Showing 441 - 460 results of 571 for search 'path optimization algorithm', query time: 0.14s Refine Results
  1. 441

    Comparison table of authentication delay. by Zhanfei Ma (12506951)

    Published 2025
    “…Therefore, this paper proposes a lightweight authentication framework for Cloud-Edge-End, which integrates the enhanced Fast Authentication and Signature Trust for SM9 (FAST-SM9) algorithm and zero-trust Dynamic Re-authentication (zero-trust-DRA) mechanism. …”
  2. 442

    Comparison of total communication costs. by Zhanfei Ma (12506951)

    Published 2025
    “…Therefore, this paper proposes a lightweight authentication framework for Cloud-Edge-End, which integrates the enhanced Fast Authentication and Signature Trust for SM9 (FAST-SM9) algorithm and zero-trust Dynamic Re-authentication (zero-trust-DRA) mechanism. …”
  3. 443

    Symbols and descriptions. by Zhanfei Ma (12506951)

    Published 2025
    “…Therefore, this paper proposes a lightweight authentication framework for Cloud-Edge-End, which integrates the enhanced Fast Authentication and Signature Trust for SM9 (FAST-SM9) algorithm and zero-trust Dynamic Re-authentication (zero-trust-DRA) mechanism. …”
  4. 444

    The AVISPA model diagram. by Zhanfei Ma (12506951)

    Published 2025
    “…Therefore, this paper proposes a lightweight authentication framework for Cloud-Edge-End, which integrates the enhanced Fast Authentication and Signature Trust for SM9 (FAST-SM9) algorithm and zero-trust Dynamic Re-authentication (zero-trust-DRA) mechanism. …”
  5. 445

    FMM and multi-layer security strategy diagram. by Zhanfei Ma (12506951)

    Published 2025
    “…Therefore, this paper proposes a lightweight authentication framework for Cloud-Edge-End, which integrates the enhanced Fast Authentication and Signature Trust for SM9 (FAST-SM9) algorithm and zero-trust Dynamic Re-authentication (zero-trust-DRA) mechanism. …”
  6. 446

    Continuous message window authentication diagram. by Zhanfei Ma (12506951)

    Published 2025
    “…Therefore, this paper proposes a lightweight authentication framework for Cloud-Edge-End, which integrates the enhanced Fast Authentication and Signature Trust for SM9 (FAST-SM9) algorithm and zero-trust Dynamic Re-authentication (zero-trust-DRA) mechanism. …”
  7. 447

    Data Sheet 1_Conflict-based model predictive control for multi-agent path finding experimentally validated on a magnetic planar drive system.pdf by Kai Janning (21563594)

    Published 2025
    “…</p>Methods<p>The proposed method leverages the conflict-avoidance strengths of CBS to generate collision-free paths, which are then refined into dynamic reference trajectories using a minimum jerk trajectory optimizer and then used inside a MPC to follow the trajectories and to avoid collisions. …”
  8. 448

    Results of the computational analysis. by Stefano Starita (19865012)

    Published 2024
    “…A randomized greedy algorithm is developed to tackle the complex network design and facility location problem. …”
  9. 449

    Randomized greedy parameters. by Stefano Starita (19865012)

    Published 2024
    “…A randomized greedy algorithm is developed to tackle the complex network design and facility location problem. …”
  10. 450

    Huai Kwang network. by Stefano Starita (19865012)

    Published 2024
    “…A randomized greedy algorithm is developed to tackle the complex network design and facility location problem. …”
  11. 451

    Test networks for computational analyses. by Stefano Starita (19865012)

    Published 2024
    “…A randomized greedy algorithm is developed to tackle the complex network design and facility location problem. …”
  12. 452

    Graphical representation of the optimization process in machine learning, focusing on the adjustment of weights during gradient descent. by Liu Liu (512237)

    Published 2025
    “…Arrows along the gradient path demonstrate how the optimization algorithm adjusts the weights to reduce the cost function. …”
  13. 453

    MCLP_quantum_annealer_V0.5 by Anonymous Anonymous (4854526)

    Published 2025
    “…This paper presents a quantum computing path for Transformation-to-Sampling-to-Verification of geospatial optimization problems, adaptable to the controlled qubit scale and coherence constraints under current NISQ conditions. …”
  14. 454

    Compare between BLPO and BAPO. by Yao Xue (322282)

    Published 2025
    “…<div><p>In post-disaster scenarios, effective rescue operations hinge on deploying robots equipped with sophisticated path planning algorithms capable of navigating through complex and unknown environments, facilitating an exhaustive search for survivors. …”
  15. 455

    Further compare between BLPO and BAPO. by Yao Xue (322282)

    Published 2025
    “…<div><p>In post-disaster scenarios, effective rescue operations hinge on deploying robots equipped with sophisticated path planning algorithms capable of navigating through complex and unknown environments, facilitating an exhaustive search for survivors. …”
  16. 456

    The flowchart of the proposed method. by Yao Xue (322282)

    Published 2025
    “…<div><p>In post-disaster scenarios, effective rescue operations hinge on deploying robots equipped with sophisticated path planning algorithms capable of navigating through complex and unknown environments, facilitating an exhaustive search for survivors. …”
  17. 457

    Flowchart of the AH-NSAFSA. by Jihui Hu (19812736)

    Published 2024
    “…This algorithm employs a sophisticated approach, amalgamating congestion distance and individual ranking to discern optimal solutions from the population. …”
  18. 458

    Decoding process. by Jihui Hu (19812736)

    Published 2024
    “…This algorithm employs a sophisticated approach, amalgamating congestion distance and individual ranking to discern optimal solutions from the population. …”
  19. 459

    Levels of input parameters. by Jihui Hu (19812736)

    Published 2024
    “…This algorithm employs a sophisticated approach, amalgamating congestion distance and individual ranking to discern optimal solutions from the population. …”
  20. 460

    Tuned values of parameters. by Jihui Hu (19812736)

    Published 2024
    “…This algorithm employs a sophisticated approach, amalgamating congestion distance and individual ranking to discern optimal solutions from the population. …”