Showing 1,741 - 1,760 results of 3,044 for search '"ITER"', query time: 0.07s Refine Results
  1. 1741

    A Fault Diagnosis Method for Planetary Gearboxes Based on IFMD by Fengfeng Bie, Xueping Ding, Qianqian Li, Yuting Zhang, Xinyue Huang

    Published 2024-01-01
    “…Subsequently, a convolutional neural network integrated with the support vector machine model (CNN-SVM) is established, leveraging the convolutional neural network for feature extraction. Ultimately, SVM iteratively optimized by the particle swarm optimization (PSO) algorithm, serves as the classification technique. …”
    Get full text
    Article
  2. 1742

    Improved Motion Correction in Dynamic Contrast-Enhanced MRI Using Low Rank With Soft Weighting by Jichang Zhang, Faisal Najeeb, Yulin Wang, Xinpei Wang, Pengfei Xu, Hammad Omer, Jianjun Zheng, Jingfeng Zhang, Sue Francis, Paul Glover, Richard Bowtell, Thomas Meersmann, Chengbo Wang

    Published 2025-01-01
    “…We designed a soft weighting matrix that smoothly transitions spokes between the target and other motion states to suppress motion blurring. The optimized fast iterative shrinkage-thresholding algorithm (FISTA) was employed to solve the L+S optimization problem, enabling faster convergence and better image quality. …”
    Get full text
    Article
  3. 1743

    Optimal Topology Configuration Design of Contoured-Beam Mesh Reflectors by Guigeng Yang, Aofei Tang, Yiqun Zhang, Zhenyi Yuan, Lingfei Kong

    Published 2022-01-01
    “…Then, based on the multifrequency optimization model, an iterative design technology is proposed to obtain the optimal topology configuration of the mesh-shaped reflector. …”
    Get full text
    Article
  4. 1744

    Coexistence of a cross-diffusive West Nile virus model in a heterogenous environment by Abdelrazig K. Tarboush, Jing Ge, Zhigui Lin

    Published 2018-11-01
    “…The true positive solutions are obtained by monotone iterative schemes. Our results show that a cross-diffusive WNv model possesses at least one coexistence solution if the basic reproduction number is greater than one and the cross-diffusion rates are small enough, while if the basic reproduction number is less than or equal to one, the model has no positive solution. …”
    Get full text
    Article
  5. 1745

    RESEARCH ON COMPRESSION AND RECONSTRUCTION OF TUBE FOULING ULTRASONIC TESTING SIGNAL BASED ON IMPROVED COSAMP by WANG TongTong, SUN LingFang

    Published 2020-01-01
    “…In ultrasonic tests,the redundant signal and random noise are easily to be generated when the sensor collects data.Compressing and reconstructing the signal or noise always get the researchers’ attention.Based on the theory of compressive sensing and ultrasonic testing method,an improved CoSaMP for tube fouling ultrasonic testing compression and reconstruction was proposed:The K-SVD algorithm was used to sparsely represent the ultrasonic testing signal.The relationship between the peak signal to noise ratio and the number of iterations was derived to determine the sparse degree adaptively.Finally,the sparsity differences of the echo signal and random noise in the transform domain was used to pick up effective information.The results showed that the improved CoSaMP algorithm can accurately locate signal sparsity.The reconstructed signal reflects that the characteristics of the original signal and the operation time are shorter.That proves the feasibility of the improved CoSaMP algorithm.…”
    Get full text
    Article
  6. 1746

    Using the PubAnnotation ecosystem to perform agile text mining on : a tutorial review by Hee-Jo Nam, Ryota Yamada, Hyun-Seok Park

    Published 2020-06-01
    “…Thus, this review aims to provide a tutorial overview of practicing the iterative task of named entity recognition with the PubAnnotation/PubDictionaries/TextAE ecosystem. …”
    Get full text
    Article
  7. 1747

    Privacy-preserving ADP for secure tracking control of AVRs against unreliable communication by Kun Zhang, Kezhen Han, Zhijian Hu, Guoqiang Tan

    Published 2025-01-01
    “…To mitigate information leakage and unauthorized access in vehicular network systems, an encrypted guaranteed-cost policy iteration algorithm is developed, incorporating encryption and decryption schemes between the vehicle and the cloud based on the tracking dynamics. …”
    Get full text
    Article
  8. 1748

    Adapting a consensus process for survivors of domestic abuse and child maltreatment: a brief report about adopting a trauma-informed approach in multistakeholder workshops by Ruth Gilbert, Gene Feder, Eszter Szilassy, Katherine Cowan, Emma Howarth, Karen Johns, Alison Gregory, Ursula Lindenberg, Claire Powell

    Published 2025-01-01
    “…There is, however, limited advice about how to safely involve survivors of violence and abuse in consensus-based studies.Methods/results This commentary provides an overview of the adaptations made to a process of core outcome set development, to ensure that survivors of violence and abuse felt safe, heard and supported, and able to contribute in a meaningful way.Conclusions We advocate for an iterative process of listening to and learning from survivors, as well as buy-in from funders to ensure research studies are appropriately resourced and involve sufficient planning time.…”
    Get full text
    Article
  9. 1749

    Basis expansion model-based improved regularized orthogonal matching pursuit channel estimation for V2X fast time-varying SC-FDMA by Yong LIAO, Zhirong CAI

    Published 2021-04-01
    “…In order to further improve the vehicle-to-everything (V2X) communication performance of the Internet of vehicles, a basis expansion model (BEM) was adopted and suitable for high-speed mobile scenarios to transform the channel estimation into a sparse signal reconstruction.Furthermore, it was proved that the BEM coefficients were sparse, and an improved regularized orthogonal matching pursuit (iROMP) channel estimation algorithm based on BEM (BEM-iROMP) was proposed.BEM coefficients were acquired by the iROMP, and finally the feedback results were iterated to achieve the optimal channel estimation.Simulation results show that in comparison with the least square (LS), linear minimum mean squared error (LMMSE), and BEM-LS channel estimation algorithms, the proposed algorithm can effectively improve the normalized mean square error (NMSE) and bit error rate (BER) performance.…”
    Get full text
    Article
  10. 1750

    Rapid Focused Spot Scanning Imaging Using Multimode Fiber with a Convolutional Neural Network-Based Phase Modulation by Rongjing Tong, Anni Xu, Hua Shen

    Published 2025-01-01
    “…This approach efficiently focuses light fields by training neural networks to approximate the transmission matrix of the optical system, eliminating the need for iterative calculations. Experimental results indicate that this method can generate focused spots within 200 ms, representing a significant improvement over traditional methods. …”
    Get full text
    Article
  11. 1751

    Global stability of a network-based SIS epidemic model with a general nonlinear incidence rate by Shouying Huang, Jifa Jiang

    Published 2016-04-01
    “…Furthermore, by applying an iteration scheme and the theory of cooperative system respectively, we obtain sufficient conditions under which the endemic equilibrium is globally asymptotically stable. …”
    Get full text
    Article
  12. 1752

    Convergence to Common Fixed Point for Generalized Asymptotically Nonexpansive Semigroup in Banach Spaces by Yali Li, Jianjun Liu, Lei Deng

    Published 2008-01-01
    “…We prove that the following implicit and modified implicit viscosity iterative schemes {xn} defined by xn=αnf(xn)+(1−αn)T(tn)xn and xn=αnyn+(1−αn)T(tn)xn, yn=βnf(xn−1)+(1−βn)xn−1 strongly converge to p∈F as n→∞ and p is the unique solution to the following variational inequality: 〈f(p)−p,j(y−p)〉≤0 for all y∈F.…”
    Get full text
    Article
  13. 1753

    Caching strategy based on transmission delay for D2D cooperative edge caching system by Yan CAI, Fan WU, Hongbo ZHU

    Published 2021-03-01
    “…To meet the requirements of 5G system with low delay and high reliability, for a single-caching D2D cooperative edge caching system, an optimization of the caching strategy based on transmission delay was proposed.The dynamic distributions of requesting users and idle users were modeled as the independent homogeneous poisson point process (HPPP) utilizing the stochastic geometry theory.Comprehensively considering the content popularity, user location information, device transmission power and interference, the relationship between the average transmission delay of user and the cache probability distribution was derived.Taking the average transmission delay as the objective function, the optimization problem was established, and a low complexity iterative algorithm was proposed to obtain the cache strategy with sub-optimal average transmission delay.Simulation results demonstrate that the proposed optimization cache strategy is superior to several common cache strategies in terms of transmission delay.…”
    Get full text
    Article
  14. 1754

    DeepEye: Link Prediction in Dynamic Networks Based on Non-negative Matrix Factorization by Nahla Mohamed Ahmed, Ling Chen, Yulong Wang, Bin Li, Yun Li, Wei Liu

    Published 2018-03-01
    “…The method learns latent features from the temporal and topological structure of a dynamic network and can obtain higher prediction results. We present novel iterative rules to construct matrix factors that carry important network features and prove the convergence and correctness of these algorithms. …”
    Get full text
    Article
  15. 1755

    Real-Time and Quantitative Measurement of Crack-Tip Stress Intensity Factors Using Digital Holographic Interferometry by Haiting Xia, Rongxin Guo, Feng Yan, Heming Cheng

    Published 2018-01-01
    “…To enhance the accuracy of measurement, calibrated phase unwrapping based on least-squares and iteration and median filtering is applied to retrieve the actual phase from the noisy wrapped one. …”
    Get full text
    Article
  16. 1756

    Precommitted Investment Strategy versus Time-Consistent Investment Strategy for a Dual Risk Model by Lidong Zhang, Ximin Rong, Ziping Du

    Published 2014-01-01
    “…Short-selling and borrowing money are allowed. Due to lack of iterated-expectation property, the Bellman Optimization Principle does not hold. …”
    Get full text
    Article
  17. 1757

    Pengembangan Permainan Edukasi Berbasis Augmented Reality untuk Pembelajaran Senyawa Hidrokarbon bagi Siswa Sekolah Menengan Atas (SMA) by Carlista Naba, Muhammad Aminul Akbar, Ahmad Afif Supianto

    Published 2022-06-01
    “…Penelitian akan dilakukan dengan menggunakan metode Iterative and Rapid Prototyping, serta hasil dari penelitian akan diuji secara fungsional menggunakan Black Box Testing dan diujikan kepada responden dengan modul Game Experience Questionnaire (GEQ). …”
    Get full text
    Article
  18. 1758

    Application of MRI image segmentation algorithm for brain tumors based on improved YOLO by Tao Yang, Xueqi Lu, Lanlan Yang, Miyang Yang, Jinghui Chen, Hongjia Zhao

    Published 2025-01-01
    “…The training and validation sets were input into the original YOLOv5s model, five optimized models, and the YOLOv8s model for 100 rounds of iterative training. The best weight file of the model with the best evaluation index in the six trained models was used for the final test of the test set.ResultsAfter iterative training, the seven models can segment and recognize brain tumor magnetic resonance images. …”
    Get full text
    Article
  19. 1759
  20. 1760

    A Modified Groundwater Flow Model Using the Space Time Riemann-Liouville Fractional Derivatives Approximation by Abdon Atangana, S. C. Oukouomi Noutchie

    Published 2014-01-01
    “…The modified equation is solved via the technique of green function and the variational iteration method.…”
    Get full text
    Article