Showing 4,521 - 4,540 results of 12,475 for search '"algorithm"', query time: 0.07s Refine Results
  1. 4521

    Optimization of the Operation Plan of Airport Express Train with Consideration of Train Departure Time Window by Jin He, Yinzhen Li, Yuhong Chao, Ruhu Gao

    Published 2024-01-01
    “…Neighborhood solution strategies include the increase or haut of train operations and the adjustment of the number of stops, which refines the solution space and boosts the process efficiency of the heuristic algorithm. Additionally, the model and algorithm proposed in this paper are practiced during the peak hour of Nanjing Metro Line S1 for empirical validation. …”
    Get full text
    Article
  2. 4522

    Credit Card Fraud Detection through Parenclitic Network Analysis by Massimiliano Zanin, Miguel Romance, Santiago Moral, Regino Criado

    Published 2018-01-01
    “…In this paper we present a first hybrid data mining/complex network classification algorithm, able to detect illegal instances in a real card transaction data set. …”
    Get full text
    Article
  3. 4523

    Analisis Performa Algoritma Decision Tree, Naive Bayes, K-Nearest Neighbor untuk Klasifikasi Zona Daerah Risiko Covid-19 di Indonesia by Ainurohmah Ainurrohmah, Dian Tri Wiyanti

    Published 2023-02-01
    “…The purpose of this study is to calculate the performance of each algorithm, get the best algorithm, and get the classification pattern from the best algorithm. …”
    Get full text
    Article
  4. 4524

    An Equilibrium Chance-Constrained Multiobjective Programming Model with Birandom Parameters and Its Application to Inventory Problem by Zhimiao Tao, Jiuping Xu

    Published 2013-01-01
    “…We apply the proposed model and algorithm to a real-world inventory problem and show the effectiveness of the model and the solution method.…”
    Get full text
    Article
  5. 4525

    Analysis of the Perfect Table Fuzzy Rainbow Tradeoff by Byoung-Il Kim, Jin Hong

    Published 2014-01-01
    “…Cryptanalytic time memory tradeoff algorithms are tools for inverting one-way functions, and they are used in practice to recover passwords that restrict access to digital documents. …”
    Get full text
    Article
  6. 4526

    Motivation Analysis of Technological Startups Business Models Based on Intelligent Data Mining and Analysis by Xuejiao Ren, Xiaozhou Ding

    Published 2022-01-01
    “…To improve the motivation analysis effect of the technological startups business model, this study combines intelligent data mining technology to analyze related factors and proposes a method of adjusting parameters of machine-learning model based on Bayesian optimization algorithm. Moreover, this study integrates the prior information and sample information of the machine learning algorithm performance function and builds an intelligent analysis model based on the elements of the technological startups business model. …”
    Get full text
    Article
  7. 4527

    Iterative Reproducing Kernel Method for Solving Second-Order Integrodifferential Equations of Fredholm Type by Iryna Komashynska, Mohammed AL-Smadi

    Published 2014-01-01
    “…The reliability and efficiency of the proposed algorithm are demonstrated by some numerical experiments.…”
    Get full text
    Article
  8. 4528

    Analytical Solutions for the Nonlinear Partial Differential Equations Using the Conformable Triple Laplace Transform Decomposition Method by Shailesh A. Bhanotar, Mohammed K. A. Kaabar

    Published 2021-01-01
    “…Important results and theorems concerning this method are discussed. A new algorithm is proposed to solve linear and nonlinear partial differential equations in three dimensions. …”
    Get full text
    Article
  9. 4529

    Optimal Research and Numerical Simulation for Scheduling No-Wait Flow Shop in Steel Production by Huawei Yuan, Yuanwei Jing, Jinping Huang, Tao Ren

    Published 2013-01-01
    “…To further evaluate the performance of the algorithm, a new lower bound with performance guarantee is designed. …”
    Get full text
    Article
  10. 4530

    Registration-Based Morphing of Active Contours for Segmentation of CT Scans by Yuan-Nan Young, Doron Levy

    Published 2004-10-01
    “…We present a new algorithm for segmenting organs in CT scans forradiotherapy treatment planning.Given a contour of an organ that is segmentedin one image, our algorithm proceeds tosegment contours that identify the same organ inthe consecutive images.Our technique combines partial differential equations-based morphing activecontours with algorithms for joint segmentation and registration. …”
    Get full text
    Article
  11. 4531

    A Modified Iterative Approach for Fixed Point Problem in Hadamard Spaces by Asifa Tassaddiq, Wakeel Ahmed, Shahid Zaman, Asma Raza, Usman Islam, Kwara Nantomah

    Published 2024-01-01
    “…The role of iterative algorithms is vital in exploring the diverse domains of science and has proven to be a powerful tool for solving complex computational problems in the most trending branches of computer science. …”
    Get full text
    Article
  12. 4532

    Combination of Culture, Antigen and Toxin Detection, and Cytotoxin Neutralization Assay for Optimal Clostridium difficile Diagnostic Testing by Michelle J Alfa, Shadi Sepehri

    Published 2013-01-01
    “…BACKGROUND: There has been a growing interest in developing an appropriate laboratory diagnostic algorithm for Clostridium difficile, mainly as a result of increases in both the number and severity of cases of C difficile infection in the past decade. …”
    Get full text
    Article
  13. 4533

    Large-Scale Evolutionary Strategy Based on Gradient Approximation by Jin Jin

    Published 2021-01-01
    “…For large-scale optimization, CMA-ES has the disadvantages of high complexity and premature stagnation. An improved CMA-ES algorithm called GI-ES was proposed in this paper. …”
    Get full text
    Article
  14. 4534

    Optimal Fitting Method of Nonlinear Simultaneous Equations Considering Structural Tensor Image Modeling by Shiping Zhu

    Published 2021-01-01
    “…Finally, it can be known through the analysis of the simulation results that the OFMNSE algorithm put forward in this paper can improve the congestion issue of the multimedia network transmission process and reduce the packet loss rate of data during the transmission effectively under the condition of different relative cache sizes compared with the conventional algorithm.…”
    Get full text
    Article
  15. 4535

    Robust Output Feedback Disturbance Rejection Control by Simultaneously Estimating State and Disturbance by Jeang-Lin Chang

    Published 2011-01-01
    “…Moreover, the controller algorithm developed in this paper can effectively avoid the peaking phenomenon. …”
    Get full text
    Article
  16. 4536

    OPTIMIZING THE PLACEMENT OF A WORK-PIECE AT A MULTI-POSITION ROTARY TABLE OF TRANSFER MACHINE WITH VERTICAL MULTI-SPINDLE HEAD by N. N. Guschinski, V. E. Zdanovich, B. M. Rozin

    Published 2016-11-01
    “…To solve this problem the mathematical model and heuristic particle swarm optimization algorithm are proposed. The results of numerical experiments for two real problems of this type are given. …”
    Get full text
    Article
  17. 4537

    Inverse Estimates for Nonhomogeneous Backward Heat Problems by Tao Min, Weimin Fu, Qiang Huang

    Published 2014-01-01
    “…The genetic algorithm for obtaining the regularization parameter is presented. …”
    Get full text
    Article
  18. 4538

    A Distortion-Free Data Hiding Scheme for Triangular Meshes Based on Recursive Subdivision by Yuan-Yu Tsai

    Published 2016-01-01
    “…The experimental results demonstrate the feasibility of our proposed algorithm.…”
    Get full text
    Article
  19. 4539

    Chaotic Hopfield Neural Network Swarm Optimization and Its Application by Yanxia Sun, Zenghui Wang, Barend Jacobus van Wyk

    Published 2013-01-01
    “…A new neural network based optimization algorithm is proposed. The presented model is a discrete-time, continuous-state Hopfield neural network and the states of the model are updated synchronously. …”
    Get full text
    Article
  20. 4540

    Indifferentiable hash functions in the standard model by Juha Partala

    Published 2021-07-01
    “…Abstract Indifferentiability of iterated hash functions is seen as evidence that there are no structural flaws in the iteration structure of the algorithm. However, it is often overlooked that such considerations only hold in the random oracle model and do not give any guarantee in the standard model. …”
    Get full text
    Article