Showing 121 - 140 results of 12,962 for search 'while algorithm', query time: 0.10s Refine Results
  1. 121

    An Optimized Strategy Coverage Control Algorithm for WSN by Zeyu Sun, Weiguo Wu, Huanzhao Wang, Heng Chen, Wei Wei

    Published 2014-07-01
    “…Thirdly, OSCC picks out the optimal routing solution while conducting combinatorial optimization of routing path using ant colony optimization (ACO) algorithm, thus reducing the energy spending of whole network. …”
    Get full text
    Article
  2. 122

    Observations on TETRA Encryption Algorithm TEA-3 by Jens Alich, Amund Askeland, Subhadeep Banik, Tim Beyne, Anne Canteaut, Patrick Felke, Gregor Leander, Willi Meier, Lukas Stennes

    Published 2025-03-01
    “… We present a number of observations on TEA-3, a stream cipher used in TETRA radio networks that was kept secret until recently. While the same also holds for the six other TETRA encryption algorithms, we pick TEA-3 to start with, as (i) it is not obviously weakened as TEA-{1,4,7} but (ii) in contrast to TEA-2 it is approved for extra-European emergency service, and (iii) as already noted by [MBW23] the TEA-3 design surprisingly contains a non-bijective S-box. …”
    Get full text
    Article
  3. 123

    Metaheuristic Algorithms for Optimization: A Brief Review by Vinita Tomar, Mamta Bansal, Pooja Singh

    Published 2024-03-01
    “…In the area of optimization, metaheuristic algorithms have attracted a lot of interest. For many centuries, human beings have utilized metaheuristic algorithms as a problem-solving approach. …”
    Get full text
    Article
  4. 124

    Dataflow-Driven Crowdsourcing: Relational Models and Algorithms by D. A. Ustalov

    Published 2016-04-01
    “…Data processing stages and connections between them are expressed by using collaborative computation workflows represented as loosely connected directed acyclic graphs. A synchronous algorithm for executing such workflows has been described. …”
    Get full text
    Article
  5. 125

    Subsampling Algorithms for Irregularly Spaced Autoregressive Models by Jiaqi Liu, Ziyang Wang, HaiYing Wang, Nalini Ravishanker

    Published 2024-11-01
    “…To overcome this challenge, subsampling algorithms are widely used to perform statistical analyses on smaller, more manageable subsets of the data. …”
    Get full text
    Article
  6. 126

    Short Cyclic Algorithm for Turbo Block Construction by Stefan Vranjevac, Dejan Gavran, Sanja Fric, Vladan Ilić, Filip Trpčevski, Miloš Lukić, Nikola Milovanović

    Published 2024-10-01
    “…This paper presents perhaps the shortest possible algorithm for drafting a turbo block in a standard CAD environment. …”
    Get full text
    Article
  7. 127

    Generation Algorithms for Thévenin and Norton Equivalent Circuits by Mihaela Grib, Ioana-Gabriela Sirbu, Lucian Mandache, Marilena Stanculescu, Mihai Iordache, Lavinia Bobaru, Dragos Niculae

    Published 2025-03-01
    “…The growing complexity of electrical systems requires advanced analysis tools to optimize the design time and resources. While many circuit simulators exist, they often lack the flexibility needed for real-world applications. …”
    Get full text
    Article
  8. 128

    Exact Algorithms for the Satellite Image Selection Problem by Swat Sylwester, Antczak Maciej, Zok Tomasz, Blazewicz Jacek, Musial Jedrzej

    Published 2025-06-01
    “…These algorithms show quality and efficiency compared with existing approaches and are expected to benefit various industrial applications.…”
    Get full text
    Article
  9. 129

    Limited Comp Handover Algorithm For LTE-Advanced by Cheng-Chung Lin, Kumbesan Sandrasegaran, Xinning Zhu, Zhuliang Xu

    Published 2013-01-01
    “…This paper proposes a new handover algorithm known as Limited CoMP Handover Algorithm to support JP in CoMP and overcome the system capacity issue. …”
    Get full text
    Article
  10. 130

    RGB-DSLAM Visual Odometry Optimization Algorithm by DONG Jing-wei, JIANG Yi-ming, HAN Zhi-yu

    Published 2020-12-01
    “…In view of the long time-consuming and poor precision of RGB-D SLAM algorithm in the field ofvisual SLAM,an implementation scheme of RGB-D SLAM visual odometry is proposed. …”
    Get full text
    Article
  11. 131

    Two lines of parallel translation of PMVS algorithm by Liying Fan

    Published 2025-12-01
    “…The time used by the two algorithms in the first stage is given. According to the data in the table, for the data set Temple, the original algorithm takes 49 s, while the improved PMVS algorithm takes 85 s, which takes more time than the original algorithm.…”
    Get full text
    Article
  12. 132

    Stochastic Explicit Calibration Algorithm for Survival Models by Jeongho Park, Sangwook Kang, Gwangsu Kim

    Published 2025-01-01
    “…In this study, we introduce Stochastic Explicit Calibration (S-cal), an algorithm that employs random intervals instead of fixed bins, thereby advancing the calibration methods used in deep networks. …”
    Get full text
    Article
  13. 133

    An Environment Recognition Algorithm for Staircase Climbing Robots by Yanjie Liu, Yanlong Wei, Chao Wang, Heng Wu

    Published 2024-12-01
    “…For deformed wheel-based staircase-climbing robots, the accuracy of staircase step geometry perception and scene mapping are critical factors in determining whether the robot can successfully ascend the stairs and continue its task. Currently, while there are LiDAR-based algorithms that focus either on step geometry detection or scene mapping, few comprehensive algorithms exist that address both step geometry perception and scene mapping for staircases. …”
    Get full text
    Article
  14. 134

    Black Hole Algorithm for Software Requirements Prioritization by Norah Ibrahim Alfassam, M. Abdullah-Al-Wadud, Mubarak Rashed Alrashoud

    Published 2025-01-01
    “…Furthermore, the proposed BHA-based solution was evaluated on three real-world datasets (RALIC, Word, and ReleasePlanner), and its performance was compared with that of multiple state-of-the-art algorithms, including Ant Colony Optimization (ACO), Genetic Algorithm (GA), Grey Wolf Optimizer (GWO), Particle Swarm Optimization (PSO), Fitness Dependent Optimizer (FDO), Goose Algorithm (GAO), and Lagrange Elementary Optimization (LEO). …”
    Get full text
    Article
  15. 135

    Algorithm Design for an Online Berth Allocation Problem by Cong Chen, Fanxin Wang, Jiayin Pan, Lang Xu, Hongming Gao

    Published 2024-09-01
    “…The numerical simulation of competitive ratios reveals distinct advantages for different algorithms depending on job size. For smaller job sizes, the Greedy algorithm emerges as the most efficient, while for medium-sized jobs, the RS algorithm proves to be the most effective.…”
    Get full text
    Article
  16. 136
  17. 137

    Algorithms for the management of scars: the importance of systematizing behaviors by Francisco Felipe Góis de Oliveira, Nathalia Moreira De Almeida França, Elvio Bueno Garcia, Leila Blanes, Alessandra Haddad

    Published 2023-08-01
    “…The objective is to carry out a narrative review of the literature on scar management algorithms and create an updated algorithm. …”
    Get full text
    Article
  18. 138

    DIDADTIC TOOLS FOR THE STUDENTS’ ALGORITHMIC THINKING DEVELOPMENT by T. P. Pushkaryeva, T. A. Stepanova, V. V. Kalitina

    Published 2017-12-01
    “…Modern engineers must possess high potential of cognitive abilities, in particular, the algorithmic thinking (AT). In this regard, the training of future experts (university graduates) of technical specialities has to provide the knowledge of principles and ways of designing of various algorithms, abilities to analyze them, and to choose the most optimal variants for engineering activity implementation. …”
    Get full text
    Article
  19. 139

    Data Security Model Using (AES-LEA) Algorithms for WoT Environment by Zinah A. Al-jazaeri, Joolan Rokan Naif, Ahmad Mohamad Ghandour

    Published 2025-06-01
    “…This paper presents a new hybrid method for the encryption of information to be more suitable for embedded devices in the WoT environment by modifying the Advanced Encryption Standard AES algorithm and hybridizing it with the Lightweight Encryption Algorithm LEA algorithm as well as the Secure Hash Algorithm version 3 SHA3-256 algorithm for integrity and using four dimensional-NSJR system for generation of chaos keys. …”
    Get full text
    Article
  20. 140

    Investigation of The Effect of Feeding Period in Honey Bee Algorithm by Mustafa Kaya

    Published 2022-12-01
    “…As a result, the analysis results showed that the performance of the artificial bee colony algorithm is very good while solving too complex engineering optimization problems.…”
    Get full text
    Article