You are currently on the new version of our website. Access the old version .

754 Results Found

  • Article
  • Open Access
8 Citations
2,493 Views
17 Pages

12 October 2022

Geometric iteration (GI) is one of the most efficient curve- or surface-fitting techniques in recent years, which is famous for its remarkable geometric significance. In essence, GI can be thought of as the sum of iterative methods for solving system...

  • Article
  • Open Access
2 Citations
6,024 Views
15 Pages

Successive Standardization of Rectangular Arrays

  • Richard A. Olshen and
  • Bala Rajaratnam

29 February 2012

In this note we illustrate and develop further with mathematics and examples, the work on successive standardization (or normalization) that is studied earlier by the same authors in [1] and [2]. Thus, we deal with successive iterations applied to re...

  • Article
  • Open Access
5 Citations
3,373 Views
8 Pages

2 January 2020

In massive multiple-input multiple-output (M-MIMO) systems, a detector based on maximum likelihood (ML) algorithm attains optimum performance, but it exhaustively searches all possible solutions, hence, it has a very high complexity and realization i...

  • Article
  • Open Access
25 Citations
4,050 Views
16 Pages

Numerical Solutions of Fractional-Order Electrical RLC Circuit Equations via Three Numerical Techniques

  • Uroosa Arshad,
  • Mariam Sultana,
  • Ali Hasan Ali,
  • Omar Bazighifan,
  • Areej A. Al-moneef and
  • Kamsing Nonlaopon

25 August 2022

In this article, three different techniques, the Fractional Perturbation Iteration Method (FPIA), Fractional Successive Differentiation Method (FSDM), and Fractional Novel Analytical Method (FNAM), have been introduced. These three iterative methods...

  • Article
  • Open Access
70 Citations
5,594 Views
14 Pages

31 October 2018

The paper describes a new non-iterative linear supervised learning predictor. It is based on the use of Ito decomposition and the neural-like structure of the successive geometric transformations model (SGTM). Ito decomposition (Kolmogorov–Gabor poly...

  • Article
  • Open Access
6 Citations
3,492 Views
20 Pages

Joint Beam-Forming Optimization for Active-RIS-Assisted Internet-of-Things Networks with SWIPT

  • Lidong Liu,
  • Shidang Li,
  • Mingsheng Wei,
  • Jinsong Xu and
  • Bencheng Yu

6 January 2024

Network energy resources are limited in communication systems, which may cause energy shortages in mobile devices at the user end. Active Reconfigurable Intelligent Surfaces (A-RIS) not only have phase modulation properties but also enhance the signa...

  • Article
  • Open Access
12 Citations
5,119 Views
17 Pages

This paper investigates the potential of active reconfigurable intelligent surfaces (RIS) to enhance wireless-powered communication networks (WPCNs), addressing the evolving connectivity needs of the internet of things (IoT). Active RIS, capable of a...

  • Article
  • Open Access
36 Citations
10,105 Views
34 Pages

27 November 2018

In order to overcome the several shortcomings of Particle Swarm Optimization (PSO) e.g., premature convergence, low accuracy and poor global searching ability, a novel Simple Particle Swarm Optimization based on Random weight and Confidence term (SPS...

  • Article
  • Open Access
1 Citations
1,458 Views
14 Pages

3 April 2024

In order to solve continuous stochastic Lyapunov equations, a novel implicit iterative algorithm is presented by means of successive over relaxation (SOR) iteration in this article. Throughout this method, three tuning parameters are added for the im...

  • Article
  • Open Access
2,706 Views
15 Pages

29 October 2024

This paper presents a comprehensive exploration of advanced beamforming techniques tailored for millimeter-wave (mm-Wave) communication systems. In response to the burgeoning demand for higher data rates, coupled with the constraints of power consump...

  • Article
  • Open Access
10 Citations
4,519 Views
12 Pages

A Robust Hybrid Iterative Linear Detector for Massive MIMO Uplink Systems

  • Mahmoud A. Albreem,
  • Mohammed H. Alsharif and
  • Sunghwan Kim

21 February 2020

Fifth-generation (5G) communications system is commercially introduced by several mobile operators where sub-6 GHz bands are the backbone of the 5G networks. A large-scale multiple-input multiple-output (MIMO), or massive MIMO (mMIMO), technology has...

  • Article
  • Open Access
96 Citations
5,350 Views
15 Pages

An Approach towards Increasing Prediction Accuracy for the Recovery of Missing IoT Data based on the GRNN-SGTM Ensemble

  • Roman Tkachenko,
  • Ivan Izonin,
  • Natalia Kryvinska,
  • Ivanna Dronyuk and
  • Khrystyna Zub

4 May 2020

The purpose of this paper is to improve the accuracy of solving prediction tasks of the missing IoT data recovery. To achieve this, the authors have developed a new ensemble of neural network tools. It consists of two successive General Regression Ne...

  • Article
  • Open Access
1 Citations
2,006 Views
8 Pages

28 August 2021

We introduce some research results on a type of third-order boundary value problem for positive iterative solutions. The existence of solutions to these problems was proved using the monotone iterative technique. As an examination of the proposed met...

  • Article
  • Open Access
2 Citations
2,195 Views
17 Pages

28 April 2021

In 2017, Polyanskiy showed that the trade-off between power and bandwidth efficiency for massive Gaussian random access is governed by two fundamentally different regimes: low power and high power. For both regimes, tight performance bounds were foun...

  • Article
  • Open Access
7 Citations
2,723 Views
13 Pages

15 February 2022

The tensor absolute value equation is a class of interesting structured multilinear systems. In this article, from the perspective of pure numerical algebra, we first consider a tensor-type successive over-relaxation method (SOR) (called TSOR) and te...

  • Article
  • Open Access
6 Citations
1,476 Views
10 Pages

1 August 2006

In this paper presents a new model procedure for the solution of the incompressible Navier-Stokes equations in primitive variables, using grid generation techniques. The time dependent momentum equations are solved explicitly for the velocity field u...

  • Article
  • Open Access
14 Citations
5,244 Views
9 Pages

1 February 2018

In this article, three numerical iterative schemes, namely: Jacobi, Gauss–Seidel and Successive over-relaxation (SOR) have been proposed to solve a fuzzy system of linear equations (FSLEs). The convergence properties of these iterative schemes have b...

  • Article
  • Open Access
1,641 Views
17 Pages

1 July 2024

The computation of Green’s function is a basic and time-consuming task in realizing seismic imaging using integral operators because the function is the kernel of the integral operators and because every image point functions as the source poin...

  • Article
  • Open Access
3 Citations
1,752 Views
17 Pages

Efficient and Low-Complex Signal Detection with Iterative Feedback in Wireless MIMO-OFDM Systems

  • Ying Chen,
  • Yue Tang,
  • Bin Jiang,
  • Yinan Zhao,
  • Jianrong Bao and
  • Xianghong Tang

13 December 2023

To solve error propagation and exorbitant computational complexity of signal detection in wireless multiple-input multiple-output-orthogonal frequency division multiplexing (MIMO-OFDM) systems, a low-complex and efficient signal detection with iterat...

  • Article
  • Open Access
5 Citations
2,811 Views
10 Pages

11 November 2019

In this paper, we consider the recently introduced C A T p ( 0 ) , where the comparison triangles belong to ℓ p , for p ≥ 2 . We first establish an inequality in these nonlinear metric spaces. Then, we use it to prove the...

  • Article
  • Open Access
2 Citations
2,515 Views
19 Pages

16 July 2024

The successive over-relaxation method and its symmetric extension to the symmetric successive over-relaxation method inherit the advantages of direct method and iterative method; they are simple iterative algorithms to solve the linear systems. We de...

  • Article
  • Open Access
2 Citations
1,331 Views
24 Pages

11 June 2024

The symmetric successive overrelaxation (SSOR) and symmetric accelerated overrelaxation (SAOR) are conventional iterative methods for solving linear equations. In this paper, novel approaches are presented by combining a splitting–linearizing m...

  • Article
  • Open Access
3 Citations
3,203 Views
16 Pages

Sequential Ambiguity Resolution Method for Poorly-Observed GNSS Data

  • Haiyang Li,
  • Guigen Nie,
  • Shuguang Wu and
  • Yuefan He

27 May 2021

Integer ambiguity resolution is required to obtain precise coordinates for the global navigation satellite system (GNSS). Poorly observed data cause unfixed integer ambiguity and reduce the coordinate accuracy. Previous studies mostly used denoise fi...

  • Article
  • Open Access
2,249 Views
14 Pages

2 September 2019

The optimal fixed-point quantum search (OFPQS) algorithm [Phys. Rev. Lett. 113, 210501 (2014)] achieves both the fixed-point property and quadratic speedup over classical algorithms, which gives a sufficient condition on the number of iterations to e...

  • Article
  • Open Access
16 Citations
4,918 Views
25 Pages

Iterative Methods for Solving a System of Linear Equations in a Bipolar Fuzzy Environment

  • Muhammad Akram,
  • Ghulam Muhammad,
  • Ali N. A. Koam and
  • Nawab Hussain

9 August 2019

We develop the solution procedures to solve the bipolar fuzzy linear system of equations (BFLSEs) with some iterative methods namely Richardson method, extrapolated Richardson (ER) method, Jacobi method, Jacobi over-relaxation (JOR) method, Gauss&nda...

  • Article
  • Open Access
1,804 Views
18 Pages

2 April 2023

A new optimization approach is considered in the class of polynomial in-state optimal control problems with constraints based on nonlocal control improvement conditions, which are constructed in the form of special fixed-point problems in the control...

  • Proceeding Paper
  • Open Access
1,333 Views
6 Pages

26 October 2023

The binomial distribution is the probability distribution of the number of successes for a sequence of n independent trials with success probability p. Efficiently generating binomial random variates is important in many modeling and simulation appli...

  • Article
  • Open Access
1 Citations
1,708 Views
15 Pages

8 November 2024

Accurate deblending techniques are essential for the successful application of blended seismic acquisition. Deep-learning-based deblending methods typically begin by performing a pseudo-deblending operation on blended data, followed by further proces...

  • Article
  • Open Access
12 Citations
2,723 Views
18 Pages

At present, deep neural networks have been widely used in various fields, but their vulnerability requires attention. The adversarial attack aims to mislead the model by generating imperceptible perturbations on the source model, and although white-b...

  • Article
  • Open Access
21 Citations
3,518 Views
15 Pages

23 October 2020

Designing an optimal iterative learning control is a huge challenge for linear and nonlinear dynamic systems. For such complex systems, standard Norm optimal iterative learning control (NOILC) is an important consideration. This paper presents a nove...

  • Article
  • Open Access
15 Citations
2,854 Views
15 Pages

6 December 2018

In wireless network communication, in-band full-duplex technique is a useful and important technique that can enlarge the whole throughput of the wireless networks. However, its use needs harsh environment. The successive interference cancellation ca...

  • Article
  • Open Access
11 Citations
1,481 Views
21 Pages

The primary purpose of this work is to provide a new fractional boundary element method (BEM) formulation to solve thermal stress wave propagation problems in anisotropic materials. In the Laplace domain, the fundamental solutions to the governing eq...

  • Article
  • Open Access
2 Citations
2,014 Views
15 Pages

5 February 2024

In this paper, we propose an Iterative Greedy-Universal Adversarial Perturbations (IGUAP) approach based on an iterative greedy algorithm to create universal adversarial perturbations for acoustic prints. A thorough, objective account of the IG-UAP m...

  • Article
  • Open Access
27 Citations
3,207 Views
10 Pages

24 September 2019

In this paper, we propose a class of simple numerical methods for approximating solutions of one-dimensional mixed Volterra–Fredholm integral equations of the second kind. These methods are based on fixed point results for the existence and uni...

  • Article
  • Open Access
878 Views
38 Pages

13 June 2025

Massive multiple input–multiple output (M-MIMO) is a promising and pivotal technology in contemporary wireless communication systems that can effectively enhance link reliability and data throughput, especially in uplink scenarios. Even so, the...

  • Letter
  • Open Access
14 Citations
3,594 Views
10 Pages

19 October 2018

To improve the parameter estimation performance of uncooperative Orthogonal Frequency Division Multi- (OFDM) Linear Frequency Modulation (LFM) radar signals, this paper proposes an iterative high-accuracy method, which is based on Fractional Fourier...

  • Article
  • Open Access
25 Citations
6,672 Views
23 Pages

Automated 3D Reconstruction Using Optimized View-Planning Algorithms for Iterative Development of Structure-from-Motion Models

  • Samuel Arce,
  • Cory A. Vernon,
  • Joshua Hammond,
  • Valerie Newell,
  • Joseph Janson,
  • Kevin W. Franke and
  • John D. Hedengren

7 July 2020

Unsupervised machine learning algorithms (clustering, genetic, and principal component analysis) automate Unmanned Aerial Vehicle (UAV) missions as well as the creation and refinement of iterative 3D photogrammetric models with a next best view (NBV)...

  • Article
  • Open Access
2 Citations
2,471 Views
29 Pages

19 October 2023

Due to the high computational burden and the high non-linearity of the responses, crashworthiness optimizations are notoriously hard-to-solve challenges. Among various approaches, methods like the Successive Response Surface Method (SRSM) have stood...

  • Article
  • Open Access
1 Citations
4,539 Views
12 Pages

Iterative QR-Based SFSIC Detection and Decoder Algorithm for a Reed–Muller Space-Time Turbo System

  • Liang-Fang Ni,
  • Yi Wang,
  • Wei-Xia Li,
  • Pei-Zhen Wang and
  • Jia-Yan Zhang

20 August 2017

An iterative QR-based soft feedback segment interference cancellation (QRSFSIC) detection and decoder algorithm for a Reed–Muller (RM) space-time turbo system is proposed in this paper. It forms the sufficient statistic for the minimum-mean-square er...

  • Article
  • Open Access
4,619 Views
19 Pages

Personal Growth and Wellbeing: An Iterative Mindset Assessment and Perspective

  • Kyra Bobinet,
  • Jeni L. Burnette,
  • Whitney Becker and
  • Mallory Rowell

4 July 2025

Interest in personal growth is expanding in both the popular press and the scientific literature. These expansions incorporate varied theoretical approaches and multiple areas of life. In the current work, we propose a novel perspective that focuses...

  • Article
  • Open Access
12 Citations
3,115 Views
16 Pages

Boosting Adversarial Attacks with Nadam Optimizer

  • Qikun Zhang,
  • Yuzhi Zhang,
  • Yanling Shao,
  • Mengqi Liu,
  • Jianyong Li,
  • Junling Yuan and
  • Ruifang Wang

Deep neural networks are extremely vulnerable to attacks and threats from adversarial examples. These adversarial examples deliberately crafted by attackers can easily fool classification models by adding imperceptibly tiny perturbations on clean ima...

  • Article
  • Open Access
45 Citations
5,268 Views
16 Pages

25 May 2022

This article demonstrates how the new Double Laplace–Sumudu transform (DLST) is successfully implemented in combination with the iterative method to obtain the exact solutions of nonlinear partial differential equations (NLPDEs) by considering...

  • Article
  • Open Access
1 Citations
2,478 Views
23 Pages

12 October 2023

Though an accurate measurement of entropy, or more generally uncertainty, is critical to the success of human–machine teams, the evaluation of the accuracy of such metrics as a probability of machine correctness is often aggregated and not asse...

  • Article
  • Open Access
2 Citations
3,223 Views
24 Pages

Flexible Krylov Methods for Edge Enhancement in Imaging

  • Silvia Gazzola,
  • Sebastian James Scott and
  • Alastair Spence

18 October 2021

Many successful variational regularization methods employed to solve linear inverse problems in imaging applications (such as image deblurring, image inpainting, and computed tomography) aim at enhancing edges in the solution, and often involve non-s...

  • Article
  • Open Access
1 Citations
5,766 Views
16 Pages

Analyzing Iterative Training Game Design: A Multi-Method Postmortem Analysis of CYCLES Training Center and CYCLES Carnivale

  • Adrienne Shaw,
  • Brian McKernan,
  • Rosa M. Martey,
  • Jennifer Stromer-Galley,
  • Emilie T. Saulnier,
  • Elizabeth McLaren,
  • Matthew G. Rhodes,
  • James E. Folkestad,
  • Sarah M. Taylor and
  • Tomek Stralkowski
  • + 2 authors

That games can be used to teach specific content has been demonstrated numerous times. However, although specific game features have been conjectured to have an impact on learning outcomes, little empirical research exists on the impact of iterative...

  • Article
  • Open Access
23 Citations
3,522 Views
19 Pages

Design and Development of Multi-Agent Reinforcement Learning Intelligence on the Robotarium Platform for Embedded System Applications

  • Lorenzo Canese,
  • Gian Carlo Cardarilli,
  • Mohammad Mahdi Dehghan Pir,
  • Luca Di Nunzio and
  • Sergio Spanò

This research explores the use of Q-Learning for real-time swarm (Q-RTS) multi-agent reinforcement learning (MARL) algorithm for robotic applications. This study investigates the efficacy of Q-RTS in the reducing convergence time to a satisfactory mo...

  • Article
  • Open Access
1 Citations
2,564 Views
17 Pages

18 February 2022

We study some properties of binary sequences generated by random substitutions of constant length. Specifically, assuming the alphabet {0,1}, we consider the following asymmetric substitution rule of length k: 0→⟨0,0,…,0⟩ an...

  • Article
  • Open Access
1 Citations
1,701 Views
17 Pages

In recent years, the fractional Laplacian has attracted the attention of many researchers, the corresponding fractional obstacle problems have been widely applied in mathematical finance, particle systems, and elastic theory. Furthermore, the monoton...

  • Article
  • Open Access
304 Views
26 Pages

20 November 2025

In spite of great successes of the inertial step approach (ISA) in various fields, we are investigating the converse inertial step approach (CISA) for the first time. First, the classical Picard iteration for solving nonexpansive mappings converges w...

  • Article
  • Open Access
2 Citations
2,175 Views
11 Pages

Enhancing the Transferability of Targeted Attacks with Adversarial Perturbation Transform

  • Zhengjie Deng,
  • Wen Xiao,
  • Xiyan Li,
  • Shuqian He and
  • Yizhen Wang

15 September 2023

The transferability of adversarial examples has been proven to be a potent tool for successful attacks on target models, even in challenging black-box environments. However, the majority of current research focuses on non-targeted attacks, making it...

of 16