-
8441
Predicting and synthesizing terahertz spoof surface plasmon polariton devices with a convolutional neural network model
Published 2025-01-01“…Three examples are provided for inversely designing several sensor devices and absorbers in the terahertz band using the proposed CNN and the genetic optimization algorithm.…”
Get full text
Article -
8442
Registration and signal processing in measuring system for monitoring leaks of NPP pipeline fittings
Published 2023-11-01“…The automatic processing is based on an algorithm based on the analysis of the singular spectrum, which provides an increase in sensitivity. …”
Get full text
Article -
8443
A deep neural network for general scattering matrix
Published 2023-04-01“…Moreover, inverse design based on the DNN is made possible by applying the gradient descent algorithm. Finally, we demonstrate an application of the DNN, which is to design scatterers with desired scattering properties under special conditions. …”
Get full text
Article -
8444
Emulating Realistic Bidirectional Spatial Channels for MIMO OTA Testing
Published 2015-01-01“…The simulation results are further supported by measurements in a practical MPAC setup. The proposed algorithm is shown to be a valid method to emulate bidirectional spatial channel models.…”
Get full text
Article -
8445
A Novel Ferroptosis-Related Gene Signature for Prognosis Prediction in Ewing Sarcoma
Published 2022-01-01“…Based on the train cohort, AURKA, RGS4, and RIPK1 were identified as key genes through the univariate Cox regression analysis, the random survival forest algorithm, and the multivariate Cox regression analysis and utilized to establish a prognostic FRG signature. …”
Get full text
Article -
8446
Modeling and 1 : 1 Internal Resonance Analysis of Cable-Stayed Shallow Arches
Published 2020-01-01“…The frequency- and force-response curves are obtained by using the Newton–Raphson method in conjunction with the pseudoarclength path-following algorithm. The cascades of period-doubling bifurcations leading to chaos are obtained by applying numerical simulations. …”
Get full text
Article -
8447
A review of state-of-the-art resolution improvement techniques in SPECT imaging
Published 2025-01-01“…It delves into advancements in detector design and modifications, projection sampling techniques, traditional reconstruction algorithm development and optimization, and the emerging role of deep learning. …”
Get full text
Article -
8448
Visualisation of the numerical solution of partial differential equation systems in three space dimensions and its importance for mathematical models in biology
Published 2006-07-01“…Themathematical extension of models to three spatial dimensions from one or twois often a trivial task, whereas the visualisation of the results is more complicated.The scope of this paper is to apply the established marching cubesvolume rendering technique to the study of solid tumour growth and invasion,and present an adaptation of the algorithm to speed up the surface renderingfrom numerical simulation data. …”
Get full text
Article -
8449
A Review of Numerical Techniques for Frictional Contact Analysis
Published 2025-01-01“…This review paper delves into the future research that prioritizes developing computationally efficient algorithms and parallel computing strategies. Advancements in constitutive modelling are vital for improved accuracy, along with enhanced contact detection algorithms for complex geometries and large deformations. …”
Get full text
Article -
8450
Using Open-Source Components to Process Interferometric TerraSAR-X Spotlight Data
Published 2013-01-01“…The paper focuses on the implementation of this algorithm for high-resolution spotlight InSAR in a public domain tool; hence, it becomes available to a larger research community. …”
Get full text
Article -
8451
A Unified Bayesian Model for Generalized Community Detection in Attribute Networks
Published 2020-01-01“…To optimize the objective function of the model, we use an effective Gibbs sampling algorithm. Experiments on a number of synthetic and real networks show that our model has superior performance compared with some baselines on community detection.…”
Get full text
Article -
8452
A Deep Learning Based Traffic State Estimation Method for Mixed Traffic Flow Environment
Published 2022-01-01“…This article presents a traffic state estimation method based on a deep learning algorithm under a low and dynamic CVs penetration rate environment. …”
Get full text
Article -
8453
C-BERT: A Mongolian reverse dictionary based on fused lexical semantic clustering and BERT
Published 2025-01-01“…Initially, the K-means algorithm was used to cluster preprocessed entries from well-known Mongolian dictionaries into 5000 clusters, forming a comprehensive training set. …”
Get full text
Article -
8454
Kinetics of Austenite Formation in a Medium-Carbon, Low-Alloy Steel with an Initial Martensite Microstructure: Influence of Prior Austenite Grain Size
Published 2025-01-01“…The differences in austenite formation kinetics as a function of prior austenite grain size were quantified and modeled in the framework of diffusion-controlled nucleation and growth theories using the genetic algorithm optimization.…”
Get full text
Article -
8455
MARKETING RESEARCH IN THE FIELD OF PUBLIC ADMINISTRATION
Published 2024-12-01“…The data collection algorithm was summarized and the analysis of the main elements of the marketing research process for the field of public administration was carried out, in particular, the question of qualitative research methods, which can be used when collecting primary information from respondents, was investigated in detail. …”
Get full text
Article -
8456
Machine vision model for drip leakage detection of pipeline.
Published 2025-01-01“…The droplet boundary extraction algorithm is proposed, and the three-dimensional model of the target droplet is established, so the volume calculation problem of the droplet is solved, which provides a way of thinking for drip leakage detection of the pipeline.…”
Get full text
Article -
8457
Back Analysis of Rock Hydraulic Fracturing by Coupling Numerical Model and Computational Intelligent Technology
Published 2017-01-01“…The artificial bee colony algorithm is applied in back analysis to find the optimal in situ stress and elastic parameters. …”
Get full text
Article -
8458
Information Security Risk Management Model for Big Data
Published 2022-01-01“…On the other hand, this research also optimizes and improves the fuzzy mathematical analysis method and proposes a fuzzy comprehensive assessment method as the core algorithm for the risk assessment layer in the model. …”
Get full text
Article -
8459
Importance Analysis of Causative Nodes for Accident Chains of Railway Locomotive Operation Based on STPA-PageRank Method
Published 2025-02-01“…Then, the complex network theory and PageRank algorithm were utilised to calculate the importance of every node in directed-weighted network formed by those accident chains. …”
Get full text
Article -
8460
Cost-efficient behavioral modeling of antennas by means of global sensitivity analysis and dimensionality reduction
Published 2025-01-01“…Our methodology involves a rapid global sensitivity analysis (GSA) algorithm developed to determine a set of parameter space directions that maximize antenna response variability. …”
Get full text
Article