiveness of the Spatial Domain Techniques in Digital Image Steganography by Rosshini Selvamani, Yusliza Yusoff

    Published 2024-03-01
    “…The purpose of this research is to determine the best and most effective algorithm among the three competitive spatial domain algorithms, which are Least Significant Bit (LSB), Optimum Pixel Adjustment Procedure (OPAP), and Pixel Value Differencing (PVD) which in regard demonstrated the efficacy of spatial domain algorithms. …”
    Get full text
    Article