Showing 8,361 - 8,380 results of 12,475 for search '"algorithm"', query time: 0.09s Refine Results
  1. 8361

    Automatic Player Face Detection and Recognition for Players in Cricket Games by Mahmood Ul Haq, Muhammad Athar Javed Sethi, Sadique Ahmad, Mohammed A. ELAffendi, Muhammad Asim

    Published 2024-01-01
    “…The system utilizes the AdaBoost algorithm for player and player face detection, employing a PAL based face recognition model to recognize the faces of players on the field. …”
    Get full text
    Article
  2. 8362

    Control of Magnetic Manipulator Using Reinforcement Learning Based on Incrementally Adapted Local Linear Models by Martin Brablc, Jan Žegklitz, Robert Grepl, Robert Babuška

    Published 2021-01-01
    “…We have introduced modifications to the RFWR algorithm to better suit the low-dimensional continuous-time systems we are mostly dealing with. …”
    Get full text
    Article
  3. 8363

    Reentry Capsule Reachable Tube Boundary Prediction via Evolutionary Multiobjective Optimization by Wen Zou, Zhanxin Cui, Genghui Li, Zhiwei Feng, Zhenkun Wang, Qingyu Gao, Qingbin Zhang, Tao Yang

    Published 2024-01-01
    “…Ultimately, the multiobjective evolutionary algorithm based on decomposition was employed to solve the multiobjective optimization model, and the geometric boundary of the tube corresponds to the Pareto front of the multiobjective optimization. …”
    Get full text
    Article
  4. 8364

    Creating a model of threats to Ukraine’s national critical infrastructure as a basis for ensuring its security and resilience by D. S. Melnyk

    Published 2024-03-01
    “…The formation of a basic threat model for critical infrastructure facilities, which should include related models of the facility, situation and intruder, is currently an important element of the algorithm for solving this problem. The basic model of threats to critical infrastructure is the framework on which the state determines who and what it needs to protect itself from at the national level. …”
    Get full text
    Article
  5. 8365

    Efficiency and Reliability Analysis of Self-Adaptive Two-Stage Fuzzy Control System in Complex Traffic Environment by Mingzhi Wang, Xianyu Wu, He Tian, Jie Lin, Meimei He, Liuqing Ding

    Published 2022-01-01
    “…Aiming at the problems of the parameters of membership functions empirical settings and insufficient response to the real-time fluctuation in traffic flow, the controller introduces an improved hybrid genetic algorithm to solve it and enable the controller to self-learn. …”
    Get full text
    Article
  6. 8366

    Identifying urban, transportation, and socioeconomic characteristics across US zip codes affecting CO2 emissions: A decision tree analysis by Maged Zagow, Marwa Elbany, Ahmed Mahmoud Darwish

    Published 2025-06-01
    “…The dataset was carefully prepared to ensure accuracy and relevance, considering temporal, geographical, and socioeconomic heterogeneity. The Decision Tree algorithm was applied iteratively to evaluate variable interactions and identify critical thresholds that influence carbon emissions. …”
    Get full text
    Article
  7. 8367

    Log-Based Analysis of Creativity in the Context of Computational Thinking by Rotem Israel-Fishelson, Arnon Hershkovitz

    Published 2024-12-01
    “…We developed a Python algorithm to automatically analyze the logged solutions across four creativity measures. …”
    Get full text
    Article
  8. 8368

    Blinding HT: Hiding Hardware Trojan signals traced across multiple sequential levels by Ying Zhang, Minghui Ge, Xin Chen, Jiaqi Yao, Zhiming Mao

    Published 2022-01-01
    “…As shown in the experimental results, the proposed HTs are hardly detected even by the novel HT detection approach based on machine learning algorithm. These HTs have small footprints on the design in terms of area and power to resist the side‐channel effect analysis. …”
    Get full text
    Article
  9. 8369

    Haptic Manipulation of Deformable Objects in Hybrid Bilateral Teleoperation System by Juan Manuel Ibarra-Zannatha, Claudia Marmolejo-Rivas, Manuel Ferre-Pérez, Rafael Aracil-Santonja, Salvador Cobos-Guzmán

    Published 2007-01-01
    “…The virtual environment of this hybrid bilateral teleoperation system combines collision detection algorithms, dynamical, kinematical and geometrical models with a position–position and/or force–position bilateral control algorithm, to produce on the operator side the reflected forces corresponding to the virtual mechanical interactions, through a haptic device. …”
    Get full text
    Article
  10. 8370

    Adaptive Model Predictive Vibration Control of a Cantilever Beam with Real-Time Parameter Estimation by Gergely Takács, Tomáš Polóni, Boris Rohal’-Ilkiv

    Published 2014-01-01
    “…The model predictive control algorithm generates state predictions and dual-mode quadratic cost prediction matrices based on the updated discrete state-space models. …”
    Get full text
    Article
  11. 8371

    Multiple programmed cell death patterns predict the prognosis and drug sensitivity in gastric cancer by Qiying Song, Shihe Liu, Di Wu, Aizhen Cai

    Published 2025-02-01
    “…Immune cell infiltration, immune checkpoint expression, Tumor Immune Dysfunction and Exclusion (TIDE) algorithm and drug sensitivity analysis were used to explore immunotherapy response. …”
    Get full text
    Article
  12. 8372

    EPPTA: Efficient partially observable reinforcement learning agent for penetration testing applications by Zegang Li, Qian Zhang, Guangwen Yang

    Published 2025-01-01
    “…Furthermore, by integrating the algorithm with the high‐performance RL framework, sample factory, EPPTA significantly reduces convergence time compared to existing pen‐testing methods, resulting in an approximately 20‐fold acceleration. …”
    Get full text
    Article
  13. 8373

    Deadlock Prevention Policy with Behavioral Optimality or Suboptimality Achieved by the Redundancy Identification of Constraints and the Rearrangement of Monitors by Liang Hong, YiFan Hou, JunFeng Jing, AnRong Wang, Dmitry A. Litvin

    Published 2015-01-01
    “…For the possible existence of new siphons generated after the first phase, we add monitors with their output arcs first pointed to source transitions at the second phase to avoid new siphons generating and then rearrange the output arcs step by step on condition that liveness is preserved. In addition, an algorithm is proposed to remove the redundant constraints of the MIP problem in this paper. …”
    Get full text
    Article
  14. 8374

    Multi-objective optimization of the heating oil circuit inside the calendering roller for the lithium battery pole piece by Shuangqiu Sun, Junqiang Wang, Rongying Zhang, Zhenchao Si, Zhijie Yang

    Published 2025-01-01
    “…Then, the improved NSGA-II algorithm is selected to execute the optimization loop. …”
    Get full text
    Article
  15. 8375

    Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited by Huiwen Jia, Yupu Hu, Chunming Tang

    Published 2022-01-01
    “…Due to the fact that the signature size and the concrete security are closely related to the Gaussian parameter of the sampling algorithm, this technique provides a tradeoff between them. …”
    Get full text
    Article
  16. 8376

    Numerical characterization of hemodynamics conditions near aortic valve after implantation of left ventricular assist device by Annalisa Quaini, Sunčica Čanić, David Paniagua

    Published 2011-05-01
    “…The use of LVADs has been associated with thrombus formation next to the aortic valve and close to the anastomosis region,especially in patients in which the native cardiac function isnegligible and the aortic valve remains closed.Stagnation points and recirculation zones have been implicated as the main fluid dynamics factors contributing to thrombus formation.The purpose of the present study was to develop and use computer simulations based on afluid-structure interaction (FSI) solver to study flow conditions corresponding to different strategies inLVAD ascending aortic anastomosis providing a scenario with the lowest likelihood of thrombus formation.A novel FSI algorithm was developed to dealwith the presence of multiple structures corresponding to different elastic properties ofthe native aorta and of the LVAD cannula.A sensitivity analysis of different variables was performed to assess their impact of flow conditionspotentially leading to thrombus formation.It was found that the location of the anastomosis closest to the aortic valve(within 4 cm away from the valve)and at the angle of 30$^\circ$ minimizes the likelihood of thrombus formation.Furthermore, it was shownthat the rigidity of the dacron anastomosis cannula plays almost no role in generating pathologicalconditions downstream from the anastomosis.Additionally, the flow analysis presented in this manuscriptindicates that compliance of the cardiovascular tissue acts as a natural inhibitor of pathological flow conditions conducive to thrombus formationand should not be neglected in computer simulations.…”
    Get full text
    Article
  17. 8377

    Improved Support Vector Machine and Image Processing Enabled Methodology for Detection and Classification of Grape Leaf Disease by Arshiya S. Ansari, Malik Jawarneh, Mahyudin Ritonga, Pragti Jamwal, Mohammad Sajid Mohammadi, Ravi Kishore Veluri, Virendra Kumar, Mohd Asif Shah

    Published 2022-01-01
    “…Image denoising is conducted using the mean function, image enhancement is performed using the CLAHE method, pictures are segmented using the fuzzy C Means algorithm, features are retrieved using PCA, and images are eventually classed using the PSO SVM, BPNN, and random forest algorithms. …”
    Get full text
    Article
  18. 8378

    Targeted Advertising in Social Media Platforms Using Hybrid Convolutional Learning Method besides Efficient Feature Weights by Seyed Mohsen Ebadi Jokandan, Peyman Bayat, Mehdi Farrokhbakht Foumani

    Published 2022-01-01
    “…Using accuracy, recall, F-measure, and precision metrics, we compared our algorithm to standard techniques such as SVM, Logistic regression, Naïve Bayes, and CNN. …”
    Get full text
    Article
  19. 8379

    Randomized and Efficient Time Synchronization in Dynamic Wireless Sensor Networks: A Gossip-Consensus-Based Approach by Nan Xiong, Minrui Fei, Taicheng Yang, Yu-Chu Tian

    Published 2018-01-01
    “…This paper proposes novel randomized gossip-consensus-based sync (RGCS) algorithms to realize efficient time calibration in dynamic wireless sensor networks (WSNs). …”
    Get full text
    Article
  20. 8380

    A Parameter Estimation Method for Nonlinear Systems Based on Improved Boundary Chicken Swarm Optimization by Shaolong Chen, Renyu Yang, Renhuan Yang, Liu Yang, Xiuzeng Yang, Chuangbiao Xu, Baoguo Xu, Huatao Zhang, Yaosheng Lu, Weiping Liu

    Published 2016-01-01
    “…As a novel swarm intelligence algorithm, chicken swarm optimization (CSO) has attracted much attention owing to its good global convergence and robustness. …”
    Get full text
    Article