Showing 121 - 140 results of 5,497 for search 'three need algorithm', query time: 0.21s Refine Results
  1. 121
  2. 122
  3. 123
  4. 124

    Data Security Model Using (AES-LEA) Algorithms for WoT Environment by Zinah A. Al-jazaeri, Joolan Rokan Naif, Ahmad Mohamad Ghandour

    Published 2025-06-01
    “…This paper presents a new hybrid method for the encryption of information to be more suitable for embedded devices in the WoT environment by modifying the Advanced Encryption Standard AES algorithm and hybridizing it with the Lightweight Encryption Algorithm LEA algorithm as well as the Secure Hash Algorithm version 3 SHA3-256 algorithm for integrity and using four dimensional-NSJR system for generation of chaos keys. …”
    Get full text
    Article
  5. 125
  6. 126

    On the need of individually optimizing temporal interference stimulation of human brains due to inter-individual variability by Tapasi Brahma, Alexander Guillen, Jeffrey Moreno, Abhishek Datta, Yu Huang

    Published 2025-09-01
    “…However, those modeling studies were only performed on an averaged head (MNI152 template) and three individual heads without exploring inter-individual variability. …”
    Get full text
    Article
  7. 127
  8. 128
  9. 129
  10. 130
  11. 131
  12. 132
  13. 133

    Dust detection algorithm based on improved YOLOv5 by Qinghua CHEN, Junwei ZHANG, Yingsong CHENG, Xu ZHANG, Jianhua CHENG

    Published 2025-06-01
    “…Firstly, the existing YOLOv5 algorithm backbone network and Neck network were improved, and the original backbone network was replaced by GhostNet, a lightweight network, to reduce network parameters, and then three feature layers were output. …”
    Get full text
    Article
  14. 134

    A Stochastic Learning Algorithm for Machine Fault Diagnosis by Zhipeng Dong, Yucheng Liu, Jianshe Kang, Shaohui Zhang

    Published 2022-01-01
    “…The proposed method consists of three steps: firstly, to increase the computational efficiency of the model, the dimension of the high-dimensional data is reduced by establishing a random matrix; secondly, for enhancing the clustering influence of the sample, the input data are enhanced by feature processing; thirdly, to make the clustering effects more pronounced, the noise and interference of the data need to be processed, and the singularity value denoising method is used to denoise training data and test data. …”
    Get full text
    Article
  15. 135

    Performance analysis of a filtering variational quantum algorithm by Gabriel Marin-Sanchez, David Amaro

    Published 2025-01-01
    “…We compare the performance against three classical baseline algorithms on weighted MaxCut and the asymmetric traveling salesperson problem (ATSP). …”
    Get full text
    Article
  16. 136
  17. 137

    USING REINFORCEMENT LEARNING ALGORITHMS FOR UAV FLIGHT OPTIMIZATION by O. Dutsiak, V. Yuzevych

    Published 2024-12-01
    “…The study of the results of the functionality of the proposed algorithm was carried out in the environment of three-dimensional modeling. …”
    Get full text
    Article
  18. 138
  19. 139

    THE USE OF THE GENETIC ALGORITHM FOR SOLVING THE COOPERATION PLANNING TASK by Dmytro V. Rieznik

    Published 2015-12-01
    “…Genetic algorithm suggested by the author of the article allows to develop near optimal variant of the schedule table showing interaction of air defense units by three criteria, as well as make alterations in compliance with occurred changes in real time.…”
    Get full text
    Article
  20. 140