Search alternatives:
path optimization » swarm optimization (Expand Search), whale optimization (Expand Search), based optimization (Expand Search)
path optimization » swarm optimization (Expand Search), whale optimization (Expand Search), based optimization (Expand Search)
-
441
Comparison table of authentication delay.
Published 2025“…Therefore, this paper proposes a lightweight authentication framework for Cloud-Edge-End, which integrates the enhanced Fast Authentication and Signature Trust for SM9 (FAST-SM9) algorithm and zero-trust Dynamic Re-authentication (zero-trust-DRA) mechanism. …”
-
442
Comparison of total communication costs.
Published 2025“…Therefore, this paper proposes a lightweight authentication framework for Cloud-Edge-End, which integrates the enhanced Fast Authentication and Signature Trust for SM9 (FAST-SM9) algorithm and zero-trust Dynamic Re-authentication (zero-trust-DRA) mechanism. …”
-
443
Symbols and descriptions.
Published 2025“…Therefore, this paper proposes a lightweight authentication framework for Cloud-Edge-End, which integrates the enhanced Fast Authentication and Signature Trust for SM9 (FAST-SM9) algorithm and zero-trust Dynamic Re-authentication (zero-trust-DRA) mechanism. …”
-
444
The AVISPA model diagram.
Published 2025“…Therefore, this paper proposes a lightweight authentication framework for Cloud-Edge-End, which integrates the enhanced Fast Authentication and Signature Trust for SM9 (FAST-SM9) algorithm and zero-trust Dynamic Re-authentication (zero-trust-DRA) mechanism. …”
-
445
FMM and multi-layer security strategy diagram.
Published 2025“…Therefore, this paper proposes a lightweight authentication framework for Cloud-Edge-End, which integrates the enhanced Fast Authentication and Signature Trust for SM9 (FAST-SM9) algorithm and zero-trust Dynamic Re-authentication (zero-trust-DRA) mechanism. …”
-
446
Continuous message window authentication diagram.
Published 2025“…Therefore, this paper proposes a lightweight authentication framework for Cloud-Edge-End, which integrates the enhanced Fast Authentication and Signature Trust for SM9 (FAST-SM9) algorithm and zero-trust Dynamic Re-authentication (zero-trust-DRA) mechanism. …”
-
447
Data Sheet 1_Conflict-based model predictive control for multi-agent path finding experimentally validated on a magnetic planar drive system.pdf
Published 2025“…</p>Methods<p>The proposed method leverages the conflict-avoidance strengths of CBS to generate collision-free paths, which are then refined into dynamic reference trajectories using a minimum jerk trajectory optimizer and then used inside a MPC to follow the trajectories and to avoid collisions. …”
-
448
Results of the computational analysis.
Published 2024“…A randomized greedy algorithm is developed to tackle the complex network design and facility location problem. …”
-
449
Randomized greedy parameters.
Published 2024“…A randomized greedy algorithm is developed to tackle the complex network design and facility location problem. …”
-
450
Huai Kwang network.
Published 2024“…A randomized greedy algorithm is developed to tackle the complex network design and facility location problem. …”
-
451
Test networks for computational analyses.
Published 2024“…A randomized greedy algorithm is developed to tackle the complex network design and facility location problem. …”
-
452
Graphical representation of the optimization process in machine learning, focusing on the adjustment of weights during gradient descent.
Published 2025“…Arrows along the gradient path demonstrate how the optimization algorithm adjusts the weights to reduce the cost function. …”
-
453
MCLP_quantum_annealer_V0.5
Published 2025“…This paper presents a quantum computing path for Transformation-to-Sampling-to-Verification of geospatial optimization problems, adaptable to the controlled qubit scale and coherence constraints under current NISQ conditions. …”
-
454
Compare between BLPO and BAPO.
Published 2025“…<div><p>In post-disaster scenarios, effective rescue operations hinge on deploying robots equipped with sophisticated path planning algorithms capable of navigating through complex and unknown environments, facilitating an exhaustive search for survivors. …”
-
455
Further compare between BLPO and BAPO.
Published 2025“…<div><p>In post-disaster scenarios, effective rescue operations hinge on deploying robots equipped with sophisticated path planning algorithms capable of navigating through complex and unknown environments, facilitating an exhaustive search for survivors. …”
-
456
The flowchart of the proposed method.
Published 2025“…<div><p>In post-disaster scenarios, effective rescue operations hinge on deploying robots equipped with sophisticated path planning algorithms capable of navigating through complex and unknown environments, facilitating an exhaustive search for survivors. …”
-
457
Flowchart of the AH-NSAFSA.
Published 2024“…This algorithm employs a sophisticated approach, amalgamating congestion distance and individual ranking to discern optimal solutions from the population. …”
-
458
Decoding process.
Published 2024“…This algorithm employs a sophisticated approach, amalgamating congestion distance and individual ranking to discern optimal solutions from the population. …”
-
459
Levels of input parameters.
Published 2024“…This algorithm employs a sophisticated approach, amalgamating congestion distance and individual ranking to discern optimal solutions from the population. …”
-
460
Tuned values of parameters.
Published 2024“…This algorithm employs a sophisticated approach, amalgamating congestion distance and individual ranking to discern optimal solutions from the population. …”