Results 61 to 70 of about 908 (146)
Automating Algorithm Experiments With ALGator: From Problem Modeling to Reproducible Results
ABSTRACT Background Theoretical algorithm analysis provides fundamental insights into algorithm complexity but relies on simplified and often outdated computational models. Experimental algorithmics complements this approach by evaluating the empirical performance of algorithm implementations on real data and modern computing platforms.
Tomaž Dobravec
wiley +1 more source
FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan +6 more
wiley +1 more source
Predicting Slice-to-Volume Transformation in Presence of Arbitrary Subject Motion
This paper aims to solve a fundamental problem in intensity-based 2D/3D registration, which concerns the limited capture range and need for very good initialization of state-of-the-art image registration methods.
Alansary, Amir +8 more
core +1 more source
Quaternion-Type Catalan Transforms of the ρ-Fibonacci and ρ-Lucas Numbers [PDF]
Kübra GÜL
openalex +1 more source
On a generalization for fibonacci quaternions
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Halıcı, Serpil, Karataş, Adnan
openaire +7 more sources
Device‐Independent Quantum Key Distribution: Protocols, Quantum Games and Security
Device‐independent quantum key distribution (DIQKD) removes the need to trust internal device behaviour by certifying security through Bell‐inequality violations, thereby closing practical loopholes in conventional QKD. This paper systematically reviews DIQKD foundations (Bell tests and security definitions), protocol frameworks (CHSH‐based and ...
Syed M. Arslan +3 more
wiley +1 more source
Dual Proximal Groups Concisely Representing Complex Hosoya Triangles
This paper introduces dual proximal groups (DPGs) that provide concise representation of complex Hosoya triangles (CHTs). An application is given in terms of the DPG representation of collections of Hosoya‐Hilbert circular triangles on modulated motion waveforms in sequences of video frames. MSC2020 Classification: 11B39,54E05,57S25.
Kübra Gül +3 more
wiley +1 more source
On Bicomplex (p,q)-Fibonacci Quaternions
Here, we describe the bicomplex p,q-Fibonacci numbers and the bicomplex p,q-Fibonacci quaternions based on these numbers to show that bicomplex numbers are not defined the same as bicomplex quaternions.
Çağla Çelemoğlu
doaj +1 more source
Multiloitering Munition Cooperative Surrounding and Attack Method Based on Wolf Pack Algorithm
Aiming at the optimization problem of multiloitering munitions cooperatively surrounding moving targets, this paper proposes a cooperative surrounding and attack method based on the wolf pack algorithm (WPA). Firstly, the relative kinematics model between the munitions and the target is established, and the cooperative surrounding task flow is analyzed
Zetian Zhang +4 more
wiley +1 more source
Nature‐Inspired Design Strategies for Efficient Atmospheric Water Harvesting
This review presents advances in bioinspired atmospheric water harvesting systems, emphasizing how structural motifs such as wettability gradients, directional transport, and hierarchical porosity have been translated into engineered fog‐collection and vapor‐sorption strategies for enhanced water uptake, accelerated transport, and energy‐efficient ...
Yunchan Lee, Shouhong Fan, Shu Yang
wiley +1 more source

