-
11121
Comparative study on the drying mechanisms and characteristic changes of fabrics according to heat transfer principles
Published 2025-01-01“…The findings of this study are expected to help develop automatic drying algorithms for household dryers.…”
Get full text
Article -
11122
Facial Recognition Databases: Recent Developments and Review of Methods
Published 2023-12-01“…There is a fundamental relationship between the development of facial recognition algorithms and the possibility of the existence of databases of different faces that influence the appearance of the face in a constrained manner. …”
Get full text
Article -
11123
An Improved Stochastic Configuration Networks With Compact Structure and Parameter Adaptation
Published 2025-01-01“…In addition, experimental results using baseline datasets and UCI databases show that the number of nodes required for oscn is reduced by approximately 50% and the computation time is reduced by approximately 40% compared to traditional algorithms.…”
Get full text
Article -
11124
Complexity Analysis of a Mixed Memristive Chaotic Circuit
Published 2018-01-01“…By using spectral entropy (SE) and C0 complexity algorithms, the dynamic characteristics of the system were analyzed. …”
Get full text
Article -
11125
Incremental Bilateral Preference Stable Planning over Event Based Social Networks
Published 2019-01-01“…We conduct extensive experiments to verify the efficiency and effectiveness of the proposed algorithms.…”
Get full text
Article -
11126
Output-Only Modal Analysis Based on Improved Empirical Mode Decomposition Method
Published 2015-01-01“…The modal parameters extracted based on the improved EMD method show good agreement with those extracted by conventional modal identification algorithms.…”
Get full text
Article -
11127
Precision Security: Integrating Video Surveillance with Surrounding Environment Changes
Published 2018-01-01“…Imbedding proposed models into the online algorithms is suggested as a future research priority towards precision security for critical applications and, furthermore, schemes for a practical implementation of such integration are also preliminarily discussed.…”
Get full text
Article -
11128
A Scalable and Privacy-Aware Location-Sensing Model for Ephemeral Social Network Service
Published 2013-03-01“…The model includes the perspectives of the privacy, architecture, deployment, and positioning algorithms, which can meet the four key requirements. …”
Get full text
Article -
11129
H∞ Formation Control and Obstacle Avoidance for Hybrid Multi-Agent Systems
Published 2013-01-01“…Simulation results in this paper show that the proposed formation algorithms can effectively allow the multiagent system to avoid penetration into obstacles while accomplishing prespecified global objective successfully.…”
Get full text
Article -
11130
Evaluation of Sea Ice Motion Estimates from Enhanced Resolution Passive Microwave Brightness Temperatures
Published 2025-01-01“…Satellite imagery can be used to track the motion of sea ice via cross-correlation feature tracking algorithms. Such a method has been used for the National Snow and Ice Data Center (NSIDC) sea ice motion product, based largely on passive microwave imagery. …”
Get full text
Article -
11131
Analysis of Multidimensional Clinical and Physiological Data with Synolitical Graph Neural Networks
Published 2024-12-01“…Convolutional Graph Neural Network architecture is then applied, and the results are compared with established machine learning algorithms. The findings highlight the robustness and interpretability of SGNNs in solving complex, high-dimensional classification problems.…”
Get full text
Article -
11132
Fitness centrality: a non-linear centrality measure for complex networks
Published 2025-01-01“…However, existing EFC algorithms are constrained to bipartite graphs, becoming inapplicable even with minor deviations in the bipartite structure. …”
Get full text
Article -
11133
Optimization of cyber security through the implementation of AI technologies
Published 2025-02-01“…The governance system, therefore, will put a lot of effort into communicating, identifying, and enforcing the principles of security to moderate risk. The Metaheuristic algorithms are stimulated by the human brain, so implementing Artificial Intelligence (AI) that assists the Neural Network to mimic the behaviour of the human brain is important to predict significant outcomes. …”
Get full text
Article -
11134
DC MOTOR ANGULAR POSITION CONTROL SYSTEM USING ARDUINO PLATFORM
Published 2024-09-01“…PID (proportional, integral and derivative) control algorithms are used to generate the PWM output. To implement a PID controller, the tuning parameters of the controller, namely proportional gain, integral gain and derivative gain must be carefully determined. …”
Get full text
Article -
11135
A Modified Strain‐Wedge Model for Small Strain Rigid Piles in Sand
Published 2025-01-01“…ABSTRACT This paper develops a modified strain‐wedge (MSW) model that accounts for the resistance to bending moments caused by the lateral frictional resistance and axial forces of piles in the small‐strain regime in sands and algorithmizes a finite differential analysis program. …”
Get full text
Article -
11136
MIMO Radar Transmit Beampattern Design for DOA Estimation with Sidelobe Suppression
Published 2016-01-01“…Uniform elemental power distribution across the transmit antenna is guaranteed; at the same time, signal rotational invariance property is considered, which enables search-free based DOA estimation algorithms to be utilized at the receiver. The proposed optimization problems are nonconvex and are solved by using semidefinite programming relaxation technique. …”
Get full text
Article -
11137
Blending 2D topography images from the Surface Water and Ocean Topography (SWOT) mission into the altimeter constellation with the Level-3 multi-mission Data Unification and Altime...
Published 2025-01-01“…In this paper, we describe how we extended the Level-3 algorithms to handle SWOT's unique swath-altimeter data. …”
Get full text
Article -
11138
Automated Particle Shape Identification and Quantification for DEM Simulation of Rockfill Materials in Subgrade Construction
Published 2022-01-01“…This study first identifies the subgrade rockfill particle contour by machine learning algorithms, including AdaBoost, Cascade, and sliding windows. …”
Get full text
Article -
11139
Measurement of the double-differential inclusive jet cross section in proton-proton collisions at s $$ \sqrt{s} $$ = 5.02 TeV
Published 2025-01-01“…The jets are reconstructed with the anti-k T algorithm using a distance parameter of R = 0.4, within the rapidity interval |y| < 2, and across the kinematic range 0.06 < p T < 1 TeV. …”
Get full text
Article -
11140
Study of Grape Polyphenols by Liquid Chromatography-High-Resolution Mass Spectrometry (UHPLC/QTOF) and Suspect Screening Analysis
Published 2015-01-01“…The method allows identification of several hundred grape metabolites with two analyses (positive and negative ionization modes), and performing of data reprocessing using “untargeted” algorithms also provided the identification of some flavonols and resveratrol trimers and tetramers in grape for the first time. …”
Get full text
Article