Showing 921 - 940 results of 3,044 for search '"ITER"', query time: 0.06s Refine Results
  1. 921

    Development and design validation of a novel network meta-analysis presentation tool for multiple outcomes: a qualitative descriptive study by Lehana Thabane, Jason W Busse, Behnam Sadeghirad, Gordon H Guyatt, Mohit Bhandari, Romina Brignardello-Petersen, Fernando Kenji Nampo, Carlos A Cuello-Garcia, Raveendhara R Bannuru, Mark R Phillips, Yu Jia Guo, Sofia Bzovsky

    Published 2022-06-01
    “…We; therefore, developed and iteratively modified a presentation method that effectively summarises NMA results of multiple outcomes for clinicians using this new interpretation approach.Design Qualitative descriptive study.Setting A steering group of seven individuals with experience in NMA and design validation studies developed two colour-coded presentation formats for evaluation. …”
    Get full text
    Article
  2. 922

    The Hybrid Steepest Descent Method for Split Variational Inclusion and Constrained Convex Minimization Problems by Jitsupa Deepho, Poom Kumam

    Published 2014-01-01
    “…We introduced an implicit and an explicit iteration method based on the hybrid steepest descent method for finding a common element of the set of solutions of a constrained convex minimization problem and the set of solutions of a split variational inclusion problem.…”
    Get full text
    Article
  3. 923

    New Integral Inequalities with Weakly Singular Kernel for Discontinuous Functions and Their Applications to Impulsive Fractional Differential Systems by Jing Shao

    Published 2014-01-01
    “…Some new integral inequalities with weakly singular kernel for discontinuous functions are established using the method of successive iteration and properties of Mittag-Leffler function, which can be used in the qualitative analysis of the solutions to certain impulsive fractional differential systems.…”
    Get full text
    Article
  4. 924

    Cooperative Optimization QoS Cloud Routing Protocol Based on Bacterial Opportunistic Foraging and Chemotaxis Perception for Mobile Internet by Shujuan Wang, Long He, Guiru Cheng

    Published 2015-01-01
    “…This mechanism is based on the characteristics of drug resistance of bacteria and the structure of the field, and through many iterations of the individual behavior and population behavior the bacteria can be spread to the food gathering area with a certain probability. …”
    Get full text
    Article
  5. 925

    Complexities in Assessing Structural Health of Civil Infrastructures by Abdullah Al-Hussein, Achintya Haldar

    Published 2017-01-01
    “…Instead of using one long duration time-history in one global iteration, very short duration time-histories and multiple global iterations with weight factors are used to locate the defect spot more accurately and efficiently. …”
    Get full text
    Article
  6. 926

    Path Optimization in Robotic Welding of Plate Heat Exchangers: An Improved Ant Colony Approach by Xianlong Chu, Xinning Li, Hu Wu, Xianhai Yang, Liyong Yang

    Published 2024-01-01
    “…The experimental results show that the IACAG algorithm has excellent performance in welding heat exchanger path planning and can achieve lower calculation time and iteration times under the conditions of optimal solution and zero deviation, showing comprehensive advantages in solution quality, stability, and efficiency.…”
    Get full text
    Article
  7. 927

    SVD-Aided Beamforming and Power Allocation Algorithm for Multiuser Turbo-BLAST System Uplink with Imperfect CSI by Xiaomin Chen, Xiangbin Yu, Dazhuan Xu

    Published 2012-01-01
    “…Furthermore, BER performance can be enhanced by the modified iterative detection. The effect of CSI imperfection is evaluated, which is proved to be a useful tool to assess the system performance with imperfect CSI.…”
    Get full text
    Article
  8. 928

    Higher-Order Expansions for Estimators in the Presence of Nuisance Parameters by Paul Rilstone

    Published 2025-01-01
    “…We allow for both one-step estimators, in which the nuisance and parameters of interest are jointly estimated; and also two-step (or iterated) estimators, in which the nuisance parameters are first estimated. …”
    Get full text
    Article
  9. 929

    Predicting the Optimal Treatment for Diseases Using Whale Optimization Algorithm by Sudad Abed, Zuhal Adel Madlool

    Published 2024-09-01
    “…We obtained good results for predicting the appropriate treatment for the disease in the proposed research, compared to the results obtained when applying the PSO algorithm before development in state of earlier, where the results obtained in the proposed research had higher accuracy than the results in in state of earlier at high iterations starting from 200 iterations and also had a lower error rate.: …”
    Get full text
    Article
  10. 930

    Aspectual reduplication in Sign Language of the Netherlands: reconsidering phonological constraints and aspectual distinctions by van Boven Cindy

    Published 2025-01-01
    “…The study focuses on three aspect types that have been found to be encoded by reduplication across sign languages – habitual, continuative, and iterative – and addresses potential phonological restrictions. …”
    Get full text
    Article
  11. 931

    Algorithm study of digital HPA predistortion using one novel memory type BP neural network by Chun-hui HUANG, Yong-jie WEN

    Published 2014-01-01
    “…Based on the characteristic analysis of the high power amplifier (HPA) in wide-band CMMB repeater stations,a novel neural network was proposed which can respectively process the memory effect and the nonlinear of power amplifier.The novel model based on real-valued time-delay neural networks(RVTDNN) uses the Levenberg-Marquardt (LM) optimization to iteratively update the coefficients of the neural network.Due to the new parameters w<sup>0</sup>in the novel NN model,the modified formulas of LM algorithm were provided.Next,in order to eliminate the over-fitting of LM algorithm,the Bayesian regularization algorithm was applied to the predistortion system.Additionally,the predistorter of CMMB repeater stations based on the indirect learning method was constructed to simulate the nonlinearity and memory effect of HPA.Simulation results show that both the NN models can improve system performance and reduce ACEPR (adjacent channel error power ratio ) by about 30 dB.Moreover,with the mean square error less than 10<sup>−6</sup>,the coefficient of network for FIR-NLNNN is about half of that for RVTDNN.Similarly,the times of multiplication and addition in the iterative process of FIR-NLNNN are about 25% of that for RVTDNN.…”
    Get full text
    Article
  12. 932

    Particle Swarm Algorithms to Solve Engineering Problems: A Comparison of Performance by Giordano Tomassetti, Leticia Cagnina

    Published 2013-01-01
    “…Comparison is made both in terms of fixed iterations tests to judge the solution quality reached and fixed threshold to evaluate how quickly each algorithm reaches near-optimal solutions. …”
    Get full text
    Article
  13. 933

    CFD-Guided Development of Test Rigs for Studying Erosion and Large-Particle Damage of Thermal Barrier Coatings by Maria A. Kuczmarski, Robert A. Miller, Dongming Zhu

    Published 2011-01-01
    “…Rig development is typically an iterative process of making incremental modifications to improve the rig performance for testing requirements. …”
    Get full text
    Article
  14. 934

    Differential privacy budget optimization based on deep learning in IoT by Dan LUO, Ruzhi XU, Zhitao GUAN

    Published 2022-06-01
    “…In order to effectively process the massive data brought by the large-scale application of the internet of things (IoT), deep learning is widely used in IoT environment.However, in the training process of deep learning, there are security threats such as reasoning attacks and model reverse attacks, which can lead to the leakage of the original data input to the model.Applying differential privacy to protect the training process parameters of the deep model is an effective way to solve this problem.A differential privacy budget optimization method was proposed based on deep learning in IoT, which adaptively allocates different budgets according to the iterative change of parameters.In order to avoid the excessive noise, a regularization term was introduced to constrain the disturbance term.Preventing the neural network from over fitting also helps to learn the salient features of the model.Experiments show that this method can effectively enhance the generalization ability of the model.As the number of iterations increases, the accuracy of the model trained after adding noise is almost the same as that obtained by training using the original data, which not only achieves privacy protection, but also guarantees the availability, which means balance the privacy and availability.…”
    Get full text
    Article
  15. 935

    Optimum Design Research on the Link Mechanism of the JP72 Lifting Jet Fire Truck Boom System by Guo Tong, Wang Jiawen, Liang Yingnan, Peng Buyu, Liu Tao, Liu Yiqun

    Published 2024-12-01
    “…After several iterations of calculation and optimization design, the design scheme that met the work requirements was successfully obtained.…”
    Get full text
    Article
  16. 936

    Joint transmit filter and sparse array design with transmit subaperturing FDA‐MIMO radar by Zihang Ding, Junwei Xie

    Published 2022-04-01
    “…However, the optimisation problem is non‐convex. A cycle iteration algorithm is proposed to obtain the optimal transmit filters and sparse array. …”
    Get full text
    Article
  17. 937

    Establishment and performance analysis of RIS-assisted coded relay cooperation system based on LDPC product codes by Shunwai ZHANG, Jin WANG

    Published 2023-11-01
    “…To pursue the ultra-reliable information transmission, the system which combined the reconfigurable intelligent surface (RIS) technology and coded relay cooperation technology was investigated.The RIS-assisted coded relay cooperation system model based on low density parity check (LDPC) product codes was established.Based on LDPC product codes, the information matrix was row-encoded by the source node and column-encoded by the relay node, respectively.An efficient joint iterative decoding algorithm was proposed.The two received signals at the destination were row-decoded and column-decoded iteratively to update the logarithmic likelihood ratios of information bits, and then the decoding decision was made.The closed-form solutions of the outage probability and the channel capacity with finite codelength were theoretically derived.Theoretical analysis and simulation results show that the proposed system obviously outperforms the traditional coded relay cooperation.The more number of RIS elements, the more significant advantage can be obtained.Simulation results also demonstrate that the channel capacity with finite codelength approaches the ideal channel capacity with the codelength of LDPC product codes increasing.…”
    Get full text
    Article
  18. 938

    An Efficient Blind Image Deblurring Using a Smoothing Function by Kittiya Khongkraphan, Aniruth Phonon, Sainuddeen Nuiphom

    Published 2021-01-01
    “…This paper introduces an efficient deblurring image method based on a convolution-based and an iterative concept. Our method does not require specific conditions on images, so it can be widely applied for unspecific generic images. …”
    Get full text
    Article
  19. 939

    Ranking Influential Nodes in Complex Networks with Information Entropy Method by Nan Zhao, Jingjing Bao, Nan Chen

    Published 2020-01-01
    “…Our work combines sigmod function and iteration information to obtain the position index. …”
    Get full text
    Article
  20. 940

    Discrete Approaches to Continuous Boundary Value Problems: Existence and Convergence of Solutions by Douglas R. Anderson, Christopher C. Tisdell

    Published 2016-01-01
    “…Picard iterations) in the absence of Lipschitz conditions. …”
    Get full text
    Article