Search

Showing total 86,536 results

Search Constraints

Start Over You searched for: Topic algorithms Remove constraint Topic: algorithms Database Academic Search Index Remove constraint Database: Academic Search Index
86,536 results

Search Results

251. 基于明文相关的混沌映射与SHA-256算法数字图像的加密与监测.

252. Reply to "Describing center of pressure movement in stabilometry by ellipse area approximation" from Agnieszka Gołąb concerning the paper "A Review of Center of Pressure (COP) Variables to Quantify Standing Balance in Elderly People: Algorithms and Open Access Code"

253. Research-paper recommender systems: a literature survey.

254. Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits.

255. Taming Algorithmic Priority Inversion in Mission-Critical Perception Pipelines.

256. Automated segmentation of wood fibres in micro-CT images of paper.

257. The Markovian Multiagent Monte-Carlo method as a differential evolution approach to the SCF problem for restricted and unrestricted Hartree–Fock and Kohn-Sham-DFT.

258. Fast computation of radio wave diffraction effects.

259. Graph neural networks based queuing model for optimal load balancing in mobile ad hoc network.

260. A two-stage algorithm for heterogeneous face recognition using Deep Stacked PCA Descriptor (DSPD) and Coupled Discriminant Neighbourhood Embedding (CDNE).

261. GFSPX: an efficient lightweight block cipher for resource-constrained IoT nodes.

262. MOHHO: multi-objective Harris hawks optimization algorithm for service placement in fog computing.

263. An accelerated chaotic image secure communication system based on Zynq-7000 platform.

264. A probabilistic algorithm for bounding the total restrained domination number of a [formula omitted] -free graph.

265. A Novel gray wolf optimization-based key frame extraction method for video classification using ConvLSTM.

266. Real-time power optimization based on Q-learning algorithm for direct methanol fuel cell system.

267. Validation of algorithms in studies based on routinely collected health data: general principles.

268. A new application to cryptology using generalized Jacobsthal matrices, inner product and self-adjoint operator.

269. Approximation algorithm for min sweep-period sweep cover with distance constraint.

270. Refined Geršhgorin disks for tensors and GH-tensors.

271. Algorithmic Aspects of Total Vertex-Edge Domination in Graphs.

272. Connectivity Status of Intuitionistic Fuzzy Graphs and Its Applications.

273. Series arc fault detection based on multi-domain depth feature association.

274. Optimal Poisson subsampling decorrelated score for high-dimensional generalized linear models.

275. A second order difference method combined with time two-grid algorithm for two-dimensional time-fractional Fisher equation.

276. Reactive optimal motion planning to anywhere in the presence of moving obstacles.

277. Dynamics of a non-circular-shaped nanorod with deformable boundaries based on second-order strain gradient theory.

278. A three-dimensional advancing front technique to generate grids based on the neural networks.

279. Componentwise Dinkelbach algorithm for nonlinear fractional optimization problems.

280. Data and resource aware incremental ML training in support of pervasive applications.

281. Asymmetry in the complexity of the multi-commodity network pricing problem.

282. No dimension-free deterministic algorithm computes approximate stationarities of Lipschitzians.

283. On the Parameterized Complexity of Compact Set Packing.

284. Ultimate Greedy Approximation of Independent Sets in Subcubic Graphs.

285. Discrete octonion linear canonical transform associated with finite-length function.

286. Optimization method of electronic control parameters of antenna array for null controlling in specific regions and sidelobe suppression.

287. An assisted assembly method based on augmented reality.

288. An efficient pre-analysis and optimization generation method for reference curves of automated fiber placement path planning.

289. Efficient Block Matching Motion Estimation Using Variable-Size Blocks and Predictive Tools.

290. A Particle Filter Algorithm Based on Multi-feature Compound Model for Sound Source Tracking in Reverberant and Noisy Environments.

291. An inexact proximal majorization-minimization algorithm for remote sensing image stripe noise removal.

292. Sample size determination for interval estimation of the prevalence of a sensitive attribute under non‐randomized response models.

293. A mixed variational approach for modeling frictional contact problems with normal compliance in electro-elasticity.

294. Semantic community query in a large‐scale attributed graph based on an attribute cohesiveness optimization strategy.

295. A new iterative fuzzy approach to the multi-objective fractional solid transportation problem with mixed constraints using a bisection algorithm.

296. Minimum Distance Calculation Method for Collision Issues in Lifting Construction Scenarios.

297. Efficient System Reliability–Based Disaster Resilience Analysis of Structures Using Importance Sampling.

298. Fault-tolerant allocation of deadline-constrained tasks through preemptive migration in heterogeneous cloud environments.

299. Investigating large language models capabilities for automatic code repair in Python.

300. MPTD: optimizing multi-path transport with dynamic target delay in datacenters.