-
121
An Optimized Strategy Coverage Control Algorithm for WSN
Published 2014-07-01“…Thirdly, OSCC picks out the optimal routing solution while conducting combinatorial optimization of routing path using ant colony optimization (ACO) algorithm, thus reducing the energy spending of whole network. …”
Get full text
Article -
122
Observations on TETRA Encryption Algorithm TEA-3
Published 2025-03-01“… We present a number of observations on TEA-3, a stream cipher used in TETRA radio networks that was kept secret until recently. While the same also holds for the six other TETRA encryption algorithms, we pick TEA-3 to start with, as (i) it is not obviously weakened as TEA-{1,4,7} but (ii) in contrast to TEA-2 it is approved for extra-European emergency service, and (iii) as already noted by [MBW23] the TEA-3 design surprisingly contains a non-bijective S-box. …”
Get full text
Article -
123
Metaheuristic Algorithms for Optimization: A Brief Review
Published 2024-03-01“…In the area of optimization, metaheuristic algorithms have attracted a lot of interest. For many centuries, human beings have utilized metaheuristic algorithms as a problem-solving approach. …”
Get full text
Article -
124
Dataflow-Driven Crowdsourcing: Relational Models and Algorithms
Published 2016-04-01“…Data processing stages and connections between them are expressed by using collaborative computation workflows represented as loosely connected directed acyclic graphs. A synchronous algorithm for executing such workflows has been described. …”
Get full text
Article -
125
Subsampling Algorithms for Irregularly Spaced Autoregressive Models
Published 2024-11-01“…To overcome this challenge, subsampling algorithms are widely used to perform statistical analyses on smaller, more manageable subsets of the data. …”
Get full text
Article -
126
Short Cyclic Algorithm for Turbo Block Construction
Published 2024-10-01“…This paper presents perhaps the shortest possible algorithm for drafting a turbo block in a standard CAD environment. …”
Get full text
Article -
127
Generation Algorithms for Thévenin and Norton Equivalent Circuits
Published 2025-03-01“…The growing complexity of electrical systems requires advanced analysis tools to optimize the design time and resources. While many circuit simulators exist, they often lack the flexibility needed for real-world applications. …”
Get full text
Article -
128
Exact Algorithms for the Satellite Image Selection Problem
Published 2025-06-01“…These algorithms show quality and efficiency compared with existing approaches and are expected to benefit various industrial applications.…”
Get full text
Article -
129
Limited Comp Handover Algorithm For LTE-Advanced
Published 2013-01-01“…This paper proposes a new handover algorithm known as Limited CoMP Handover Algorithm to support JP in CoMP and overcome the system capacity issue. …”
Get full text
Article -
130
RGB-DSLAM Visual Odometry Optimization Algorithm
Published 2020-12-01“…In view of the long time-consuming and poor precision of RGB-D SLAM algorithm in the field ofvisual SLAM,an implementation scheme of RGB-D SLAM visual odometry is proposed. …”
Get full text
Article -
131
Two lines of parallel translation of PMVS algorithm
Published 2025-12-01“…The time used by the two algorithms in the first stage is given. According to the data in the table, for the data set Temple, the original algorithm takes 49 s, while the improved PMVS algorithm takes 85 s, which takes more time than the original algorithm.…”
Get full text
Article -
132
Stochastic Explicit Calibration Algorithm for Survival Models
Published 2025-01-01“…In this study, we introduce Stochastic Explicit Calibration (S-cal), an algorithm that employs random intervals instead of fixed bins, thereby advancing the calibration methods used in deep networks. …”
Get full text
Article -
133
An Environment Recognition Algorithm for Staircase Climbing Robots
Published 2024-12-01“…For deformed wheel-based staircase-climbing robots, the accuracy of staircase step geometry perception and scene mapping are critical factors in determining whether the robot can successfully ascend the stairs and continue its task. Currently, while there are LiDAR-based algorithms that focus either on step geometry detection or scene mapping, few comprehensive algorithms exist that address both step geometry perception and scene mapping for staircases. …”
Get full text
Article -
134
Black Hole Algorithm for Software Requirements Prioritization
Published 2025-01-01“…Furthermore, the proposed BHA-based solution was evaluated on three real-world datasets (RALIC, Word, and ReleasePlanner), and its performance was compared with that of multiple state-of-the-art algorithms, including Ant Colony Optimization (ACO), Genetic Algorithm (GA), Grey Wolf Optimizer (GWO), Particle Swarm Optimization (PSO), Fitness Dependent Optimizer (FDO), Goose Algorithm (GAO), and Lagrange Elementary Optimization (LEO). …”
Get full text
Article -
135
Algorithm Design for an Online Berth Allocation Problem
Published 2024-09-01“…The numerical simulation of competitive ratios reveals distinct advantages for different algorithms depending on job size. For smaller job sizes, the Greedy algorithm emerges as the most efficient, while for medium-sized jobs, the RS algorithm proves to be the most effective.…”
Get full text
Article -
136
New Algorithm for Conservative Treatment of Patients with Keratoconus
Published 2020-06-01Get full text
Article -
137
Algorithms for the management of scars: the importance of systematizing behaviors
Published 2023-08-01“…The objective is to carry out a narrative review of the literature on scar management algorithms and create an updated algorithm. …”
Get full text
Article -
138
DIDADTIC TOOLS FOR THE STUDENTS’ ALGORITHMIC THINKING DEVELOPMENT
Published 2017-12-01“…Modern engineers must possess high potential of cognitive abilities, in particular, the algorithmic thinking (AT). In this regard, the training of future experts (university graduates) of technical specialities has to provide the knowledge of principles and ways of designing of various algorithms, abilities to analyze them, and to choose the most optimal variants for engineering activity implementation. …”
Get full text
Article -
139
Data Security Model Using (AES-LEA) Algorithms for WoT Environment
Published 2025-06-01“…This paper presents a new hybrid method for the encryption of information to be more suitable for embedded devices in the WoT environment by modifying the Advanced Encryption Standard AES algorithm and hybridizing it with the Lightweight Encryption Algorithm LEA algorithm as well as the Secure Hash Algorithm version 3 SHA3-256 algorithm for integrity and using four dimensional-NSJR system for generation of chaos keys. …”
Get full text
Article -
140
Investigation of The Effect of Feeding Period in Honey Bee Algorithm
Published 2022-12-01“…As a result, the analysis results showed that the performance of the artificial bee colony algorithm is very good while solving too complex engineering optimization problems.…”
Get full text
Article