Showing 501 - 520 results of 31,575 for search '"algorithm"', query time: 0.11s Refine Results
  1. 501
  2. 502

    Generalized Cycle Benchmarking Algorithm for Characterizing Midcircuit Measurements by Zhihan Zhang, Senrui Chen, Yunchao Liu, Liang Jiang

    Published 2025-01-01
    “…Finally, we conduct numerical simulations to illustrate the practical applicability of the algorithm. Similar to other CB-type algorithms, we expect the algorithm to provide a useful toolkit that is of experimental interest.…”
    Get full text
    Article
  3. 503

    Naive Bayes-Guided Bat Algorithm for Feature Selection by Ahmed Majid Taha, Aida Mustapha, Soong-Der Chen

    Published 2013-01-01
    “…The performance of the proposed feature selection algorithm was investigated using twelve benchmark datasets from different domains and was compared to three other well-known feature selection algorithms. …”
    Get full text
    Article
  4. 504

    A Study on the Security Algorithm for Contexts in Smart Cities by Hoon Ko, Kitae Bae, Sang Heon Kim, Kyung Jin An

    Published 2014-06-01
    “…Each customised service usually keeps tailored security policy and algorithm. Conventionally, every service including different servers, network, and users employs the same security algorithm so that sensitive information could be traced and revealed by using counter tracing method. …”
    Get full text
    Article
  5. 505
  6. 506

    Enhanced Tunicate Swarm Algorithm for Big Data Optimization by Emine Baş

    Published 2023-04-01
    “…One of them is metaheuristic algorithms. Meta-heuristic methods, which have been used by very few researchers yet, have become increasingly common. …”
    Get full text
    Article
  7. 507

    Lightweight Barcode Positioning Algorithm Based on YOLO Model by Chaochao Li, Qingtao Zeng, Likun Lu

    Published 2024-01-01
    “…An improved YOLO-MCG barcode localization algorithm was proposed to address the problems of interference, inefficiency, and poor real-time performance encountered by traditional barcode detection methods in complex backgrounds and field environments. …”
    Get full text
    Article
  8. 508
  9. 509
  10. 510

    An Improved Physarum polycephalum Algorithm for the Shortest Path Problem by Xiaoge Zhang, Qing Wang, Andrew Adamatzky, Felix T. S. Chan, Sankaran Mahadevan, Yong Deng

    Published 2014-01-01
    “…We also compare our algorithm with other existing algorithms, including the ant colony optimization algorithm and Dijkstra algorithm.…”
    Get full text
    Article
  11. 511

    Genetic Algorithm for Biobjective Urban Transit Routing Problem by J. S. C. Chew, L. S. Lee, H. V. Seow

    Published 2013-01-01
    “…The proposed algorithm employs an adding-node procedure which helps in converting an infeasible solution to a feasible solution. …”
    Get full text
    Article
  12. 512

    Online Boosting tracking algorithm combined with occlusion sensing by Ya-wen WANG, Hong-chang CHEN, Shao-mei LI, Chao GAO

    Published 2016-09-01
    “…Online Boosting tracking algorithm combined with occlusion sensing was presented.In this method,occlusion sensor was introduced to check the tracking results,and classifier updating strategy was adjusted depending on the occlusion checking results.By this way,the feature pool of the classifier can be kept pure,which will improve the tracking robustness under occlusion.Experimental results show that compared with traditional Boosting tracking algorithm,improved algorithm can solve the problem of occlusion very well.…”
    Get full text
    Article
  13. 513

    Hadoop bottleneck detection algorithm based on information gain by Zaole TAN, Zhifeng HAO, Ruichu CAI, Xiaojun XIAO, Yu LU

    Published 2016-07-01
    “…Hadoop has become a major platform for big data storage and large data mining nowadays.Although Hadoop platform achieves high performance parallel computing through a distributed cluster of machines,the bottlenecks will inevitably appear on a machine when cluster load increases,because the cluster is composed of inexpensive host.Aiming at this problem,a bottleneck detection algorithms based on information gain was proposed.The algorithm detected cluster's bottlenecks resource by computing the information gain of each resource.The experiments show that the bottleneck detection algorithm is feasible.…”
    Get full text
    Article
  14. 514

    Nonexposure Accurate Location K-Anonymity Algorithm in LBS by Jinying Jia, Fengli Zhang

    Published 2014-01-01
    “…Experimental results show that our algorithms are more secure than the existent cloaking algorithms, need not have all the users reporting their locations all the time, and can generate smaller ASR.…”
    Get full text
    Article
  15. 515

    Comparison of Two Algorithms for Multiline Bus Dynamic Dispatching by Yingxin Liu, Xinggang Luo, Shengping Cheng, Yang Yu, Jiafu Tang, Xuanzhu Shang

    Published 2022-01-01
    “…By comparing the experimental results of genetic algorithm (GA) and hyperheuristic algorithm in solving different scenarios, the results show that in smooth, increasing, decreasing, and multiconvex passenger flow mode, the performance of the hyperheuristic algorithm is higher than that of GA. …”
    Get full text
    Article
  16. 516

    Algorithm to design UWB pulse based on the peak frequency by ZOU Wei-xia1, ZHANG Chun-qing2, ZHOU Zheng1

    Published 2005-01-01
    “…Not like other algorithms that only work out one pulse, the proposed algorithm can lead to the design of a myriad of pulses that are compliant, namely, it can figure out all α which satisfy the regulation and give out the range of α.…”
    Get full text
    Article
  17. 517
  18. 518

    ALBERTA: ALgorithm-Based Error Resilience in Transformer Architectures by Haoxuan Liu, Vasu Singh, Michal Filipiuk, Siva Kumar Sastry Hari

    Published 2025-01-01
    “…Ensuring the correct execution of these models in GPUs is critical, despite the potential for transient hardware errors. We propose a novel algorithm-based resilience framework called ALBERTA that allows us to perform end-to-end resilience analysis and protection of transformer-based architectures. …”
    Get full text
    Article
  19. 519

    Power services scheduling algorithm based on quantum communication by Zhuozhi YU, Yefeng ZHANG, Bingyang HAN, Wenwei CHEN, Dong WANG

    Published 2019-11-01
    “…Quantum communication could effectively improve the transmission’s reliability and security of power system services.However,limited by the generating rate of quantum key,it was difficult to meet the encryption requirements of important services.Therefore,a queue scheduling algorithm was required to legitimately schedule the power system services which need to be encrypted in quantum communication.An improved weighted fair queuing (weighted fair queuing,WFQ) algorithm LD-WFQ was proposed.By estimating the expected delay of the data packets to be encrypted,sending the packets that would soon be timeout,the proposed algorithm effectively reduced the timeout ratio of the packets and improved the effective utilization of quantum keys,while maintaining the timeout ratio of the packets in high priority queue at a low level.Compared with the WFQ algorithm,the simulation result proves the superiority of LD-WFQ algorithm.…”
    Get full text
    Article
  20. 520