scroll to top
0

Mobile Menu

Header Layout

EBSCO Auth Banner

Let's find your institution. Click here.

Page title

Advanced Search Results For "COMPUTATIONAL complexity"

1 - 10 of 58,808 results for
 "COMPUTATIONAL complexity"
Results per page:

Various extensions in resource-constrained project scheduling with alternative subgraphs.

Publication Type:Academic Journal

Source(s):International Journal of Production Research. Jun2022, Vol. 60 Issue 11, p3501-3520. 20p. 11 Charts, 2 Graphs.

Abstract:In this research, we present several extensions for the resource-constrained project scheduling problem with alternative subgraphs (RCPSP-AS). First of all, we investigate more complex variants of the alternative project structure. More precisely, we c...

View details

A Novel Peak-to-Average Power Ratio Reduction for 5G Advanced Waveforms.

Publication Type:Academic Journal

Source(s):Computers, Materials & Continua. 2022, Vol. 73 Issue 1, p1637-1648. 12p.

Abstract:Multi and single carrier waveforms are utilized in cellular systems for high-speed data transmission. In The Fifth Generation (5G) system, several waveform techniques based on multi carrier waveforms are proposed. However, the Peak to Average Power Rat...

View details

Real-time Volume Preserving Constraints for Volumetric Model on GPU.

Publication Type:Academic Journal

Source(s):Computers, Materials & Continua. 2022, Vol. 73 Issue 1, p831-848. 18p.

Abstract:This paper presents a parallel method for simulating real-time 3D deformable objects using the volume preservationmass-spring system method on tetrahedron meshes. In general, the conventional mass-spring system is manipulated as a force-driven method b...

View details

A Computationally Efficient Algorithm for DOA Estimation with Unfolded Coprime Linear Array.

Publication Type:Academic Journal

Source(s):Mathematical Problems in Engineering. 9/5/2022, p1-12. 12p.

Abstract:In this paper, we investigate the direction of arrival (DOA) estimation problem with unfolded coprime linear array (UCLA) and propose a low computational complexity signal-subspace fitting (SF) algorithm. SF algorithm is able to achieve excellent DOA e...

View details

Revocable One-Time Ring Signature from Pairings.

Publication Type:Academic Journal

Source(s):Wireless Communications & Mobile Computing. 8/18/2022, p1-14. 14p.

Abstract:Ring signature is an anonymous signature that allows a person to sign a message on behalf of a self-formed group while concealing the identification of the signer. However, due to its anonymity and unlinkability, malicious or irresponsible signers can ...

View details

Secure Two-Party Computation Based on Fast Cut-and-Choose Bilateral Oblivious Transfer.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 6/27/2022, p1-10. 10p.

Abstract:In secure two-party computation, each party has its input and wants to jointly compute a function from which it obtains the output corresponding to its respective inputs. For achieving security against a malicious adversary, an effective approach is us...

View details

Amplitude-Based Smoothed Sparse Phase Retrieval Algorithm.

Publication Type:Academic Journal

Source(s):Wireless Communications & Mobile Computing. 6/9/2022, p1-12. 12p.

Abstract:Sparse phase retrieval mainly solves nonconvex and nonsmooth problems. Aiming at the nonsmooth problem in sparse phase retrieval, we propose a smoothing algorithm which is called sparse smoothed amplitude flow (SPSAF). The proposed SPSAF algorithm is a...

View details

Performance Analysis of Machine Learning Methods with Class Imbalance Problem in Android Malware Detection.

Publication Type:Academic Journal

Source(s):International Journal of Interactive Mobile Technologies. 2022, Vol. 16 Issue 10, p140-162. 23p.

Abstract:Due to the exponential rise of mobile technology, a slew of new mobile security concerns has surfaced recently. To address the hazards connected with malware, many approaches have been developed. Signature-based detection is the most widely used approa...

View details

Decision List Compression by Mild Random Restrictions.

Publication Type:Academic Journal

Source(s):Journal of the ACM. Dec2021, Vol. 68 Issue 6, p1-17. 17p.

Abstract:A decision list is an ordered list of rules. Each rule is specified by a term, which is a conjunction of literals, and a value. Given an input, the output of a decision list is the value corresponding to the first rule whose term is satisfied by the in...

View details

Construction of Higher Education Management Data Analysis Model Based on Association Rules.

Publication Type:Academic Journal

Source(s):Scientific Programming. 4/23/2022, p1-12. 12p.

Abstract:This paper adopts the analytical method of intelligent programming to conduct in-depth research and analysis on university education management and designs a corresponding university education management model to be applied in actual teaching. Based on...

View details

banner_970x250 (970x250)

sponsored