Showing 321 - 340 results of 6,037 for search 'main algorithm', query time: 0.11s Refine Results
  1. 321

    Smart System Resource Coordination Algorithm Based on 6G Technology by Fang Wang

    Published 2022-01-01
    “…Therefore, 6G technology will surely replace the current technology as the main means of future communication technology. This paper combines 6G technology to study the smart system resource coordination algorithm and analyzes the calculation process and actual effect of the algorithm. …”
    Get full text
    Article
  2. 322

    An encryption by using DNA algorithm for hiding a compressed message in Image by Qusay Alsaffar

    Published 2022-02-01
    “… Cryptography is a main item to generate confidence and empower services in the digital technology, while Steganography has vastly expanded in digital medias. …”
    Get full text
    Article
  3. 323

    The Implementation of Enhanced Microgrid using Mayfly Algorithm based PID Controller by M Murali, A Hema Sekhar

    Published 2025-02-01
    “… Micro grids, comprised of distributed generation units, are designed to function independently of the main grid. To ensure stable operation in isolated mode, precise control of system is essential. …”
    Get full text
    Article
  4. 324

    Enhanced Retinal Vessel Detection Using Gradient Pyramid Fusion Algorithm by Cristian-Dragoș OBREJA

    Published 2024-12-01
    “…The main goal of this study is to create an innovative approach to retinal vessel detection using the gradient pyramid fusion algorithm to improve edge continuity and measurement precision in retinal images. …”
    Get full text
    Article
  5. 325

    Algorithm of management of patients with acute cholestatic hepatitis (Clinical case presentation) by T. A. Deyeva, Ye. N. German, M. V. Mayevskaya, V. T. Ivashkin

    Published 2011-12-01
    “…To show diagnostic and treatment algorithm for patients with cholestatic syndrome by the example of clinical case.Features of clinical case. …”
    Get full text
    Article
  6. 326

    Routing algorithm for railway monitoring linear WSN based on improved PSO by Cuiran LI, Xuejie WANG, Jianli XIE, Anqi LYU

    Published 2022-05-01
    “…To solve the problems of short network lifetime and large data transmission delay, caused by unbalanced node energy consumption of linear wireless sensor network in railway monitoring scenario, a routing algorithm based on particle swarm optimization theory and breadth first search was proposed.The fitness function was constructed based on the relative energy consumption, spacing and load of candidate cluster heads.The local search ability of particle swarm algorithm was enhanced by adjusting the inertia weight coefficient to set up the cluster head optimal set.Meanwhile, a path cost function driven by energy consumption and delay was built up, and the optimal main path from the source node to the sink node was obtained by breadth first search.Lastly, a Q-learning alternative path updating and route maintenance mechanism based on discrete Markov decision process (MDP) was designed.Simulation results show that the proposed algorithm can balance the node energy consumption effectively, and has also advantages in prolonging the network lifetime and reducing the data transmission delay.…”
    Get full text
    Article
  7. 327

    Performance Evaluation of a Topology Control Algorithm for Wireless Sensor Networks by Nedal Ababneh

    Published 2010-07-01
    “…A main design challenge in the area of sensor networks is energy efficiency to prolong the network operable lifetime. …”
    Get full text
    Article
  8. 328

    Numerical algorithms to solve one inverse problem for Navier–Stokes equations by Raimondas Čiegis

    Published 2025-07-01
    “…An equivalent form of PDE problem is defined as the first-kind Volterra integral equation. The main aim is to analyze a possible ill-posedness of the given problem. …”
    Get full text
    Article
  9. 329

    Stability Conditions for the Leaky LMS Algorithm Based on Control Theory Analysis by Dariusz BISMOR, Marek PAWELCZYK

    Published 2016-09-01
    “…One of the main aspects studied in the literature is the influence of the step size on stability or convergence of LMS-based algorithms. …”
    Get full text
    Article
  10. 330

    Consistent Algorithms Marching Along Characteristics for the Numerical Solution of the Boltzmann Equation by Nilson C. Roberty, Rogerio C. Nunes

    Published 2011-01-01
    “…In this work, we present the main functional spaces involved in the formalism and a description of the algorithms for the mesh generation and the transport equation solution. …”
    Get full text
    Article
  11. 331
  12. 332

    DETERMINING THE SIZE OF THE POPULATION OF THE GENETIC ALGORITHM FOR THE PROBLEMS OF DISCRETE OPTIMIZATION IN CAD by V. V. Frolov

    Published 2018-10-01
    “…The problem is solved for a genetic algorithm, where the genotype is represented by a chromosome in binary code, and the phenotype by a decimal integer code of values of independent variables. …”
    Get full text
    Article
  13. 333

    Routing algorithm for railway monitoring linear WSN based on improved PSO by Cuiran LI, Xuejie WANG, Jianli XIE, Anqi LYU

    Published 2022-05-01
    “…To solve the problems of short network lifetime and large data transmission delay, caused by unbalanced node energy consumption of linear wireless sensor network in railway monitoring scenario, a routing algorithm based on particle swarm optimization theory and breadth first search was proposed.The fitness function was constructed based on the relative energy consumption, spacing and load of candidate cluster heads.The local search ability of particle swarm algorithm was enhanced by adjusting the inertia weight coefficient to set up the cluster head optimal set.Meanwhile, a path cost function driven by energy consumption and delay was built up, and the optimal main path from the source node to the sink node was obtained by breadth first search.Lastly, a Q-learning alternative path updating and route maintenance mechanism based on discrete Markov decision process (MDP) was designed.Simulation results show that the proposed algorithm can balance the node energy consumption effectively, and has also advantages in prolonging the network lifetime and reducing the data transmission delay.…”
    Get full text
    Article
  14. 334

    EFFECTIVE ALGORITHM FOR STRUCTURAL OPTIMIZATION SUBJECTED TO FATIGUE DAMAGE AND RANDOM EXCITATION by Milan SÁGA, Milan VAŠKO, Zuzana SÁGOVÁ, Marian HANDRIK

    Published 2018-06-01
    “…The entire computational process was implemented in MATLAB with the “Discret_Opt_Fat” main control program. The article presents the theoretical basis for the presented complex problem solution, its algorithmization and the technical application.…”
    Get full text
    Article
  15. 335
  16. 336

    Research on the security of national secret algorithm based compute first networking by Jie PAN, Lan YE, Pengfei ZHANG, Zhonggui BU

    Published 2023-08-01
    “…With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.…”
    Get full text
    Article
  17. 337

    Crossover Operator Inspired by the Selection Operator for an Evolutionary Task Sequencing Algorithm by Piotr Ciepliński, Sławomir Golak

    Published 2024-12-01
    “…At the same time, the new operator retains its stochastic nature and is not a deterministic operator, which reduces the risk of the evolutionary algorithm getting stuck in a local minimum. The idea of the proposed crossover operator was based on the main mechanism of the evolutionary algorithm that determines the success of this type of algorithm selection. …”
    Get full text
    Article
  18. 338

    Active noise control of refrigerator based on cascaded notch feedback algorithm by Chaoping Gui

    Published 2025-06-01
    “…The cascade notch filtering algorithm is formed by cascading the adaptive notch filtering algorithm, which is used to deal with the main frequency and harmonic noise generated by the refrigerator. …”
    Get full text
    Article
  19. 339

    Alleviating Cold Start in the EOSC Recommendations: Extended Page Rank Algorithm by Marcin Wolski, Antoni Klorek, Anna Kobusinska

    Published 2024-01-01
    “…In the case of academic systems, where researchers are usually reluctant to express their explicit feedback or scientific interests, the cold start problem has a considerable and long-term impact on the recommendation algorithms. To alleviate this problem, this paper discusses a graph-based recommendation approach extending the Page Rank algorithm by using a co-authorship network. …”
    Get full text
    Article
  20. 340

    Analysing Threshold Value in Fire Detection Algorithm Using MODIS Data by Bowo E. Cahyono, Peter Fearns, Brendon McAtee

    Published 2012-08-01
    “…This paper describe the principle of fire investigation applied on MODIS data. The main used algorithm in this research is contextual algorithm which has been developed by NASA scientist team. …”
    Get full text
    Article