Showing 101 - 120 results of 31,575 for search '"algorithm"', query time: 0.18s Refine Results
  1. 101
  2. 102
  3. 103
  4. 104
  5. 105

    Diversity and multiplexing based on GMD algorithm by HE Zhong-tang1, AI Ju-mei2, HU Luo-quan1, ZHANG Li-jun1

    Published 2007-01-01
    Subjects: “…geometric mean decomposition algorithm…”
    Get full text
    Article
  6. 106

    The analysis of algorithm for transmitters locating problem by Saulius Lazaravičius, Narimantas Listopadskis

    Published 2023-09-01
    “… The analysis of ACO algorithm for transmitters locating problem is presented in this paper. …”
    Get full text
    Article
  7. 107
  8. 108
  9. 109

    Analysis of the Consecutive Mean Excision Algorithms by Johanna Vartiainen, Janne Lehtomäki, Harri Saarnisaari, Markku Juntti

    Published 2010-01-01
    “…The backward and forward consecutive mean excision (CME/FCME) algorithms are diagnostic methods for outlier (signal) detection. …”
    Get full text
    Article
  10. 110
  11. 111
  12. 112

    Trajectories anonymous algorithm for association attack by Lei ZHANG, Chun-guang MA, Song-tao YANG, Zeng-peng LI

    Published 2017-06-01
    “…During the location based service of continuous query,the trajectories which were produced by different movement types may reveal the privacy of user’s location.To solve this problem,a mechanism was proposed to put forward the real-time similar trajectories.With this mechanism,the subsequent position was calculated and which the dummy one was generated to establish an anonymous group,the demands of real-time trajectory anonymity were met,compensating the shortage of real-time trajectories of anonymity in other similar kinds of algorithm.Under this mechanism,a method for calculating subsequent anonymous position was proposed,which used the user's movement patterns,such as mobile direction,speed.The dummy trajectories were made very similar with the trajectory produced by the continuous query user.At the same time,the position of reachable difference in real areas was put forward,and on the basis of position reachable,this mechanism also filtrates out the unreachable candidate locations which had been calculated in the phase of dummy position generates,then decrease the probability of adversary identifies the real trajectory from the location of unreachable.Experimental results show that this method is effective for protecting the location privacy of continuous query user,and provides a good working efficiency.…”
    Get full text
    Article
  13. 113
  14. 114

    Crowdsourcing Evaluation of Video Summarization Algorithm by Avrajyoti Dutta, Dawid Juszka, Mikołaj Leszczuk

    Published 2024-11-01
    “…Thus, we are proposing an experiment that utilizes crowdsourcing to evaluate the efficacy of an algorithm that summarizes videos. A group of 45 individuals participated in the experiment, where each of them were asked to watch 24 videos, each of 30-second and 45-second duration. …”
    Get full text
    Article
  15. 115
  16. 116

    An Iterative Algorithm for a Hierarchical Problem by Yonghong Yao, Yeol Je Cho, Pei-Xia Yang

    Published 2012-01-01
    “…A general hierarchical problem has been considered, and an explicit algorithm has been presented for solving this hierarchical problem. …”
    Get full text
    Article
  17. 117

    Distributed Constrained Optimization Algorithms for Drones by Hongzhe Liu

    Published 2025-01-01
    “…The primary objective is to develop a distributed algorithm capable of tackling this optimization problem. …”
    Get full text
    Article
  18. 118

    Data scrambler knight tour algorithm by Вадим Романюк, Світлана Яремко, Олена Кузьміна, Анна Єгошина

    Published 2024-09-01
    “…Based on the knight tour matrix, data scrambler and descrambler algorithms are presented in the same manner. The algorithms have a linear time complexity. …”
    Get full text
    Article
  19. 119
  20. 120