Search alternatives:
many » may (Expand Search)
Showing 181 - 200 results of 4,135 for search 'many algorithm', query time: 0.13s Refine Results
  1. 181

    Apply Block Ciphers Using Tiny Encryption Algorithm (TEA) by Hana Rashied Ismaeel

    Published 2010-06-01
    “…The Aim of this paper is to Apply symmetric block ciphers algorithm which is called Tiny Encryption algorithm (TEA). …”
    Get full text
    Article
  2. 182

    A Survey on Deployment Algorithms in Underwater Acoustic Sensor Networks by Guangjie Han, Chenyu Zhang, Lei Shu, Ning Sun, Qingwu Li

    Published 2013-12-01
    “…Node deployment for UASNs is an attractive research topic upon which a large number of algorithms have been proposed recently. This paper seeks to provide an overview of the most recent advances of deployment algorithms in UASNs while pointing out the open issues. …”
    Get full text
    Article
  3. 183

    Perioperative Management of Patients Receiving Antithrombotic Therapy in Schemes and Algorithms by O. N. Dzhioeva, E. A. Rogozhkina, O. M. Drapkina

    Published 2023-01-01
    “…Currently, antithrombotic therapy is the basis of the pathogenetic treatment of many cardiovascular diseases, such as coronary heart disease, stroke, peripheral vascular disease, as well as mechanical heart valves, heart rhythm disturbances, venous thromboembolism. …”
    Get full text
    Article
  4. 184
  5. 185

    Optimistic Algorithms for Safe Linear Bandits Under General Constraints by Spencer Hutchinson, Arghavan Zibaie, Ramtin Pedarsani, Mahnoosh Alizadeh

    Published 2025-01-01
    “…However, most existing algorithms for safe linear bandits only consider <italic>linear constraints</italic>, making them inadequate for many real-world applications, which often have non-linear constraints. …”
    Get full text
    Article
  6. 186

    A Novel Data Encryption Algorithm To Ensure Database Security by Sivan İbrahim, Ahmet Zengin, Selman Hızal, A. F. M. Suaib Akhter, Cevat Altunkaya

    Published 2023-06-01
    “…Many people apply technologies gradually, moving towards new progress and development. …”
    Get full text
    Article
  7. 187

    Karatsuba Algorithm Revisited for 2D Convolution Computation Optimization by Qi Wang, Jianghan Zhu, Can He, Shihang Wang, Xingbo Wang, Yuan Ren, Terry Tao Ye

    Published 2025-05-01
    “…Convolutional computations consist of many dot-product operations (multiplication–accumulation, or MAC), for which the Winograd algorithm is currently the most widely used method to reduce the number of MACs. …”
    Get full text
    Article
  8. 188
  9. 189

    Novel Global Harmony Search Algorithm for Least Absolute Deviation by Longquan Yong

    Published 2014-01-01
    “…The method of least absolute deviation (LAD) finds applications in many areas, due to its robustness compared to the least squares regression (LSR) method. …”
    Get full text
    Article
  10. 190

    Adaptive fuzzy filter algorithm for LEO communication channel estimation by ZHUO Yong-ning, ZHU Li-dong, WU Shi-qi

    Published 2006-01-01
    “…A novel adaptive LMS filter algorithm based on fuzzy rules was proposed.Through building many fuzzy sets over the space of channel gained value and the increment value of channel gain,in addition to the setting of fuzzy rules,an adaptive algorithm incorporated with human experience was set up,which was adaptive to the time<sub>v</sub>aring character-istics of LEO satellite channel.The results of the simulation validate the algorithm.…”
    Get full text
    Article
  11. 191

    Virtual network embedding algorithm based on negotiation in distributed environment by Yi-ming JIANG, Ju-long LAN, Dong-nian CHENG, Fang-ming WU

    Published 2014-12-01
    “…The network virtualization is able to offer various customized end-to-end services networks on a shared sub-strate network.However,the existing virtual network embedding algorithms present many problems in reliability and ap-plicability due to their dependence on a centralized manager node.Hence,a virtual network embedding algorithm in dis-tributed environment is proposed,which implements embedding process by the negotiation of several nodes.Moreover,this algorithm makes improvement in reducing communication cost and length of virtual links.Simulation experiments demonstrate that the proposed algorithm can achieve better performance on efficiency of resources utilization and com-munication cost.…”
    Get full text
    Article
  12. 192

    Optimization of Teaching Management System Based on Association Rules Algorithm by Qing Niu

    Published 2021-01-01
    “…A scientific, efficient, and complete teaching management system cannot only help the teaching management department improve work efficiency and quality but also greatly reduce many problems caused by manual labour risk. This paper designs and implements a teaching management system based on an improved association rule algorithm. …”
    Get full text
    Article
  13. 193

    Take Back the Algorithms! A Media Theory of Commonistic Affordance by Shintaro Miyazaki

    Published 2019-08-01
    “… This essay critiques the ‘black-boxing’ of many computational processes, which are argued to result in a kind of ‘unaffordability’ of algorithms. …”
    Get full text
    Article
  14. 194

    Robust FCM Algorithm with Local and Gray Information for Image Segmentation by Hanane Barrah, Abdeljabbar Cherkaoui, Driss Sarsri

    Published 2016-01-01
    “…The FCM (fuzzy c-mean) algorithm has been extended and modified in many ways in order to solve the image segmentation problem. …”
    Get full text
    Article
  15. 195

    Review and classification of trajectory summarisation algorithms: From compression to segmentation by Daniel Amigo, David Sánchez Pedroche, Jesús García, José Manuel Molina

    Published 2021-10-01
    “…Finally, we outline the recent trends and best practices to continue the research in next summarisation algorithms.…”
    Get full text
    Article
  16. 196

    Symbolic algorithm for solving SLAEs with multi-diagonal coefficient matrices by Veneva Milena

    Published 2025-06-01
    “…The algorithm is given in a pseudocode. A theorem which gives the condition for correctness of the algorithm is formulated and proven. …”
    Get full text
    Article
  17. 197

    Research on Classification of Rail Defects Based on Image Processing Algorithm by Mengying HUANG, Jiangping LUO, Wenxing WANG, Jingwei CAO

    Published 2020-07-01
    “…There are many types and different shapes of rail defects. …”
    Get full text
    Article
  18. 198

    Dynamic Games Methods in Synthesis of Safe Ship Control Algorithms by Józef Lisowski

    Published 2018-01-01
    “…The paper presents application of dynamic games methods, multistage positional and multistep matrix games, to automate the process control of moving objects, on the example of safe control of own ship in collision situations when passing many ships encountered. Taking into consideration two types of ships cooperation, for each of the two types of games, positional and matrix, four control algorithms for determining a safe ship trajectory supporting the navigator’s maneuvering decision in a collision situation are presented. …”
    Get full text
    Article
  19. 199

    DNA Genetic Algorithm in Digital Intelligent Design of Environmental Art by Wanlu Jiang

    Published 2022-01-01
    “…Unlike traditional design methods that generally only generate one design scheme, genetic algorithms can generate large-scale schemes and calculate the optimal scheme among many schemes. …”
    Get full text
    Article
  20. 200

    Policy-adaptive capability inheritance algorithm consistent with POSIX standard by SHEN Qing-ni1, QING Si-han1, HE Ye-ping1, SHEN Jian-jun1

    Published 2006-01-01
    “…In order to support POSIX capability mechanism,many secure operating systems provided individual capability inheritable algorithms.These algorithms were only applicable to specified least privilege control policies,and had such defects as semantic conflicts and no defined security-objectives.So they couldn’t flexibly support for implementing diversified privilege policies for different requirements.Based on the analysis of some existing algorithms,a new capability inheritance algorithm was proposed,which introduced the policy-relevant capability control variable and the trusted application attribution.The implementation of the algorithm in ANSHENG secure operating system demonstrates that this algorithm provides such properties as policy-adaptability and usability,the formal analysis and verification of this algorithm proves that it supports a secure operating system to meet basic security theorems of the privilege policies enforced in it.…”
    Get full text
    Article