-
6361
Wu’s Characteristic Set Method for SystemVerilog Assertions Verification
Published 2013-01-01“…We define a suitable subset of SVAs so that an efficient polynomial modeling mechanism for both circuit descriptions and assertions can be applied. We present an algorithm framework based on the algebraic representations using characteristic set of polynomial system. …”
Get full text
Article -
6362
Evaluation of the Safety of High-Salt Wastewater Treatment in Coal Chemical Industry Based on the AHP Fuzzy Method
Published 2021-01-01“…An AHR fuzzy mathematics evaluation algorithm is used to compare experimental values with simulated numerical values in brine. …”
Get full text
Article -
6363
Geostatistical Analysis Methods for Estimation of Environmental Data Homogeneity
Published 2018-01-01“…As a result, the greatest environmental stress zones were isolated and correct zoning using geostatistical analysis techniques was proved. Mathematical algorithm computing system was implemented in an object-oriented programming C #. …”
Get full text
Article -
6364
The Split Common Fixed Point Problem for Total Asymptotically Strictly Pseudocontractive Mappings
Published 2012-01-01“…The purpose of this paper is to propose an algorithm for solving the split common fixed point problems for total asymptotically strictly pseudocontractive mappings in infinite-dimensional Hilbert spaces. …”
Get full text
Article -
6365
On the Hermitian R-Conjugate Solution of a System of Matrix Equations
Published 2012-01-01“…The representation of such solution is also derived. Finally, an algorithm and numerical examples are given.…”
Get full text
Article -
6366
Shadow Separation of Pavement Images Based on Morphological Component Analysis
Published 2021-01-01“…A shadow separation algorithm based on morphological component analysis (MCA) is proposed herein to solve the shadow problem of road imaging. …”
Get full text
Article -
6367
INTELLIGENT LIQUID LEVEL CONTROL OF A COUPLED NONLINEAR THREE TANK SYSTEM SUBJECTED TO VARIABLE FLOW PARAMETERS
Published 2021-06-01“…The proposed controllers are designed with the same neural network architecture and algorithm. Comparison of the system with the proposed controllers for tracking a step and random level set points for a fixed and variable flow parameter and some good results have been obtained. …”
Get full text
Article -
6368
Self-Adaptive Predictor-Corrector Approach for General Variational Inequalities Using a Fixed-Point Formulation
Published 2022-01-01“…Convergence analyses of the suggested algorithm are demonstrated. Moreover, numerical analysis shows that we establish the new best method for solving general variational inequality which performs better than the previous one. …”
Get full text
Article -
6369
A Population-Based Optimization Method Using Newton Fractal
Published 2019-01-01“…We propose a deterministic population-based method for a global optimization, a Newton particle optimizer (NPO). The algorithm uses the Newton method with a guiding function and drives particles toward the current best positions. …”
Get full text
Article -
6370
Clinical Practice Guideline for the Care of Elderly Patients Hospitalized with Delirium
Published 2015-06-01“…It highlights the clinical and therapeutic aspects of this complex syndrome. An algorithm that facilitates the management of this condition at Dr. …”
Get full text
Article -
6371
Sparsity-Based Robust Bistatic MIMO Radar Imaging in the Presence of Array Errors
Published 2020-01-01“…The impact of multiplicative array gain-phase errors is changed to be additive through model reformulation, and transmit-receive angle imaging is formulated to a sparse total least square signal problem. Then, an iterative algorithm is proposed to solve the optimization problem. …”
Get full text
Article -
6372
Bus Route Design Problem for Rural Tourism Objectives: A Multiobjective Approach
Published 2022-01-01“…A solution approach is put forward based on the initial solution set generation procedure and strengthens the elitist genetic algorithm. Finally, the bus network in a rural tourism destination of Nanjing is taken as the case study to validate the feasibility and efficiency of the proposed model.…”
Get full text
Article -
6373
A Scalable MAC Protocol Supporting Simple Multimedia Traffic QoS in WSNs
Published 2011-08-01“…And if there are the some link failures in multi-hop transmission, the protocol can recover the links quickly. Using this algorithm, the proposed MAC protocol outperforms the IEEE 802.11e EDCF and the IEEE 802.15.4 MAC protocol in terms of the end-to-end delay and stable transmission of multimedia streaming data.…”
Get full text
Article -
6374
Financial Risk Avoidance Based on the Sensor Network and Edge Computing
Published 2022-01-01“…In order to improve the effect of financial risk aversion, this paper studies the financial risk aversion system combined with the edge computing method of the sensor network and proposes a sensor data anomaly detection algorithm based on the offset distance. Moreover, this paper divides the sensor data into several sliding windows according to the time series, analyzes the offset between the data object and other data in the sliding window by calculating the offset distance, and uses the abnormal level to indicate the possibility of data abnormality. …”
Get full text
Article -
6375
Ecological modelling: A computational analysis of air pollution discourses in English print media of India and Pakistan.
Published 2025-01-01“…The study applied Latent Dirichlet Allocation (LDA), a robust algorithm for analyzing the large text corpus. The study underpinned Computational Grounded Theory, which relies on the fact that computation is a way to reveal the hidden meanings beyond the text. …”
Get full text
Article -
6376
Optimization for Due-Window Assignment Scheduling with Position-Dependent Weights
Published 2020-01-01“…Optimal properties of the problem are given, and then, a polynomial-time algorithm is provided to solve the problem. An extension to the problem is offered by assuming general position-dependent processing time.…”
Get full text
Article -
6377
Selective Extraction of Entangled Textures via Adaptive PDE Transform
Published 2012-01-01“…The present work introduces adaptive PDE transform algorithm to appropriately threshold the statistical variance of the local variation of functional modes. …”
Get full text
Article -
6378
Adaptive Optimal 𝑚-Stage Runge-Kutta Methods for Solving Reaction-Diffusion-Chemotaxis Systems
Published 2011-01-01“…Yet, theorems about stability and convergence of the algorithm are provided in analyzing robustness and efficiency. …”
Get full text
Article -
6379
ANALYSIS OF THE REASONS OF BREAKAGES OF RETAYNER OF THE CAMP OF PQF AND SOLUTION OF PROBLEMS
Published 2015-11-01“…The solution assumes change of algorithm of work in the operating programmable logical Simatic S7–400 controler of the rolling mill PQF. …”
Get full text
Article -
6380
Method for determining of statistical characteristics of evaluated distance obtained from measurements of Doppler frequency offsets
Published 2022-06-01“…Despite the fact that the object guidance loop is closed according to the time difference of arrival information, it is necessary to enter the distance between the object and the center of the navigation system into the algorithm for generating control commands in order to stabilize the frequency response of the control loop and eliminate dynamic errors. …”
Get full text
Article