-
10221
Joint Power Allocation at the Base Station and the Relay for Untrusted Relay Cooperation OFDMA Network
Published 2015-01-01“…In addition, the convergence and computational complexity of the proposed algorithms are analyzed. Finally, simulations results are presented to demonstrate the performance of our proposed algorithms.…”
Get full text
Article -
10222
Usage of Learning Management System Web Analytics in Blended Learning Self-Study Evaluation
Published 2020-09-01“…Learning Management System (LMS) analytics data is proposed to be used in developing algorithms for evaluating students’ self-studies. Development of such algorithms is relevant considering annual growth of disciplines that apply blended learning. …”
Get full text
Article -
10223
Modal Parameter Identification from Output Data Only: Equivalent Approaches
Published 2015-01-01“…These algorithms are derived from properties of the subspace approach. …”
Get full text
Article -
10224
Emotional Interaction and Behavioral Decision-Making Mechanism in Network Science Education Based on Deep Learning
Published 2022-01-01“…From deep statistical learning algorithms to completing network science education, designing or modifying more comprehensive and faster bpq-l learning algorithms based on traditional learning algorithms can allow us to find target sentiments.…”
Get full text
Article -
10225
Analysing Topology Control Protocols in Wireless Sensor Network Using Network Evolution Model
Published 2015-10-01“…In the study of wireless ad hoc and sensor networks, clustering is an important research problem as it aims at maximizing network lifetime and minimizing latency. A large number of algorithms have been devised to compute “good” clusters in a WSN but few papers have tried to characterize these algorithms in an analytical manner. …”
Get full text
Article -
10226
The Information Theoretic Approach to Signal Anomaly Detection for Cognitive Radio
Published 2010-01-01“…Additionally, neither of the algorithms require demodulation of the signal.…”
Get full text
Article -
10227
MORF: Multi-view oblique random forest for hepatotoxicity prediction
Published 2025-02-01“…These two types of ODT algorithms serve as the base learners to construct two MORF. …”
Get full text
Article -
10228
Efficient Boundary Extraction from Orthogonal Pseudo-Polytopes: An Approach Based on the 𝑛D-EVM
Published 2011-01-01“…This work is devoted to contribute with two algorithms for performing, in an efficient way, connected components labeling and boundary extraction from orthogonal pseudo-polytopes. …”
Get full text
Article -
10229
MINIMIZING THE NUMBER OF PROCESSING UNITS IN DISTRIBUTED COMPUTATIONS
Published 2016-09-01“…Polynomial algorithms for finding the minimum number of processing units in the problem of scheduling heterogeneous competing processes on parallel processors are developed. …”
Get full text
Article -
10230
A Survey of Post-Quantum Cryptography Migration in Vehicles
Published 2025-01-01“…The advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography (PQC) algorithms. …”
Get full text
Article -
10231
Conditions for Existence, Representations, and Computation of Matrix Generalized Inverses
Published 2017-01-01“…Particularly, these algorithms can be used to compute the Moore-Penrose inverse, the Drazin inverse, and the usual matrix inverse. …”
Get full text
Article -
10232
TOPPER: Topology Prediction of Transmembrane Protein Based on Evidential Reasoning
Published 2013-01-01“…Usually, these individual prediction algorithms depend on various principles such as the hydrophobicity or charges of residues. …”
Get full text
Article -
10233
Multi-level high utility-itemset hiding.
Published 2025-01-01“…To address this issue, this work suggests two PPUM algorithms, namely MLHProtector and FMLHProtector, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …”
Get full text
Article -
10234
-
10235
Effects of Taxon Sampling in Reconstructions of Intron Evolution
Published 2013-01-01“…Interpretation of these differences is hindered because different algorithms and taxon sampling strategies were used. …”
Get full text
Article -
10236
Enabling Super-Resolution for Automotive Imaging Radars in the Presence of Antenna Calibration Errors
Published 2025-01-01“…In this paper we address the issues faced when applying such algorithms in a radar application and offer a solution based on linear prediction and spatial smoothing to enhance the performance of such algorithms.…”
Get full text
Article -
10237
Some Graph-Based Encryption Schemes
Published 2021-01-01“…There exist many encryption algorithms in cryptography for data security. The need of new nonstandard encryption algorithms has been raised to prevent the communication from traditional attacks. …”
Get full text
Article -
10238
An Analytical Study on Two High-Order Hybrid Methods to Solve Systems of Nonlinear Equations
Published 2023-01-01“…Furthermore, the stability analysis of both algorithms is investigated. These algorithms are applied for solving two real stiff systems of ordinary differential equations. …”
Get full text
Article -
10239
SPATIO-TEMPORAL CLUSTER ANALYSIS OF DISEASE
Published 2016-10-01“…Spatio-temporal cluster analysis algorithms were used for the cluster detection of incidence of thyroid carcinoma. …”
Get full text
Article -
10240
Diagnosis experience of traction engines of locomotives
Published 2019-03-01“…The method and corresponding algorithms are uses for programming controllers of vibrodiagnostic systems.…”
Get full text
Article