Showing 6,181 - 6,200 results of 12,962 for search 'while algorithm', query time: 0.14s Refine Results
  1. 6181

    Constructing a Computer Model of the Human Eye Based on Tissue Slice Images by Peishan Dai, Boliang Wang, Chunbo Bao, Ying Ju

    Published 2010-01-01
    “…Slice images were obtained from an in vitro Chinese human eye through an embryo specimen processing methods. A level set algorithm was used to extract contour points of eye tissues while a principle component analysis was used to detect the central axis of the image. …”
    Get full text
    Article
  2. 6182

    DSGD++: Reducing Uncertainty and Training Time in the DSGD Classifier through a Mass Assignment Function Initialization Technique by Aik Tarkhanyan, Ashot Harutyunyan

    Published 2025-08-01
    “…We present a method for the Dempster-Shafer Gradient Descent (DSGD) algorithm that significantly reduces training time—by a factor of 1.6—and also reduces the uncertainty of each rule (a condition on features leading to a class label) by a factor of 2.1, while preserving accuracy comparable to other statistical classification techniques. …”
    Get full text
    Article
  3. 6183

    Performance of the ALICE Zero Degree Calorimeters in LHC Run 3 by Zugravel Stefan Cristi

    Published 2025-01-01
    “…In order to fully exploit the potential offered by the LHC increased luminosity in Run 3, while preserving the time and charge resolution performance, the ZDC readout system was upgraded to allow the acquisition of all collisions in self-triggered mode without dead time. …”
    Get full text
    Article
  4. 6184

    Fluid Dynamics of Biomimetic Pectoral Fin Propulsion Using Immersed Boundary Method by Ningyu Li, Yumin Su

    Published 2016-01-01
    “…The prescribed fin kinematics in each period consists of the power stroke and the recovery stroke, and the simulations indicate that the former is mainly used to provide the thrust while the latter is mainly used to provide the lift. …”
    Get full text
    Article
  5. 6185

    A New Strategy to Modify Hopfield by Using XOR Operation by Rusul Hussein Hasan

    Published 2024-09-01
    “…In additional it learns to recognize an infinite number of patterns with varying sizes while preserving a suitable noise ratio.     …”
    Get full text
    Article
  6. 6186

    Neuro-cognitive multilevel causal modeling: A framework that bridges the explanatory gap between neuronal activity and cognition. by Moritz Grosse-Wentrup, Akshey Kumar, Anja Meunier, Manuel Zimmer

    Published 2024-12-01
    “…Multilevel causal modeling allows us to interchangeably reason about the neuronal- and cognitive causes of behavior while maintaining a physicalist (in contrast to a strong dualist) position. …”
    Get full text
    Article
  7. 6187

    Adaptive Learning Based Scheduling in Multichannel Protocol for Energy-Efficient Data-Gathering Wireless Sensor Networks by Kieu-Ha Phung, Bart Lemmens, Mihail Mihaylov, Lan Tran, Kris Steenhaut

    Published 2013-02-01
    “…In this paper, we propose a contention-free multichannel protocol to maximize network throughput while ensuring energy-efficient operation. Arguing that routing decisions influence to a large extent the network throughput, we formulate route selection and transmission scheduling as a joint problem and propose a Reinforcement Learning based scheduling algorithm to solve it in a distributed manner. …”
    Get full text
    Article
  8. 6188

    An Inter-Regional Lateral Transshipment Model to Massive Relief Supplies with Deprivation Costs by Shuanglin Li, Na Zhang, Jin Qin

    Published 2025-07-01
    “…Specifically, JADE is employed in the first stage to allocate the volume of massive relief supplies, aiming to minimize deprivation costs, while IALNS optimizes intermodal routing in the second stage to minimize the weighted sum of transportation time and cost. …”
    Get full text
    Article
  9. 6189

    Optimization Techniques on Quantum and Classical Systems: A Comprehensive Comparative Study by Shaik Hussain, Rajitha Morampudi, Priyamvada K., Bhargavi R. Naveena

    Published 2025-01-01
    “…This study compares Particle Swarm Optimization (PSO), Moth Flame Optimization (MFO), and Genetic Algorithm (GA) on three platforms : a local computer, a local computer with quantum integration, and an IBM quantum machine. …”
    Get full text
    Article
  10. 6190

    Source Quantization and Coding over Noisy Channel Analysis by Runfeng Wang, Dan Song, Jinkai Ren, Lin Wang, Zhiping Xu

    Published 2024-11-01
    “…., the channel decoding algorithm is employed to realize the lossy source coding. …”
    Get full text
    Article
  11. 6191

    Prediction of the spatial distribution of vine weevil under climate change using multiple variable selection methods by Ga-Young Kim, Wang-Hee Lee

    Published 2025-03-01
    “…This research developed multiple species distribution models (SDMs) using different variable selection methods, including correlation, biological considerations, and principal component analysis, and integrated them into an ensemble model to predict the pest’s distribution under climate change. The MaxEnt algorithm was used to develop the models, showing robust performance with raw bioclimatic variables (TSS 0.34–0.37, F1 score 0.60–0.67), while lower performance and different distribution patterns were observed with reconstructed variables (TSS 0.13, F1 score 0.48). …”
    Get full text
    Article
  12. 6192

    Enhancing security and usability with context aware multi-biometric fusion for continuous user authentication by Ayeswarya S., John Singh K.

    Published 2025-08-01
    “…Keystroke dynamics are processed using Wavelet Transform Filtering (WTF) to improve feature extraction, while gait data is refined with an Autocorrelation (AC) Filter to ensure the use of reliable gait segments. …”
    Get full text
    Article
  13. 6193

    Towards carbon emission modeling and optimization for time-sensitive IIoT by LI Yingyu, DAI Yipeng, GE Xiaohu, SHI Guangming, XIAO Yong, LIU Yan, YU Liang, XU Han

    Published 2025-03-01
    “…Based on this, considering low-latency constraints, a task offloading optimization algorithm based on the alternative direction method of multipliers (ADMM) was designed to minimize the overall carbon emissions of the considered IIoT system. …”
    Get full text
    Article
  14. 6194

    Doppler broadening of neutron elastic scattering cross section using SCLM(α,β) thermal scattering laws by Bengoechea Fernández Aitor, Noguere Gilles, Bernard David

    Published 2025-01-01
    “…Despite works performed on 238U, no algorithm reported in the literature provides a unified Crystal Lattice Model valid below and above the thermal cutoff energy. …”
    Get full text
    Article
  15. 6195

    The close-open mixed-fleet electric vehicle routing problem by Themistoklis Stamadianos, Nikolaos A. Kyriakakis, Magdalene Marinaki, Yannis Marinakis

    Published 2023-12-01
    “…To solve large instances, three discrete optimization swarm intelligence algorithms are employed, alongside a Variable Neighborhood Search algorithm. …”
    Get full text
    Article
  16. 6196

    Contribution of Daylighting to Saving Electrical Energy in Cameroon: Case Study of a Classroom in a Public School by Merimé Souffo Tagueu, Lionelle Adelaїde Madjou Tanekou, Benoît Ndzana

    Published 2025-01-01
    “…Applying the optimization algorithm designed for this purpose brings the average illuminance level down to 300lx following the EN12464 standard. …”
    Get full text
    Article
  17. 6197

    Research on image generation technology based on deep learning by Li Jinchen

    Published 2025-01-01
    “…Based on the above problems, this paper analyzes the methods of improving and optimizing the mainstream image generation algorithm from the perspectives of improving and optimizing the loss function, improving the space modeling, revising the structure of both the generator and discriminator, while speeding up the training process. …”
    Get full text
    Article
  18. 6198

    New method for file deduplication in cloud storage by Chao YANG, Qian JI, Si-chun XIONG, Mao-zhen LIU, Jian-feng MA, Qi JIANG, Lin BAI

    Published 2017-03-01
    “…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
    Get full text
    Article
  19. 6199

    Supervised Clustering of Persian Handwritten Images by Sajedeh Moradnia, Mousa Golalizadeh

    Published 2024-11-01
    “…Analyzing high-dimensional data, however, presents challenges, notably the curse of dimensionality. While various methods have been developed to address the dimensionality reduction, most overlooked the role of dependent variables. …”
    Get full text
    Article
  20. 6200

    Improved Hadamard Decomposition and Its Application in Data Compression in New-Type Power Systems by Zhi Ding, Tianyao Ji, Mengshi Li

    Published 2025-02-01
    “…The experimental results with simulated and field data demonstrate that the proposed scheme significantly reduces data volume while maintaining critical features in the restored data. …”
    Get full text
    Article