Showing 6,741 - 6,760 results of 12,962 for search 'while algorithm', query time: 0.14s Refine Results
  1. 6741

    Research on an adaptive multimodal cognitive load classification method by Xiangxin Yu, Ruizhen Wang

    Published 2025-12-01
    “…Methods: To address these issues, this study proposes a cognitive load classification algorithm based on Multimodal Domain Adaptation (MMDA), which comprises an Intra-Modal Domain Adaptation (IMDA) module and a Cross-Modal Domain Adaptation (CMDA) module. …”
    Get full text
    Article
  2. 6742

    Optical coherence tomography angiography compared with optical coherence tomography for detection of glaucoma progression with high myopia by Pei-Yao Chang, Jiun-Yi Wang, Jia-Kang Wang

    Published 2025-03-01
    “…OCTA could be considered in the imaging algorithm in the follow up of glaucoma progression in the highly myopic patients.…”
    Get full text
    Article
  3. 6743

    Quantum-enhanced Markov chain Monte Carlo for systems larger than a quantum computer by Stuart Ferguson, Petros Wallden

    Published 2025-03-01
    “…Example strategies within this framework are put to the test, with the quantum speedup persisting while using only sqrt[n] simulated qubits where n is the number of qubits required in the original QeMCMC—a quadratic reduction in resources. …”
    Get full text
    Article
  4. 6744
  5. 6745

    Toward Next-Generation Biologically Plausible Single Neuron Modeling: An Evolutionary Dendritic Neuron Model by Chongyuan Wang, Huiyi Liu

    Published 2025-04-01
    “…This paper proposes a Reinforced Dynamic-grouping Differential Evolution (RDE) algorithm to enhance synaptic plasticity within the DNM framework. …”
    Get full text
    Article
  6. 6746

    Radar Coincidence Imaging for Off-Grid Target Using Frequency-Hopping Waveforms by Xiaoli Zhou, Hongqiang Wang, Yongqiang Cheng, Yuliang Qin, Haowen Chen

    Published 2016-01-01
    “…AIM calibration algorithm adaptively adjusts the OGE and, meanwhile, seeks the optimal target reconstruction result.…”
    Get full text
    Article
  7. 6747

    A novel control solution to nonlinear systems of unmatched perturbations with unknown bounds by Akram Hashim Hameed, Shibly Ahmed Al-Samarraie, Amjad Jaleel Humaidi

    Published 2025-04-01
    “…The control design utilized the powerful backstepping control algorithm to decompose the nonlinear system into subsystems to provide global stability, while the barrier function ISMC has been adopted to cope with perturbation, avoid the pre-knowledge of upper bound in the perturbation, and mitigate the chattering effect in the control signal. …”
    Get full text
    Article
  8. 6748

    Assessing the impact of disease incidence and immunization on the resilience of complex networks during epidemics by M.D. Shahidul Islam, Mohammad Sharif Ullah, K.M. Ariful Kabir

    Published 2025-03-01
    “…This work thoroughly explores stochastic characteristics of epidemic propagation in homogeneous and heterogeneous networks through extensive theoretical analysis (positivity and boundedness of solutions, disease-free equilibrium point, basic reproduction number, endemic equilibrium point, stability analysis) and multi-agent simulation approach using the Gilespie algorithm. Results show that Ring and Lattice networks have small stochastic variations in the ultimate epidemic size, while BA-SF networks have disease transmission starting before the threshold value. …”
    Get full text
    Article
  9. 6749

    Efficient Aerial Data Collection with UAV in Large-Scale Wireless Sensor Networks by Chengliang Wang, Fei Ma, Junhui Yan, Debraj De, Sajal K. Das

    Published 2015-11-01
    “…This includes proposal of a Fast Path Planning with Rules (FPPWR) algorithm based on grid division, to increase the efficiency of path planning, while guaranteeing the length of the path to be relatively short. …”
    Get full text
    Article
  10. 6750

    An Intrusion Detection Model Based on Feature Selection and Improved One-Dimensional Convolutional Neural Network by Qingfeng Li, Bo Li, Linzhi Wen

    Published 2023-01-01
    “…This model first used the extreme gradient boosting decision tree (XGboost) algorithm to sort the preprocessed data, and then it used comparison to weed out 55 features with a higher contribution. …”
    Get full text
    Article
  11. 6751

    A Novel HPNVD Descriptor for 3D Local Surface Description by Jiming Sa, Xuecheng Zhang, Yuan Yuan, Yuyan Song, Liwei Ding, Yechen Huang

    Published 2024-12-01
    “…Moreover, the HPNVD-based point cloud registration algorithm shows excellent performance, further validating the effectiveness of the descriptor.…”
    Get full text
    Article
  12. 6752

    Unsupervised fake news detection on social media using hybrid Gaussian Mixture Model. by Sajida Perveen, Muhammad Shahbaz, Sami S Albouq, Khlood Shinan, Hanan E Alhazmi, Fatmah Alanazi, M Usman Ashraf, Rehan Ashraf

    Published 2025-01-01
    “…This research proposes an unsupervised approach using clustering algorithms, including Gaussian Mixture Model (GMM), K-means, and K-medoids, to eliminate the need for manual labeling in detecting fake news. …”
    Get full text
    Article
  13. 6753

    Microc alcification Segmentation Using Modified U-net Segmentation Network from Mammogram Images by Md Shamim Hossain

    Published 2022-02-01
    “…Breast cancer is the most common aggressive cancer in women while the early detection of this cancer can reduce the aggressiveness. …”
    Get full text
    Article
  14. 6754

    Efficient Material Flow and Storage Space Determination in Automated Distribution Centers by Mohammed Alnahhal, Nikola Gjeldum, Mohammed Ruzayqat

    Published 2024-01-01
    “…The model was solved using a genetic algorithm (GA) with special chromosome representations. …”
    Get full text
    Article
  15. 6755

    16-channel photonic solver for optimization problems on a silicon chip by Jiayi Ouyang, Shengping Liu, Ziyue Yang, Wei Wang, Xue Feng, Yongzhuo Li, Yidong Huang

    Published 2025-03-01
    “…The photonic chip is employed to perform the optical vector-matrix multiplication (OVMM) to calculate the cost function of the QUBO problem, while the electronic processor runs the heuristic algorithm to search for the optimal solution. …”
    Get full text
    Article
  16. 6756

    Learning with noisy labels via clean aware sharpness aware minimization by Bin Huang, Ying Xie, Chaoyang Xu

    Published 2025-01-01
    “…Based on these analyses, a clean aware sharpness aware minimization algorithm known as CA-SAM is proposed. CA-SAM dynamically divides the training data into possible likely clean and noisy datasets based on the historical model output and uses likely clean samples to determine the direction of the parameter perturbation. …”
    Get full text
    Article
  17. 6757

    On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things by Hong Yu, Jingsha He, Ruohong Liu, Dajie Ji

    Published 2013-09-01
    “…However, most present schemes developed for WSNs don't consider the Internet scenario while traditional mechanisms developed for the Internet are not suitable due to the resource constraint of sensor nodes. …”
    Get full text
    Article
  18. 6758

    Enhancing distance protection in transmission grids with high penetration of renewable energy sources through cooperative protection by Sayed Mahdi Koloushani, Seyed Abbas Taher

    Published 2024-11-01
    “…The decentralized nature of the proposed method enhances robustness and security, while its high‐speed operation is ensured through non‐iterative global consensus algorithms, which provide rapid fault detection and localization crucial for real‐time protection. …”
    Get full text
    Article
  19. 6759

    An Adaptive Vehicle Stability Enhancement Controller Based on Tire Cornering Stiffness Adaptations by Jianbo Feng, Zepeng Gao, Bingying Guo

    Published 2025-07-01
    “…A recursive regularized weighted least squares algorithm is designed to estimate tire cornering stiffness from measurable vehicle states, eliminating the need for additional tire sensors. …”
    Get full text
    Article
  20. 6760

    A Biologically Inspired Cost-Efficient Zero-Trust Security Approach for Attacker Detection and Classification in Inter-Satellite Communication Networks by Sridhar Varadala, Hao Xu

    Published 2025-07-01
    “…MRFCO-ZTS improves the accuracy of attacker detection while maintaining secure data exchange between authenticated satellites. …”
    Get full text
    Article