Showing 1 - 15 results of 15 for search '"promising algorithmic"', query time: 0.08s Refine Results
  1. 1
  2. 2

    Review of organizational value of science-intensive organizations configuration models (rocket and space industry organization case) by V. А. Shiboldenkov, S. S. Gavrilov

    Published 2023-09-01
    “…The implementation potential of the most promising algorithms of value creation in knowledge-intensive enterprises of the Russian Federation has been assessed. …”
    Get full text
    Article
  3. 3

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  4. 4

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  5. 5

    Toward a linear-ramp QAOA protocol: evidence of a scaling advantage in solving some combinatorial optimization problems by J. A. Montañez-Barrera, Kristel Michielsen

    Published 2025-08-01
    “…Abstract The quantum approximate optimization algorithm (QAOA) is a promising algorithm for solving combinatorial optimization problems (COPs), with performance governed by variational parameters $${\{{\gamma }_{i},{\beta }_{i}\}}_{i = 0}^{p-1}$$ { γ i , β i } i = 0 p − 1 . …”
    Get full text
    Article
  6. 6

    Dynamic Multi-Population Mutation Architecture-Based Equilibrium Optimizer and Its Engineering Application by Xiangdong Wu, Kaoru Hirota, Yaping Dai, Shuai Shao

    Published 2025-02-01
    “…The optimization ability of DMMAEO is assessed through a comparison with several recent promising algorithms on 58 test functions (including 29 representative test functions and 29 CEC2017 test functions). …”
    Get full text
    Article
  7. 7

    Refining daily precipitation estimates using machine learning and multi-source data in alpine regions with unevenly distributed gauges by Huajin Lei, Hongyi Li, Hongyu Zhao

    Published 2025-04-01
    “…Meanwhile, XDMF is a promising algorithm for enhancing precipitation in high-altitude mountain areas, which can be flexibly transferred to other regions, different machine learning algorithms, and various hydrometeorological variables.…”
    Get full text
    Article
  8. 8

    Modeling and forecasting of TEC using subspace-based SSA-LRF-ANN model by J.R.K. Kumar Dabbakuti, Mallika Yarrakula, Dinesh Babu Vunnava, Gopi Krishna Popuri

    Published 2025-07-01
    “…This paper examines the fundamentals of subspace-based methods and explores the most promising algorithm for forecasting ionospheric signal delays, which was designed explicitly regarding signal and noise subspaces. …”
    Get full text
    Article
  9. 9

    Development of an advanced algorithm for calculating and assessing the wheel pair geometry in the CONLOC system by A. S. Adadurov, I. Yu. Savelev, M. A. Chepulis, K. G. Arinushkina

    Published 2023-09-01
    “…The authors develop a new promising algorithm for describing and assessing the wheel rolling profile and improved the measurement accuracy by reducing the human factor, digitalising processes and automating the monitoring of the health of rolling stock along the route. …”
    Get full text
    Article
  10. 10

    A Variable Selection Method Based on Fast Nondominated Sorting Genetic Algorithm for Qualitative Discrimination of Near Infrared Spectroscopy by Hubin Liu, Na Liu, Yuhui Yuan, Cihai Zhang, Longlian Zhao, Junhui Li

    Published 2022-01-01
    “…It indicates that the NSGA-II can select a few and effective feature variables to build a high-performance qualitative discrimination model and is proved to be a promising algorithm. In addition, the method is not designed exclusively for spectral data. …”
    Get full text
    Article
  11. 11

    Elephant Flows Detection Using Deep Neural Network, Convolutional Neural Network, Long Short-Term Memory, and Autoencoder by Getahun Wassie Geremew, Jianguo Ding

    Published 2023-01-01
    “…Deep autoencoder is also one of the promising algorithms that do not require human class labeler. …”
    Get full text
    Article
  12. 12
  13. 13

    The structure of urgent conditions of servicemen of the Armed Forces of Ukraine in modern conditions by M. I. Badiuk, O. O. Mykyta, I. P. Semeniv, M. M. Rygan, V. V. Kosarchuk

    Published 2018-09-01
    “…Purpose: to study the structure of urgent conditions of servicemen with combat injuries and diseases in modern conditions in order to substantiate the development of promising algorithms and medical aid protocols adapted to NATO standards.Materials and methods. …”
    Article
  14. 14

    Development and validation of a case-finding algorithm for the identification of non-small cell lung cancers in a region-wide Italian pathology registry. by Andrea Spini, Pietro Rosellini, Cristiana Bellan, Folco Furiesi, Silvano Giorgi, Sandra Donnini, Rosa Gini, Marina Ziche, Francesco Salvo, Giuseppe Roberto

    Published 2022-01-01
    “…SE was in line with the expected contribution of PR to overall cases captured in the regional Cancer Registry, with a trend of increase over calendar time. Given the promising algorithm validity and the wide use of SNOMED terminology in electronic pathology records, the proposed algorithm is expected to be easily adapted to other electronic databases for (pharmaco)epidemiology purposes.…”
    Get full text
    Article
  15. 15

    Introducing a novel 3D Chen-Rössler map for NTRU-based image encryption with OFDM transmission over a noisy channel by Alain F. Djomo, Lee Mariel H. Yepdia, Yannick P. K. Nkandeu, Yannick A. Abanda, Alain Tiedeu

    Published 2025-07-01
    “…NTRU (Nth degree Truncated polynomial Ring Unit) is a promising algorithm in this new branch of cryptography. …”
    Get full text
    Article