Showing 17,481 - 17,500 results of 19,511 for search '"algorithm"', query time: 0.11s Refine Results
  1. 17481

    Solving combinatorial optimization problems through stochastic Landau-Lifshitz-Gilbert dynamical systems by Dairong Chen, Andrew D. Kent, Dries Sels, Flaviano Morone

    Published 2025-02-01
    “…Our method produces solutions that compare favorably with those obtained using state-of-the-art minimization algorithms (such as simulated annealing) while offering the advantage of being physically realizable by means of arrays of stochastic magnetic tunnel-junction devices.…”
    Get full text
    Article
  2. 17482

    Applying a Probabilistic Network Method to Solve Business-Related Few-Shot Classification Problems by Lang Wu, Menggang Li

    Published 2021-01-01
    “…It can be challenging to learn algorithms due to the research of business-related few-shot classification problems. …”
    Get full text
    Article
  3. 17483

    Study on the Trajectory Planning Method for High Bearing Capacity of Joint Manipulator by Tang Runzhi, Li Tiejuni, Yang Dongi

    Published 2020-07-01
    “…The torque peak of the manipulator is suppressed to lowest by using genetic algorithms to optimize the motion parameters of the curve. …”
    Get full text
    Article
  4. 17484

    A lightweight privacy-preserving truth discovery mechanism for IoT by Yingjie HE, Qiwei LI, Han SUN, Di GAO, Jianfeng DONG, Shuhua YANG

    Published 2021-05-01
    “…In order to solve diverse quality and privacy leakage of perceived data in fog-cloud integrated internet of things (IoT), a streaming encryption-based privacy-preserving truth discovery mechanism for IoT was proposed.Firstly, by utilizing shuffling and streaming encryption algorithms, the ground truths and the weights were anonymously updated on the cloud server and fog server, respectively, so that the collusion attacks between malicious attackers and cloud or fog servers could be resisted to defend against privacy leakage of IoT devices.Secondly, by adopting the Softmax function, the device weights were calculated on fog server, which reduces the error rate for calculating the ground truths.Finally, the theoretical analysis proved that the mechanism could protect privacy of the devices.And, the experimental results demonstrate that the proposed mechanism is an effective privacy-preserving trust discovery mechanism for large-scale IoT devices, which can outperform existing ones in computing efficiency.…”
    Get full text
    Article
  5. 17485

    Modeling and verifying based on timed automata of Internet of things gateway security system by Guoqing WANG, Lei ZHUANG, Ruimin WANG, Yu SONG, Kunli ZHANG

    Published 2018-03-01
    “…The Internet of things (IoT) is a multiple heterogeneous network,and its perception layer is often faced with various security threats.As the bridge between the perception layer and the network layer,the IoT gateway should have the security management function to prevent the security issue from spreading to the upper layer.According to the current security deficiencies in IoT gateway,a universal IoT gateway security system was proposed based on the IoT gateway middleware technology.Various security protocols or algorithms can be embedded in IoT gateway security system,and the modeling and analysis can help the design and implementation of IoT gateway.The formal modeling and verification of the IoT gateway security system was performed by timed automata.The results show that the IoT gateway security system satisfies the security properties of confidentiality,availability,authenticity,robustness,integrity and freshness.…”
    Get full text
    Article
  6. 17486

    Research on Architecture of LEO Satellite Internet of Things and Key Technologies by Xiaojin DING, Tao HONG, Rui LIU, Wentao PENG, Gengxin ZHANG

    Published 2021-12-01
    “…First, we analyzed the composition and demand characteristics of LEO satellite IoTs, and designed an architecture of LEO satellite IoTs.Second, to extracted characteristics of electromagnetic environment and channel, we studied electromagnetic environment and channel sensing methods through constructing neural network model.Then, we investigated an active terminal-identifi cation method for detecting active terminals.Finally, considered multiple-input multiple-output as the main approach to improved the capacity of terrestrial mobile communication systems, we explored a pair of algorithms of mining satellite spatial resources for realizing the collision mitigation and capacity improvement of LEO IoT terminals.Simulation results showed that the designed method sofmining spatial-domain resources could mitigated eff ectively signal collisions among IoT terminals, and improved signifi cantly the concurrent accessing number of LEO satellite IoT terminals.…”
    Get full text
    Article
  7. 17487

    Keyword spotting system for broadcast news by ZHANG Peng-yuan, SHAO Jian, ZHAO Qing-wei, YAN Yong-hong

    Published 2007-01-01
    “…A two-step keyword spotting strategy was presented.This strategy allowed to change keyword list conven-iently.Different from the previous systems,search space was generated based on all Chinese syllables,not specifically for keywords.Phoneme recognition was performed without any lexical constraints.With 1-best phoneme sequence and keyword list,which generated keyword hypotheses.At last,two confidence measures were introduced adopted in the sys-tem: one based on acoustic model and the other based on phoneme lattice.For a decoded speech frame aligned to an HMM state,the acoustic confidence was calculated.The lattice confidence made use of phoneme lattices generated by a phoneme recognizer.These two confidence measures were combined using a weighting factor to obtain a hybrid confi-dence as they had different dynamic scales.Experiments show that the proposed algorithms significantly improve the system performance on the broadcast news task.…”
    Get full text
    Article
  8. 17488

    COMPRESSION OF HIGH DYNAMIC RANGE OF SAR IMAGES by Yu. I. Golub

    Published 2018-06-01
    “…Objectives of study were comparison of known approaches to compression of the high dynamic range images; selection of optimal parameters for compression algorithms, and selection of a no-reference measure for image quality assessment after compression. …”
    Get full text
    Article
  9. 17489

    GAN-based channel estimation for massive MIMO system by Yuxiu HUA, Rongpeng LI, Zhifeng ZHAO, Jianjun WU, Honggang ZHANG

    Published 2021-06-01
    “…As a key technology of 5G, massive MIMO system can significantly improve spectrum efficiency and energy efficiency by equipping a large number of antennas in base stations.However, in massive MIMO system, accurate channel estimation faces severe challenges.In order to estimate the channel accurately when the pilot sequence length is smaller than the number of transmitting antennas and the channel noise is strong, the estimation method N2N-GAN was proposed.N2N-GAN firstly denoised the pilot channel at the receiving end, and then used the conditional generative adversarial network to estimate the channel matrix according to the denoised pilot signal.Simulation experiments show that N2N-GAN achieves better robustness against noise compared with traditional channel estimation algorithms and deep learning-based methods.Meanwhile, it can adapt to scenarios with fewer pilot symbols and more antennas.…”
    Get full text
    Article
  10. 17490

    Real-Time Multichannel Imaging Framework for Endoscopy, Catheters, and Fixed Geometry Intraoperative Systems by Rahul A. Sheth, Rabi Upadhyay, Ralph Weissleder, Umar Mahmood

    Published 2007-05-01
    “…The capabilities include acquisition and visualization algorithms that perform registration, segmentation, and histogram-based autoexposure of two imaging channels (full-spectrum white light and near-infrared fluorescence), all in real time. …”
    Get full text
    Article
  11. 17491

    THE USE OF ARTIFICIAL INTELLIGENCE IN FINANCIAL ADVISORY by David Michelini

    Published 2024-12-01
    “…However, respondents also expressed concerns regarding data security, the need for more reliability, and the transparency of AI algorithms, which could limit the broader adoption of these technologies. …”
    Article
  12. 17492

    Understanding the Person through Narrative by Joanne M. Hall, Jill Powell

    Published 2011-01-01
    “…A narrative approach stands in contrast to a yes/no algorithmic process in conversing with clients. Eliciting stories illustrates the social context of events, and implicitly provides answers to questions of feeling and meaning. …”
    Get full text
    Article
  13. 17493

    Modified α-Parameterized Differential Transform Method for Solving Nonlinear Generalized Gardner Equation by Abdulghafor M. Al-Rozbayani, Ahmed Farooq Qasim

    Published 2023-01-01
    “…The proposed method is applied to solve the generalized Gardner equation by utilizing genetic algorithms to obtain optimal parameter values. Our proposed approach extends the general differential transformation method, allowing for the use of various values for the coefficient α. …”
    Get full text
    Article
  14. 17494

    Challenges and innovative solutions of space-ground integrated network security by LI Jinhui, HUANG Chengbin, WANG Jinhua, LIU Yang

    Published 2024-06-01
    “…By leveraging the unconditional security of quantum communication and the advantages of post-quantum cryptographic algorithms, end-to-end secure communication protection for the space-ground integrated network was provided. …”
    Get full text
    Article
  15. 17495

    The Dynamical Behavior of a Rigid Body Relative Equilibrium Position by T. S. Amer

    Published 2017-01-01
    “…The numerical solutions are investigated using the fourth-order Runge-Kutta algorithms through Matlab packages. These solutions are represented graphically in order to describe and discuss the behavior of the body at any instant for different values of the physical parameters of the body. …”
    Get full text
    Article
  16. 17496

    Effect of Energy Tax Reduction on Fuel Prices by Volker Brühl

    Published 2022-09-01
    “…For a detailed analysis the German antitrust authority should look into the pricing algorithms of all 14,000 filling stations in Germany.…”
    Get full text
    Article
  17. 17497

    Existence of Solution and Self-Exciting Attractor in the Fractional-Order Gyrostat Dynamical System by Muhammad Marwan, Gauhar Ali, Ramla Khan

    Published 2022-01-01
    “…Moreover, this iterative scheme is injected into algorithms for a system of integer order dynamical systems to observe Lyapunov exponents and a bifurcation diagram for our proposed fractional-order dynamical model. …”
    Get full text
    Article
  18. 17498

    Platform work and labour legislation in India: Women’s engagement and the role of gender by Neha Arya, Abhishek Nemuri

    Published 2024-12-01
    “…We find that most workers face issues such as algorithmic control, insufficient technical support, feedback mechanism, safety protocols, and cost concerns. …”
    Get full text
    Article
  19. 17499

    Challenges and opportunities for agricultural development in West Africa by P. Kamara

    Published 2023-01-01
    “…The task is to find, identify, develop and implement the most effective methods and algorithms for realising the above aim, and the challenges and obstacles along the way. …”
    Get full text
    Article
  20. 17500

    Exploring Artificial Intelligence for Enhanced Endodontic Practice: Applications, Challenges, and Future Directions by Santosh R. Patil, Mohmed Isaqali Karobari

    Published 2024-01-01
    “…However, challenges such as data privacy issues, algorithmic biases, and integration barriers must be addressed to enable broader adoption. …”
    Get full text
    Article