-
4261
The Stochastic Resonance Phenomenon of Different Noises in Underdamped Bistable System
Published 2021-01-01“…Then, the factors of influence to the SR are investigated by the Euler-Maruyama algorithm, Milstein algorithm, and fourth-order Runge-Kutta algorithm, respectively. …”
Get full text
Article -
4262
An Adaptive Image Inpainting Method Based on Continued Fractions Interpolation
Published 2018-01-01“…In view of the drawback of most image inpainting algorithms by which texture was not prominent, an adaptive inpainting algorithm based on continued fractions was proposed in this paper. …”
Get full text
Article -
4263
Automatic Capture Processing Method of Basketball Shooting Trajectory Based on Background Elimination Technology
Published 2022-01-01“…The traditional automatic basketball shooting trajectory capture algorithm has a low capture accuracy and a long capture time, and thus is incapable of displaying the shooting trajectory in real time. …”
Get full text
Article -
4264
Mobile Localization Based on Received Signal Strength and Pearson's Correlation Coefficient
Published 2015-08-01“…Without any additional device or prior statistical knowledge, the proposed algorithm is implementable on common mobile devices. …”
Get full text
Article -
4265
Numerical Simulation of Underwater Shock Wave Propagation in the Vicinity of Rigid Wall Based on Ghost Fluid Method
Published 2015-01-01“…The theoretical analysis on the GFM-based algorithm and relevant numerical tests demonstrate that the GFM-based algorithm is first-order accurate as applied to complex rigid wall. …”
Get full text
Article -
4266
Knee Point Search Using Cascading Top-k Sorting with Minimized Time Complexity
Published 2013-01-01“…First, a top-k sort algorithm is proposed based on a quicksort variation. …”
Get full text
Article -
4267
Application of Modified NSGA-II to the Transit Network Design Problem
Published 2020-01-01“…A novel initial route set generation algorithm and a route set size alternating heuristic are embedded into a nondominated sorting genetic algorithm-II- (NSGA-II-) based solution framework to produce the approximate Pareto front. …”
Get full text
Article -
4268
Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map
Published 2022-05-01“…To achieve the goal, the Coron and Notarnicola (Asiacrypt’19) algorithm is applied. However, because of parameter issues, the algorithm cannot be used directly. …”
Get full text
Article -
4269
MARKETING STRATEGY OF THE UNIVERSITY: FORMATION AND ITS EFFECTIVENESS EVALUATION REALIZATION
Published 2015-03-01“…The study is aimed at developing an algorithm of formation of university’s marketing strategy and the development of evaluating methods of its effectiveness realization. …”
Get full text
Article -
4270
Optimization of a Conical Corrugated Antenna Using Multiobjective Heuristics for Radio-Astronomy Applications
Published 2016-01-01“…The antenna optimization has been carried out with multiobjective versions of an evolutionary algorithm (EA) and a particle swarm optimization (PSO) algorithm. …”
Get full text
Article -
4271
Faults Detection for Photovoltaic Field Based on K-Means, Elbow, and Average Silhouette Techniques through the Segmentation of a Thermal Image
Published 2020-01-01“…Examining the literature, many clustering algorithms have been carried out, where the K-means algorithm is considered among the simplest and most used to classify an image into many regions. …”
Get full text
Article -
4272
High-Accuracy Real-Time Fish Detection Based on Self-Build Dataset and RIRD-YOLOv3
Published 2021-01-01“…To overcome the inaccuracy of the You Only Look Once v3 (YOLOv3) algorithm in underwater farming environment, a suitable set of hyperparameters was obtained through multiple sets of experiments. …”
Get full text
Article -
4273
Research on Wind Load Calculation Based on Identical Guarantee Rate Method
Published 2021-01-01“…The validity and accuracy of the proposed model and algorithm are verified by the comparative analysis and theoretical analysis of the calculation results.…”
Get full text
Article -
4274
Data Preprocessing Method and Fault Diagnosis Based on Evaluation Function of Information Contribution Degree
Published 2018-01-01“…Neural network is a data-driven algorithm; the process established by the network model requires a large amount of training data, resulting in a significant amount of time spent in parameter training of the model. …”
Get full text
Article -
4275
A Probabilistic Damage Identification Approach for Structures under Unknown Excitation and with Measurement Uncertainties
Published 2013-01-01“…Recently, an innovative algorithm has been proposed by the authors for the identification of structural damage under unknown external excitations. …”
Get full text
Article -
4276
Scalable Video Streaming Based on JPEG2000 Transcoding with Adaptive Rate Control
Published 2007-01-01“…To cope with varying network conditions, we also present a rate control algorithm that adaptively transcodes stored JPEG2000 frames. …”
Get full text
Article -
4277
Electricity Usage Scheduling in Smart Building Environments Using Smart Devices
Published 2013-01-01“…This paper presents a new electricity usage scheduling algorithm for smart buildings that adopts real-time pricing of electricity. …”
Get full text
Article -
4278
Optimal Design of Cordon Sanitaire for Regular Epidemic Control
Published 2021-01-01“…Note that stochastic queueing theory is used to represent the waiting phenomenon at each entry link. A heuristic algorithm is designed to solve the proposed bilevel model where the method of successive averages (MSA) is adopted for the lower-level model, and the genetic algorithm (GA) is adopted for the upper-level model. …”
Get full text
Article -
4279
Simultaneous perturbation stochastic approximation–based radio occultation data assimilation for sensing atmospheric parameters
Published 2018-12-01“…The algorithm can converge to the optimal or approximately optimal solution quickly. …”
Get full text
Article -
4280
Ranking the Return on Assets of Tehran Stock Exchange by a New Method Based on Z-Numbers Data
Published 2023-01-01“…Then, by using the proposed algorithm, we introduce the most important and the least important factors for tourist security budgeting.…”
Get full text
Article