Showing 601 - 620 results of 64,538 for search '"Algorithm"', query time: 0.24s Refine Results
  1. 601

    Enhanced deep deterministic policy gradient algorithm by Jianping CHEN, Chao HE, Quan LIU, Hongjie WU, Fuyuan HU, Qiming FU

    Published 2018-11-01
    “…With the problem of slow convergence for deep deterministic policy gradient algorithm,an enhanced deep deterministic policy gradient algorithm was proposed.Based on the deep deterministic policy gradient algorithm,two sample pools were constructed,and the time difference error was introduced.The priority samples were added when the experience was played back.When the samples were trained,the samples were selected from two sample pools respectively.At the same time,the bisimulation metric was introduced to ensure the diversity of the selected samples and improve the convergence rate of the algorithm.The E-DDPG algorithm was used to pendulum problem.The experimental results show that the E-DDPG algorithm can effectively improve the convergence performance of the continuous action space problems and have better stability.…”
    Get full text
    Article
  2. 602

    Algorithms for Searching the Shortest Path and Its Modification by N. I. Listopad, I. A. Karuk, A. A. Hayder

    Published 2016-06-01
    “…The article presents an overview of the main trends and methods of searching the shortest path information transmission in the telecommunications networks. The basic algorithms and their modifications are described. Special attention is given to the modified Dijkstra's algorithm that takes into account QoS requirements. …”
    Get full text
    Article
  3. 603
  4. 604
  5. 605
  6. 606

    Signal-Based Performance Evaluation of Dereverberation Algorithms by Patrick A. Naylor, Nikolay D. Gaubitch, Emanuël A. P. Habets

    Published 2010-01-01
    “…We address the measurement of reverberation in terms of the (DRR) in the context of the assessment of dereverberation algorithms for which we wish to quantify the level of reverberation before and after processing. …”
    Get full text
    Article
  7. 607

    A Synthesized Heuristic Task Scheduling Algorithm by Yanyan Dai, Xiangli Zhang

    Published 2014-01-01
    “…Aiming at the static task scheduling problems in heterogeneous environment, a heuristic task scheduling algorithm named HCPPEFT is proposed. In task prioritizing phase, there are three levels of priority in the algorithm to choose task. …”
    Get full text
    Article
  8. 608
  9. 609

    The Impact of Void-finding Algorithms on Galaxy Classification by Fatima Zaidouni, Dahlia Veyrat, Kelly A. Douglass, Segev BenZvi

    Published 2024-01-01
    “…We explore how the definition of a void influences the conclusions drawn about the impact of the void environment on galactic properties using two void-finding algorithms in the Void Analysis Software Toolkit: Voronoi Voids ( V ^2 ), a Python implementation of ZOnes Bordering On Voidness ( ZOBOV ); and VoidFinder , an algorithm that grows and merges spherical void regions. …”
    Get full text
    Article
  10. 610
  11. 611
  12. 612

    Efficient attack detection and data aggregation algorithm by Hong-bing CHENG, Chun-ming RONG, Xiao HUANG, Skjalg EGGEN, Qing-kai ZENG

    Published 2012-09-01
    “…An efficient algorithm of attack detection and data aggregation for wireless multimedia sensor networks based on the previous work was proposed.The proposed algorithm concludes the action trait of sensor nodes from their attribute vectors without any prior knowledge,at the same time;it was scalable and could be applied in large scale net-works.The simulation results show that the proposed algorithm can detect the attacks action more accurate than other technologies,and can make data aggregation efficiently.At the same time,the proposed algorithm can make the wireless multimedia sensor networks secure and reduce communication flow so that it will save a lot of resources in wireless mul-timedia sensor networks.…”
    Get full text
    Article
  13. 613

    Assistance algorithm of nursing for amiodarone intravenous infusion by Francimar Tinoco de Oliveira, Graciele Oroski Paes, Maria Gefé da Rosa Mesquita, Victor Magalhães de Paula Souza, Elaine dos Santos Carlos, Caroline Scantamburlo Martins

    Published 2014-10-01
    “…This study aimed at identifying scientific publication on phlebitis caused by amiodarone and proposes a nursing care algorithm for interventions in intravenous amiodarone administration grounded in the Infusion Nursing Society and the Center for Disease Control and Prevention. …”
    Get full text
    Article
  14. 614

    Metaheuristic Algorithms for Optimization: A Brief Review by Vinita Tomar, Mamta Bansal, Pooja Singh

    Published 2024-03-01
    Subjects: “…metaheuristic algorithms…”
    Get full text
    Article
  15. 615

    Research of embedding algorithm for wireless network virtualization by Bin CAO, Shi-chao XIA, Fang HE, Yun LI

    Published 2017-01-01
    Subjects: “…wireless network virtualization;embedding algorithm;load balancing;separate paths…”
    Get full text
    Article
  16. 616

    Jordan–Schur Algorithms for Computing the Matrix Exponential by Petko H. Petkov

    Published 2023-01-01
    “…In this paper, two new versions of the Schur algorithm for computing the matrix exponential of an n×n complex matrix A are presented. …”
    Get full text
    Article
  17. 617

    Shor's Factoring Algorithm and Modular Exponentiation Operators by Robert L. Singleton Jr

    Published 2023-09-01
    “… We provide a pedagogical presentation of Shor's factoring algorithm, which is a quantum algorithm for factoring very large numbers (of order of hundreds to thousands of bits) in polynomial time. …”
    Get full text
    Article
  18. 618

    Implementation of Genetic Algorithms for Optimization of Transportation Problem by Soobia Saeed

    Published 2019-03-01
    “…Index Terms— Transportation Problem, Genetics Algorithm (GA), Single-Processor Systems, Multi-Processor Systems, Optimization. …”
    Get full text
    Article
  19. 619

    Key committing attack on Tiaoxin-346 algorithm by Nan Liu, Chenhui Jin, Junwei Yu

    Published 2025-04-01
    “…The results of this study contribute to refining the security of authenticated encryption algorithms and offer valuable insights for the design of round update functions in AES-based schemes.…”
    Get full text
    Article
  20. 620