Showing 14,241 - 14,260 results of 19,511 for search '"algorithm"', query time: 0.10s Refine Results
  1. 14241

    Exploiting Multiple Channels for Low Latency and Semireliable Broadcasting in Cognitive Wireless Sensor Networks by Tae-Sung Kim, Sok-Hyong Kim, Bo-Kyum Kim, Young-Yong Kim

    Published 2015-10-01
    “…Channel assignment algorithms can be applied in cognitive radio enabled networks which performs dynamic channel configuration for utilizing multiple channels. …”
    Get full text
    Article
  2. 14242

    A Design Procedure and Control Method for Improving Efficiency of a Family of Resonant Converters Over Wide Operating Conditions by Jasem Shahsevani, Reza Beiranvand

    Published 2025-01-01
    “…Here, a novel design procedure and control method are proposed for the resonant converters, which have parallel components in their resonant tank circuits to address their light-load or no-load low-efficiency issues. This control algorithm is based on the frequency modulation method and utilizes a variable capacitor or inductor in the resonant tank circuit, simultaneously. …”
    Get full text
    Article
  3. 14243

    Initialization Methods for FPGA-Based EMT Simulations by Xin Ma, Xiao-Ping Zhang

    Published 2024-01-01
    “…To accelerate initialization, software-to-hardware algorithm and structure are developed to automate initialization data sources for different topologies. …”
    Get full text
    Article
  4. 14244

    Parallel Integral Equation-Based Nonoverlapping DDM for Solving Challenging Electromagnetic Scattering Problems of Two Thousand Wavelengths by Qin Su, Yingyu Liu, Xunwang Zhao, Zongjing Gu, Chang Zhai, Zhongchao Lin, Weijun Wu

    Published 2019-01-01
    “…A parallel multilevel fast multipole algorithm (MLFMA) is extended to accelerate matrix-vector multiplications of subdomains as well as the coupling between them, and the coupling between different subdomains is computed in the manner of near field to avoid the storage of the mutual impedance. …”
    Get full text
    Article
  5. 14245

    Development of an AI-Enabled Q-Agent for Making Data Offloading Decisions in a Multi-RAT Wireless Network by Murk Marvi, Adnan Aijaz, Anam Qureshi, Muhammad Khurram

    Published 2024-01-01
    “…We employ a model-free Q-learning algorithm for training of the Q-agent. We use stochastic geometry as a tool for estimating the average data rate offered by the network in a given region by considering the effect of interference. …”
    Get full text
    Article
  6. 14246

    Complexity Analysis of New Future Video Coding (FVC) Standard Technology by Soulef Bouaafia, Randa Khemiri, Seifeddine Messaoud, Fatma Elzahra Sayadi

    Published 2021-01-01
    “…In this paper, we provide a fast FVC algorithm to achieve better performance and to reduce encoding complexity. …”
    Get full text
    Article
  7. 14247

    Intelligent Traffic Management System Based on the Internet of Vehicles (IoV) by Samir A. Elsagheer Mohamed, Khaled A. AlShalfan

    Published 2021-01-01
    “…Our proposed adaptive algorithm not only significantly reduces the average waiting time (delay) but also increases the number of serviced vehicles. …”
    Get full text
    Article
  8. 14248

    Fermentasi biji durian khas Kalimantan sebagai pengganti tepung terigu dengan metode perendaman berseri by Jefri Pandu Hidayat, Siti Munfarida, Asful Hariyadi

    Published 2025-01-01
    “…Runge-Kutta (RK) third-order method used the kinetic modeling algorithm. The RK solver was completed using the optimization solver in Ms. …”
    Get full text
    Article
  9. 14249

    Exploiting the Composite Step Strategy to the Biconjugate A-Orthogonal Residual Method for Non-Hermitian Linear Systems by Yan-Fei Jing, Ting-Zhu Huang, Bruno Carpentieri, Yong Duan

    Published 2013-01-01
    “…Another benefit acquired is that it seems to be a viable algorithm providing some further practically desired smoothing of the convergence history of the norm of the residuals, which is justified by numerical experiments. …”
    Get full text
    Article
  10. 14250

    Runoff Prediction and Uncertainty Analysis for Xijiang River Basin Based on CMIP6 Climate Scenarios by WU Huiming, YAN Meng, ZHOU Shuai

    Published 2025-01-01
    “…Based on this, the Xin'anjiang hydrological model (XAJ) is built, and the particle swarm optimization (PSO) algorithm is employed to calibrate and validate the model parameters. …”
    Get full text
    Article
  11. 14251

    Cascaded H-Bridge MLI and Three-Phase Cascaded VSI Topologies for Grid-Connected PV Systems with Distributed MPPT by Abdullah M. Noman, Khaled E. Addoweesh, Ayman A. Alabduljabbar, Abdulrahman I. Alolah

    Published 2019-01-01
    “…Distributed maximum power point tracking (MPPT) of PV modules using perturbation and observation algorithm is used for all presented topologies. In all presented configurations, each PV module is connected to one DC-DC isolated Ćuk converter for best MPPT achievement. …”
    Get full text
    Article
  12. 14252

    Fatigue Driving Prediction on Commercial Dangerous Goods Truck Using Location Data: The Relationship between Fatigue Driving and Driving Environment by Shifeng Niu, Guiqiang Li

    Published 2020-01-01
    “…The driver’s yawn data are used as a proxy for ground truth for the classification algorithm. From the six different categories of the predictor set, we obtain a set of 17 predictor variables to train logistic regression, neural network, and random forest classifiers. …”
    Get full text
    Article
  13. 14253

    Null Field and Interior Field Methods for Laplace’s Equation in Actually Punctured Disks by Hung-Tsai Huang, Ming-Gong Lee, Zi-Cai Li, John Y. Chiang

    Published 2013-01-01
    “…For the NFM, the conservative schemes were proposed in Lee et al. (2013), and the algorithm singularity was fully investigated in Lee et al., submitted to Engineering Analysis with Boundary Elements, (2013). …”
    Get full text
    Article
  14. 14254

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  15. 14255

    Revisiting the trading activity of high-frequency trading firms around ultra-fast flash events by Christophe Desagre, Floris Laly, Mikael Petitjean

    Published 2025-01-01
    “…We compare our sample of SFEs with both the so-called “mini flash crashes”, as identified by the Nanex detection algorithm, and the so-called EPMs, as identified by Brogaard et al. (2018). …”
    Get full text
    Article
  16. 14256

    AI-Based Screening Method for Early Identification of Invasive Ductal Carcinoma in Breast Cancer by Dominik Jánošík, Sila Yavuz

    Published 2024-06-01
    “…To achieve this, we utilized a deep learning neural network algorithm, employing histopathological microscopic datasets and histological microscopic images from 124 and 576 patients with ductal carcinoma of the breast, respectively. …”
    Get full text
    Article
  17. 14257

    Construction of a 5G Wireless Semantic Web-Assisted English Digital Learning Resource Query System by Lili Liu

    Published 2021-01-01
    “…We propose a quality algorithm for 5G wireless networks, which not only captures the characteristics of 5G wireless networks such as local broadcast and node movement but also combines quality predicates as guards with broadcast reception actions, which are used to portray that a node can continue to execute subsequent processes only when the node reception actions satisfy certain conditions, which works together with the node default value mechanism to reduce the impact caused by unreliable links. …”
    Get full text
    Article
  18. 14258

    Adaptive Filtering for Channel Estimation in RIS-Assisted mmWave Systems by Shuying Shao, Tiejun Lv, Pingmu Huang

    Published 2025-01-01
    “…These algorithms leverage the sparse nature of mmWave channels to improve estimation accuracy. …”
    Get full text
    Article
  19. 14259

    Active Vibration Control of Helicopter Maneuvering Flight Using Feedforward-Robust Hybrid Control Based on Reference Signal Reconstruction by Yifan Qin, Yang Lu, Jinchao Ma, Huiyu Yue

    Published 2021-01-01
    “…Numerical and experimental results reveal that the proposed algorithm is practical for suppressing transient disturbance and multifrequency helicopter vibration response during maneuvering flight with faster convergence speed and better robustness.…”
    Get full text
    Article
  20. 14260

    Task Offloading with LLM-Enhanced Multi-Agent Reinforcement Learning in UAV-Assisted Edge Computing by Feifan Zhu, Fei Huang, Yantao Yu, Guojin Liu, Tiancong Huang

    Published 2024-12-01
    “…The application of value decomposition algorithms for UAV trajectory planning has drawn considerable research attention. …”
    Get full text
    Article