Results 31 to 40 of about 133,596 (138)
An Anti-Collision Algorithm for RFID Based on an Array and Encoding Scheme
In order to solve the problem of tag collision in Radio Frequency Identification (RFID) system, the paper proposes a Multi-Bit Identification Collision Tree (MICT) algorithm based on a collision tree.
Baolong Liu, Xiaohao Su
doaj +1 more source
Calculating Kolmogorov complexity from the output frequency distributions of small Turing machines. [PDF]
Drawing on various notions from theoretical computer science, we present a novel numerical approach, motivated by the notion of algorithmic probability, to the problem of approximating the Kolmogorov-Chaitin complexity of short strings.
Fernando Soler-Toscano +3 more
doaj +1 more source
Direct Aperture Optimization for Intensity Modulated Radiation Therapy: Two Calibrated Metaheuristics and Liver Cancer Case Study [PDF]
Integrated treatment planning for cancer patients has high importance in intensity modulated radiation therapy (IMRT). Direct aperture optimization (DAO) is one of the prominent approaches used in recent years to attain this goal.
Ali Fallahi +2 more
doaj
The increasing number and functional complexity of power electronics in more electric aircraft (MEA) power systems have led to a high degree of complexity in modelling and computation, making real-time energy management a formidable challenge, and the ...
Bing Liu +4 more
doaj +1 more source
37 RevTeX pages, 15 figures; submitted to Phys.Rev ...
Cocco, Simona, Monasson, Remi
openaire +2 more sources
METHODS OF SOLVING THE PATTERN RECOGNITION PROBLEM USING RESIDUE NUMBER SYSTEM
The paper proposes a possibility of implementing algorithms of solving the pattern recognition problem in the Residue Number System. Considered the most advanced information processing algorithms in the Residue Number System and performed their ...
Nikolay Ivanovich Chervyakov +2 more
doaj
This paper addresses the problem of decoding non-binary low density parity check codes(LDPC) over finite field $GF(q)$ using symbol flipping approach.
Waheed Ullah +2 more
doaj +1 more source
A Comparison of Security and its Performance for Key Agreements in Post-Quantum Cryptography
Nowadays, we are surrounded by devices collecting and transmitting private information. Currently, the two main mathematical problems that guarantee security on the Internet are the Integer Factorization Problem and the Discrete Logarithm Problem ...
Fabio Borges +2 more
doaj +1 more source
Path Coverage Algorithm Based on Minimization of Sensor Movement Distance [PDF]
Most of existing algorithms for path coverage do not consider minimization of sensors movement distance.Aiming at this situation,this paper proves that the above mentioned problem is NP-hard,and presents a heuristic path covering algorithm.It moves ...
CHEN Xi,LIU Zhixiong
doaj +1 more source
Revisiting Online Algorithms: A Survey of Set Cover Solutions Beyond Competitive Analysis
Online algorithms are crucial for real-time decision-making and adaptability across diverse fields, such as operations research, computer science, and combinatorics. These algorithms handle data incrementally and make decisions without prior knowledge of
Christine Markarian +2 more
doaj +1 more source

