Showing 10,221 - 10,240 results of 12,475 for search '"Algorithm"', query time: 0.10s Refine Results
  1. 10221

    Joint Power Allocation at the Base Station and the Relay for Untrusted Relay Cooperation OFDMA Network by Weiheng Jiang, Wenjiang Feng

    Published 2015-01-01
    “…In addition, the convergence and computational complexity of the proposed algorithms are analyzed. Finally, simulations results are presented to demonstrate the performance of our proposed algorithms.…”
    Get full text
    Article
  2. 10222

    Usage of Learning Management System Web Analytics in Blended Learning Self-Study Evaluation by G. P. Ozerova

    Published 2020-09-01
    “…Learning Management System (LMS) analytics data is proposed to be used in developing algorithms for evaluating students’ self-studies. Development of such algorithms is relevant considering annual growth of disciplines that apply blended learning. …”
    Get full text
    Article
  3. 10223

    Modal Parameter Identification from Output Data Only: Equivalent Approaches by Joseph Lardies

    Published 2015-01-01
    “…These algorithms are derived from properties of the subspace approach. …”
    Get full text
    Article
  4. 10224

    Emotional Interaction and Behavioral Decision-Making Mechanism in Network Science Education Based on Deep Learning by Pengjiao Li, Qian Meng

    Published 2022-01-01
    “…From deep statistical learning algorithms to completing network science education, designing or modifying more comprehensive and faster bpq-l learning algorithms based on traditional learning algorithms can allow us to find target sentiments.…”
    Get full text
    Article
  5. 10225

    Analysing Topology Control Protocols in Wireless Sensor Network Using Network Evolution Model by Chiranjib Patra, Samiran Chattopadhyay, Matangini Chattopadhyay, Parama Bhaumik

    Published 2015-10-01
    “…In the study of wireless ad hoc and sensor networks, clustering is an important research problem as it aims at maximizing network lifetime and minimizing latency. A large number of algorithms have been devised to compute “good” clusters in a WSN but few papers have tried to characterize these algorithms in an analytical manner. …”
    Get full text
    Article
  6. 10226

    The Information Theoretic Approach to Signal Anomaly Detection for Cognitive Radio by Mostafa Afgani, Sinan Sinanović, Harald Haas

    Published 2010-01-01
    “…Additionally, neither of the algorithms require demodulation of the signal.…”
    Get full text
    Article
  7. 10227

    MORF: Multi-view oblique random forest for hepatotoxicity prediction by Binsheng Sui, Qingzhuo He, Bowei Yan, Kunhong Liu, Yong Xu, Song He, Xiaochen Bo

    Published 2025-02-01
    “…These two types of ODT algorithms serve as the base learners to construct two MORF. …”
    Get full text
    Article
  8. 10228

    Efficient Boundary Extraction from Orthogonal Pseudo-Polytopes: An Approach Based on the 𝑛D-EVM by Ricardo Pérez-Aguila

    Published 2011-01-01
    “…This work is devoted to contribute with two algorithms for performing, in an efficient way, connected components labeling and boundary extraction from orthogonal pseudo-polytopes. …”
    Get full text
    Article
  9. 10229

    MINIMIZING THE NUMBER OF PROCESSING UNITS IN DISTRIBUTED COMPUTATIONS by N. S. Kovalenko, V. N. Vengherov, V. M. Metelyskij

    Published 2016-09-01
    “…Polynomial algorithms for finding the minimum number of processing units in the problem of scheduling heterogeneous competing processes on parallel processors are developed. …”
    Get full text
    Article
  10. 10230

    A Survey of Post-Quantum Cryptography Migration in Vehicles by Nils Lohmiller, Sabrina Kaniewski, Michael Menth, Tobias Heer

    Published 2025-01-01
    “…The advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography (PQC) algorithms. …”
    Get full text
    Article
  11. 10231

    Conditions for Existence, Representations, and Computation of Matrix Generalized Inverses by Predrag S. Stanimirović, Miroslav Ćirić, Igor Stojanović, Dimitrios Gerontitis

    Published 2017-01-01
    “…Particularly, these algorithms can be used to compute the Moore-Penrose inverse, the Drazin inverse, and the usual matrix inverse. …”
    Get full text
    Article
  12. 10232

    TOPPER: Topology Prediction of Transmembrane Protein Based on Evidential Reasoning by Xinyang Deng, Qi Liu, Yong Hu, Yong Deng

    Published 2013-01-01
    “…Usually, these individual prediction algorithms depend on various principles such as the hydrophobicity or charges of residues. …”
    Get full text
    Article
  13. 10233

    Multi-level high utility-itemset hiding. by Loan T T Nguyen, Hoa Duong, An Mai, Bay Vo

    Published 2025-01-01
    “…To address this issue, this work suggests two PPUM algorithms, namely MLHProtector and FMLHProtector, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …”
    Get full text
    Article
  14. 10234
  15. 10235

    Effects of Taxon Sampling in Reconstructions of Intron Evolution by Mikhail A. Nikitin, Vladimir V. Aleoshin

    Published 2013-01-01
    “…Interpretation of these differences is hindered because different algorithms and taxon sampling strategies were used. …”
    Get full text
    Article
  16. 10236

    Enabling Super-Resolution for Automotive Imaging Radars in the Presence of Antenna Calibration Errors by Ionela-Cristina Voicu, Filip Rosu

    Published 2025-01-01
    “…In this paper we address the issues faced when applying such algorithms in a radar application and offer a solution based on linear prediction and spatial smoothing to enhance the performance of such algorithms.…”
    Get full text
    Article
  17. 10237

    Some Graph-Based Encryption Schemes by Baizhu Ni, Rabiha Qazi, Shafiq Ur Rehman, Ghulam Farid

    Published 2021-01-01
    “…There exist many encryption algorithms in cryptography for data security. The need of new nonstandard encryption algorithms has been raised to prevent the communication from traditional attacks. …”
    Get full text
    Article
  18. 10238

    An Analytical Study on Two High-Order Hybrid Methods to Solve Systems of Nonlinear Equations by Hooman Darvishi, M. T. Darvishi

    Published 2023-01-01
    “…Furthermore, the stability analysis of both algorithms is investigated. These algorithms are applied for solving two real stiff systems of ordinary differential equations. …”
    Get full text
    Article
  19. 10239

    SPATIO-TEMPORAL CLUSTER ANALYSIS OF DISEASE by M. S. Abramovich, S. V. Anishchanka, M. M. Mitskevich, O. I. Bydanov

    Published 2016-10-01
    “…Spatio-temporal cluster analysis algorithms were used for the cluster detection of incidence of thyroid carcinoma. …”
    Get full text
    Article
  20. 10240

    Diagnosis experience of traction engines of locomotives by Ngoulou-A-Ndzeli, V. Yu. Tetter, V. G. Shakhov

    Published 2019-03-01
    “…The method and corresponding algorithms are uses for programming controllers of vibrodiagnostic systems.…”
    Get full text
    Article