Showing 11,061 - 11,080 results of 12,475 for search '"algorithm"', query time: 0.08s Refine Results
  1. 11061

    Wearable Technologies in Athletic Performance by Tolga Şahin

    Published 2021-05-01
    “…Wearable technology products use different ways such as "Global Positioning System, Local Positioning System, Micro Electromechanical System, Inertial Measurement System" and it should be taken into account that different sensors collect data at different frequencies and process this data with variable algorithms. With the widespread introduction of different commercial products in the last 10 years, using wearable technology can be said to be indispensable helpers for trainers working to improve performance in sports.…”
    Get full text
    Article
  2. 11062

    Combined Kernel-Based BDT-SMO Classification of Hyperspectral Fused Images by Fenghua Huang, Luming Yan

    Published 2014-01-01
    “…To solve the poor generalization and flexibility problems that single kernel SVM classifiers have while classifying combined spectral and spatial features, this paper proposed a solution to improve the classification accuracy and efficiency of hyperspectral fused images: (1) different radial basis kernel functions (RBFs) are employed for spectral and textural features, and a new combined radial basis kernel function (CRBF) is proposed by combining them in a weighted manner; (2) the binary decision tree-based multiclass SMO (BDT-SMO) is used in the classification of hyperspectral fused images; (3) experiments are carried out, where the single radial basis function- (SRBF-) based BDT-SMO classifier and the CRBF-based BDT-SMO classifier are used, respectively, to classify the land usages of hyperspectral fused images, and genetic algorithms (GA) are used to optimize the kernel parameters of the classifiers. …”
    Get full text
    Article
  3. 11063

    Approximation properties relative to continuous scale space for hybrid discretisations of Gaussian derivative operators by Tony Lindeberg

    Published 2025-01-01
    “…The presented results are intended as a guide, when designing as well as interpreting the experimental results of scale-space algorithms that operate at very fine scale levels.…”
    Get full text
    Article
  4. 11064

    Ultra-low-power media access control protocol based on clock drift characteristics in wireless sensor networks by Wooguil Pak

    Published 2017-07-01
    “…To track the reception node’s wakeup time for synchronization, WideMAC uses two estimation algorithms that estimate the wakeup time and the upper bound of the total timing error. …”
    Get full text
    Article
  5. 11065

    Improvement of Image Compression by Changing the Mathematical Equation Style in Communication Systems by Riyadh M. Al-Saleem, Yasameen A. Ghani, Shihab A. Shawkat

    Published 2022-01-01
    “…In this paper, it is demonstrated that there is a quality improvement by applying anisotropic interpolation to edge enhancement for its ability to satisfy the dispersed data of the propagation process, which leads to faster compression due to concern for optimum quality rather than fast algorithms. The test images for these patterns showed a discrepancy in the image resolution when the compression coefficient was increased, as the results using three types of image compression methods proved a clear superiority when using “partial differential equations (PDE)”.…”
    Get full text
    Article
  6. 11066

    Deepfake Dilemmas: Imagine Tomorrow’s Surveillance Society through Three Scenarios by Fatma Doğan Akkaya

    Published 2024-12-01
    “…Moving beyond technical considerations, the research employs social prediction methods to explore three potential future scenarios involving deepfake avatars: seamless integration that facilitates self-expression but complicates digital identity control; pervasive algorithmic surveillance that exacerbates social control and privacy issues; and the concept of ghost avatars, that is, digital representations that function as commodities or tools of resistance. …”
    Get full text
    Article
  7. 11067

    From pixels to prognosis: radiomics and AI in Alzheimer’s disease management by Danting Peng, Weiju Huang, Ren Liu, Wenlong Zhong

    Published 2025-01-01
    “…Recent advancements in radiomics and artificial intelligence (AI) offer novel solutions by integrating quantitative imaging features and machine learning algorithms to enhance diagnostic and prognostic precision. …”
    Get full text
    Article
  8. 11068

    The Principle of Mathematical Induction: Applications in Physical Optics by Joseph Ivin Thomas

    Published 2022-01-01
    “…In theoretical computer science, it bears the pivotal role of developing the appropriate cognitive skills necessary for the effective design and implementation of algorithms, assessing for both their correctness and complexity. …”
    Get full text
    Article
  9. 11069

    Non-unitarity maximizing unraveling of open quantum dynamics by Ruben Daraban, Fabrizio Salas-Ramírez, Johannes Schachenmayer

    Published 2025-02-01
    “…Compared to other adaptive entanglement lowering algorithms, NUMU is computationally inexpensive. We demonstrate its utility in large-scale simulations with random quantum circuits. …”
    Get full text
    Article
  10. 11070

    Fault Detection Filter Design of Polytopic Uncertain Continuous-Time Singular Markovian Jump Systems with Time-Varying Delays by Yunling Shi, Xiuyan Peng

    Published 2020-01-01
    “…Finally, a DC motor and an illustrative simulation example are given to verify the feasibility and effectiveness of the proposed algorithms.…”
    Get full text
    Article
  11. 11071

    Novel MCDM Methods and Similarity Measures for Extended Fuzzy Parameterized Possibility Fuzzy Soft Information with Their Applications by Ghous Ali

    Published 2023-01-01
    “…Two logical operations namely “AND” and “OR” operations followed by two corresponding MCDM algorithms have been developed and implemented. Furthermore, similarity measures between fuzzy parameterized possibility fuzzy bipolar soft sets are proposed and applied to an agricultural land selection scenario. …”
    Get full text
    Article
  12. 11072

    Exploring A Better Way to Constraint Propagation Using Naked Pair by Chen Kaiqi

    Published 2025-01-01
    “…Sudoku is an NP-complete problem therefore developing various efficient algorithms is crucial. This paper presents an enhanced approach to solving sudoku puzzles by improving on recursive backtracking with constraint propagation and bitmask, focusing on the implementation of the naked pair technique. …”
    Get full text
    Article
  13. 11073

    EAP-Swift: An Efficient Authentication and Key Generation Mechanism for Resource Constrained WSNs by Daniel Granlund, Christer Åhlund, Patrik Holmlund

    Published 2015-04-01
    “…By utilizing lightweight hashing algorithms, the challenge-response authentication mechanism uses only two round trips to the AAA server for the complete authentication procedure leading to the reduction of latency by 33% compared to the baseline protocols. …”
    Get full text
    Article
  14. 11074

    Problems of bias and discrimination of human capital in artificial intelligence systems by E. V. Kashtanova, A. S. Lobacheva

    Published 2024-05-01
    “…The main purpose of writing this work is to study the question of how the use of AI and algorithmic solutions aggravates the problem of bias and discrimination of human capital which is inevitably associated with the emergence of AI. …”
    Get full text
    Article
  15. 11075

    Optimization and Planning of Emergency Evacuation Routes Considering Traffic Control by Guo Li, Lijun Zhang, Zhaohua Wang

    Published 2014-01-01
    “…This paper establishes two different emergency evacuation models on the basis of the maximum flow model (MFM) and the minimum-cost maximum flow model (MC-MFM), and proposes corresponding algorithms for the evacuation from one source node to one designated destination (one-to-one evacuation). …”
    Get full text
    Article
  16. 11076

    Detection of Surface Crack in Building Structures Using Image Processing Technique with an Improved Otsu Method for Image Thresholding by Nhat-Duc Hoang

    Published 2018-01-01
    “…Experimental results point out that the integration of M2GLD and the Otsu method, followed by other shape analysis algorithms, can successfully detect crack defects in digital images. …”
    Get full text
    Article
  17. 11077

    MODEL IDENTIFICATION AND LEVEL CONTROL OF COUPLED TANKS SYSTEM by OKUBANJO AYODEJI, OKANDEJI ALEXANDER, ALAO PETER, OLALUWOYE OLAWALE, ONAIFO FRANK, MUFUTAU OLAYEMI

    Published 2020-07-01
    “…In this paper, we examine the performance evaluation of two control algorithms, proportional derivative controller (PD) and proportional-integral-derivative controller (PID). …”
    Get full text
    Article
  18. 11078

    Two ways to one goal: new strategy of antiviral therapy for chronic hepatitis C by S. N. Batskikh

    Published 2012-11-01
    “…To analyze data of the clinical studies on chronic hepatitis C (CHC) treatment with application of new modes of combined therapy, including selective inhibitor of viral protease.Key points. New algorithms of antiviral therapy for patients infected by the 1-st virus genotype not treated earlier, and after treatment failure, implicate presence or absence of so-called «induction phase», the kernel of which is application of pegilated interferon-α and ribavirin combination at the beginning of treatment with subsequent addition of the third agent (the direct action antiviral agent). …”
    Get full text
    Article
  19. 11079

    Neutrino Emission from Magnetized Microquasar Jets by Theodoros Smponias, Odysseas Kosmas

    Published 2017-01-01
    “…We adopt a semianalytical approximation for the description of the secondary particles produced from p-p collisions and develop appropriate algorithms using the aforementioned injected protons as input. …”
    Get full text
    Article
  20. 11080

    A Hybrid Search Model for Constrained Optimization by Xiaoli Gao, Yangfei Yuan, Jie Li, Weifeng Gao

    Published 2022-01-01
    “…Different from decomposition-based multiobjective optimization algorithms in which each subproblem is optimized by using the information of its neighboring subproblems, the neighbors of each subproblem are deFined based on corresponding direction vector only in the method. …”
    Get full text
    Article