Showing 161 - 180 results of 31,575 for search '"algorithm"', query time: 0.15s Refine Results
  1. 161

    Research on Collision Detection Algorithm of Dual Manipulator by Jianchun Liu, Kun Qin, Yanfeng Lin, Zian Liu

    Published 2021-01-01
    “…In order to ensure the safety of dual manipulator in public space, an accurate and efficient collision detection algorithm is proposed. The sphere and capsule bounding boxes are used to simplify the manipulator model, and the collision is judged according to the intersection between the bounding boxes. …”
    Get full text
    Article
  2. 162

    Broadcast authentication algorithm for wireless sensor networks by YAO Xuan-xia, ZHENG Xue-feng, ZHOU Xian-wei

    Published 2010-01-01
    “…In order to authenticate the broadcast data in wireless sensor networks efficiently,a broadcast authentication algorithm based on the properties of one-way,quasi-commutative and absorbency in Nyberg’s fasting one-way accumulator was put forward.The MACs computed by hashing the broadcast data with the shared key between the broadcaster and each scheduled receiver were used to be the accumulative items in this algorithm.The detailed analyses in the aspects of the security,anti-captured and costs show that the proposed broadcast authentication algorithm can authenticate the random broadcast data immediately in small area and meet the essential requirements for broadcast authentication in wireless sensor networks.…”
    Get full text
    Article
  3. 163
  4. 164
  5. 165

    Cryptography algorithm for wireless channel of CBTC system by WANG Chao1, LIU Li-li1, NIU Zhi-hua2, SHI Xiang-yong1, ZHANG Huan-guo3

    Published 2011-01-01
    “…As to the disadvantages of RC4 which was used for CBTC system,a new cryptography algorithm based on Montgomery-form ECC was brought forward.Compared with the traditional Montgomery elliptic curve,the improved algorithm would resume the value of y-coordinate with more security.In addition,compared with the traditional ECC,it has faster computing speed and can effectively resist the timing attack and energy attack.The new Montgomery-form ECC algorithm has accelerated current ECC encoding speed and would make great improvement to the implementation of ECC in CBTC and other wireless communication.…”
    Get full text
    Article
  6. 166

    UWSP: sleeping algorithms for underwater sensor network by Lu HONG, Feng HONG

    Published 2013-08-01
    Subjects: “…sleeping algorithm…”
    Get full text
    Article
  7. 167

    Cooperative routing algorithm based on game theory by Kun XIE, Shen-lin DUAN, Ji-gang WEN, Shi-ming HE

    Published 2013-08-01
    “…Based on the fit function, a fit value based routing selection algorithm and a fit value based routing forward al-gorithm were proposed. …”
    Get full text
    Article
  8. 168

    Self-healing algorithm based on feedback mechanism by Ji-hong ZHAO, Hua QU, Wen-dong CHEN

    Published 2012-01-01
    “…A network self-healing algorithm was presented.The proposed algorithm reduced the probability of selecting the failure or congestion paths and achieved self-healing by selecting recovery path adaptively when the nodes failure or link congestion in the network,which was based on Q-learning feedback mechanism,multi-QoS constrained of the evaluation function and path selection strategy using Boltzmann-Gibbs distribution.Simulation results show that the proposed algorithm outperforms in the recovery rate,the diffserv-aware capability and network resource optimization.…”
    Get full text
    Article
  9. 169

    Backtesting Quantum Computing Algorithms for Portfolio Optimization by Gines Carrascal, Paula Hernamperez, Guillermo Botella, Alberto del Barrio

    Published 2024-01-01
    “…By backtesting classical and quantum computing algorithms, we can get a sense of how these algorithms might perform in the real world. …”
    Get full text
    Article
  10. 170

    Iterative algorithms with seminorm-induced oblique projections by Yair Censor, Tommy Elfving

    Published 2003-01-01
    “…The fully simultaneous algorithm converges also in the inconsistent case to the minimum of a certain proximity function.…”
    Get full text
    Article
  11. 171

    The backpropagation algorithm implemented on spiking neuromorphic hardware by Alpha Renner, Forrest Sheldon, Anatoly Zlotnik, Louis Tao, Andrew Sornborger

    Published 2024-11-01
    “…However, it has been argued that most modern machine learning algorithms are not neurophysiologically plausible. In particular, the workhorse of modern deep learning, the backpropagation algorithm, has proven difficult to translate to neuromorphic hardware. …”
    Get full text
    Article
  12. 172

    Approximation Algorithm for a System of Pantograph Equations by Sabir Widatalla, Mohammed Abdulai Koroma

    Published 2012-01-01
    “…We show how to adapt an efficient numerical algorithm to obtain an approximate solution of a system of pantograph equations. …”
    Get full text
    Article
  13. 173

    Evolutionary Approach for Relative Gene Expression Algorithms by Marcin Czajkowski, Marek Kretowski

    Published 2014-01-01
    “…As checking all possible subsets of genes is computationally infeasible, the RXA algorithms require feature selection and multiple restrictive assumptions. …”
    Get full text
    Article
  14. 174

    An improved clustering algorithm based on local density by Xiaohui GUAN, Yaguan QIAN, Xinxin SUN

    Published 2016-01-01
    “…Clustering analysis is an important and challenging research field in machine learning and data mining.A fast and effective clustering algorithm based on the idea of local density was proposed by Alex.But the number of clusters and cluster centers in the algorithm were determined by hand.Therefore,the candidates of cluster centers based on local density were firstly selected and then density connectivity method was used to optimize the candidates.The classes of samples are the same as the nearest center with bigger local density.Experiments show that the proposed method has a better cluster efficiency and can handle the problems of uncertain cluster number and cluster centers.…”
    Get full text
    Article
  15. 175

    Representative Community Detection Algorithms for Attribute Networks by Dongming Chen, Mingzhao Xie, Yuxing He, Xin Zou, Dongqi Wang

    Published 2024-12-01
    “…To this end, we propose a representative community detection algorithm for attribute networks. By clustering similar network partitions and selecting representative partitions from each cluster, we can comprehensively reveal the diversity of network community structures and provide partition results with a more global perspective. …”
    Get full text
    Article
  16. 176

    A Fusion Multiobjective Empire Split Algorithm by Liang Liang

    Published 2020-01-01
    “…In the last two decades, swarm intelligence optimization algorithms have been widely studied and applied to multiobjective optimization problems. …”
    Get full text
    Article
  17. 177
  18. 178

    Routing Algorithms for SDM Flexible Optical Networks by Ireneusz Olszewski, Ireneusz Szcześniak, Bożena Woźna-Szcześniak

    Published 2024-10-01
    “…These algorithms are based on a sequence of alternative paths, ordered in terms of increasing lengths, determined by Yen’s algorithm. …”
    Get full text
    Article
  19. 179

    A survey on evolutionary ensemble learning algorithm by Yi HU, Boyang QU, Jing LIANG, Jie WANG, Yanli WANG

    Published 2021-03-01
    Subjects: “…ensemble learning;machine learning;evolutionary algorithm;classification;regression;clustering…”
    Get full text
    Article
  20. 180

    A New Algorithm for System of Integral Equations by Abdujabar Rasulov, Adem Kilicman, Zainidin Eshkuvatov, Gulnora Raimova

    Published 2014-01-01
    “…We develop a new algorithm to solve the system of integral equations. …”
    Get full text
    Article