-
441
Quantum complexity of time evolution with chaotic Hamiltonians
Published 2020-01-01“…Our analysis relates complexity to familiar properties of physical theories like their spectra and the structure of energy eigenstates and has implications for the hypothesized computational complexity class separations PSPACE BQP/poly and PSPACE BQSUBEXP/subexp, and the “fast-forwarding” of quantum Hamiltonians.…”
Get full text
Article -
442
Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination
Published 2024-04-01“…Meanwhile,the existing scheme is also not ideal for the verification efficiency of cloud server computing results.Aiming at the challenge of data privacy protection, the designed batch matrix multiplication verifiable computation scheme uses triple perturbation encryption algorithm to achieve stronger privacy protection without increasing the computational complexity of encryption and decryption. Specifically, a special upper or lower triangular sparse matrix is constructed to add double perturbation (multiplicative perturbation and additive perturbation) to protect row or column data, and a special additive sparse matrix is constructed to add a single perturbation (additive perturbation) to protect zero element information. …”
Get full text
Article -
443
Multiaircraft Optimal 4D Trajectory Planning Using Logical Constraints
Published 2019-01-01“…In this way, the optimal control problem with logical constraints is converted into a smooth optimal control problem which is solved using traditional techniques, thereby reducing the computational complexity of finding the solution. The effectiveness of the approach is demonstrated through several numerical experiments by computing the optimal trajectories of multiple aircraft in converging and intersecting arrival routes with time-based separation constraints, distance-based separation constraints, and operational constraints.…”
Get full text
Article -
444
A Multistage Decision-Feedback Receiver Design for LTE Uplink in Mobile Time-Variant Environments
Published 2012-01-01“…Instead of using a conventional equalizer, this work uses a group frequency-domain equalizer (GFDE) to reduce computational complexity. Furthermore, this work utilizes a dual iterative structure of group parallel interference cancellation (GPIC) and frequency-domain group parallel interference cancellation (FPIC) to mitigate the ICI effect. …”
Get full text
Article -
445
Compressive SAR Imaging Based on Modified Low-Rank and Sparse Decomposition
Published 2025-01-01“…Numerical simulations using SAR modeling data validate the convergence of the proposed method and compare its computational complexity with baseline CS-SAR imaging schemes. …”
Get full text
Article -
446
Complexity Analysis of New Future Video Coding (FVC) Standard Technology
Published 2021-01-01“…Second, a fast FVC mode decision is proposed to reduce encoding computational complexity. Then, a comparison between three configurations, namely, Random Access, Low-Delay B, and Low-Delay P, is proposed, in terms of Bitrate, PSNR, and encoding time. …”
Get full text
Article -
447
3D Face Modeling Algorithm for Film and Television Animation Based on Lightweight Convolutional Neural Network
Published 2021-01-01“…The algorithm uses the difference criterion instead of the entropy criterion to avoid the “small sample” problem, and the use of QR decomposition can extract more effective discriminative features for facial recognition, while also reducing the computational complexity of feature extraction. Compared with traditional feature extraction methods, GMMSD avoids the problem of “small samples” and does not require preprocessing steps on the samples; it uses QR decomposition to extract features from the original samples and retains the distribution characteristics of the original samples. …”
Get full text
Article -
448
A Numerical Integration Method for Calculating the Bit Error Rate of Time-Modulated Array
Published 2025-01-01“…The findings demonstrate consistency between the two methods while significantly reducing computational complexity.…”
Get full text
Article -
449
Detecting respiratory diseases using machine learning-based pattern recognition on spirometry data
Published 2025-02-01“…Due to issues with dimensionality and computational complexity, the relevant features are selected using Forward Feature Selection (FFS). …”
Get full text
Article -
450
Adaptive Filtering for Channel Estimation in RIS-Assisted mmWave Systems
Published 2025-01-01“…Our analysis also reveals that both algorithms have lower computational complexity compared to existing methods. Extensive simulations validate our findings, with results illustrating the performance of the proposed algorithms under different parameters, demonstrating significant improvements in channel estimation accuracy and convergence speed over established methods, including NLMS, sparse exponential forgetting window least mean square (SEFWLMS), and sparse hybrid adaptive filtering algorithms (SHAFA).…”
Get full text
Article -
451
A survey on intrusion detection system in IoT networks
Published 2025-12-01“…Additionally, the survey identifies significant challenges and open issues in ML and DL-based IDS for IoT networks, such as computational complexity and high false positive rates, and recommends potential research directions, emerging trends, and perspectives for future work. …”
Get full text
Article -
452
Integration in CNN and FIR filters for improved computational efficiency in signal processing
Published 2025-01-01“…The results corroborate the multiplier’s efficiency in decreasing the computational complexity and enhancing the possibility of real-time analysis of CNN-based systems in healthcare.…”
Get full text
Article -
453
Novel techniques for efficient PAPR reduction in NOMA systems for future wireless networks
Published 2025-01-01“…PTS-ISSA minimizes PAPR by phase rotation of sub-blocks, offering the best reduction but at higher computational complexity, making it ideal for systems with abundant resources. …”
Get full text
Article -
454
Multifeature Fusion Detection Method for Fake Face Attack in Identity Authentication
Published 2018-01-01“…Experimental results show that this method can improve detection accuracy while also reducing computational complexity. In this paper, we use the CASIA, PRINT-ATTACK, and REPLAY-ATTACK database to compare the various LBP algorithms that incorporate optical flow and fusion algorithms.…”
Get full text
Article -
455
A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
Published 2025-01-01“…Results demonstrate that the algorithm not only ensures strong protection against unauthorized access but also maintains low computational complexity, making it ideal for IoT applications. …”
Get full text
Article -
456
RETRACTED: Intelligent power grid energy supply forecasting and economic operation management using the snake optimizer algorithm with Bigur-attention model
Published 2023-09-01“…The model evaluation phase calculates metrics such as prediction error, accuracy, and stability, and also examines the model’s training time, inference time, number of parameters, and computational complexity to assess its efficiency and scalability. …”
Get full text
Article -
457
Tennis Assistance Technology Based on Dynamic Time Warping Algorithm
Published 2025-01-01“…This technology combines components such as normalization, support vector machine, joint detection, sparse matrix, and second-order stepping mode to improve algorithm performance and reduce computational complexity. The experiment outcomes indicate that this method can validly raise the training effect of tennis players, with an accuracy rate of 95.66%, a calculation time of 0.32 seconds, a variance of 0.88, and an average absolute error of 4.22. …”
Get full text
Article -
458
Subspace Compressive GLRT Detector for MIMO Radar in the Presence of Clutter
Published 2015-01-01“…While Subspace Compressive GLRT (SSC-GLRT) detector is known to give optimised radar target detection performance with reduced computational complexity, it however suffers a significant deterioration in target detection performance in the presence of clutter. …”
Get full text
Article -
459
VRU-YOLO: A Small Object Detection Algorithm for Vulnerable Road Users in Complex Scenes
Published 2025-01-01“…Additionally, a lightweight Optimized Shared Detection Head (OSDH-Head) is introduced, reducing computational complexity while improving detection efficiency. …”
Get full text
Article -
460
Identifying Key Bus Stations Based on Complex Network Theory considering the Hybrid Influence and Passenger Flow: A Case Study of Beijing, China
Published 2020-01-01“…The influence of bus stations was calculated based on the local structure of the network, which refines from finding the shortest paths with high computational complexity. To evaluate the performance of the method, we used the efficiency of the network and vehicle average speed at the station to examine the accuracy. …”
Get full text
Article