Suggested Topics within your search.
Suggested Topics within your search.
-
1241
An empirical study of the naïve REINFORCE algorithm for predictive maintenance
Published 2025-03-01“…Abstract Reinforcement Learning (RL) is a biologically inspired, autonomous machine learning method. RL algorithms can help generate optimal predictive maintenance (PdM) policies for complex industrial systems. …”
Get full text
Article -
1242
-
1243
COMPARATIVE ANALYSIS OF COLORING ALGORITHMS FOR ORDINARY WEIGHTED GRAPH
Published 2014-06-01“…Algorithms of solving the “minimax” weighted graph coloring problem are considered and compared. …”
Get full text
Article -
1244
An Effective Integrated Metaheuristic Algorithm For Solving Engineering Problems
Published 2020-09-01Get full text
Article -
1245
Clustering Algorithm by Boundary Detection Base on Entropy of KNN
Published 2025-01-01“…Clustering analysis has been widely applied in various fields, and boundary detection based clustering algorithms have shown effective performance. In this work, we propose a clustering algorithm by boundary detection based on entropy of KNN (CBDEK). …”
Get full text
Article -
1246
Improved flow direction algorithm for WSN coverage optimization
Published 2024-03-01Subjects: Get full text
Article -
1247
Algorithmic Trading and Sentiment Analysis in Indian Stock Market
Published 2024-01-01Get full text
Article -
1248
DNA algorithm of primeness test based on finite automaton
Published 2006-01-01“…Finite automaton,a computational model of extremely limited computing ability,was proved to have the capa-bility of solving primeness test by construction.Then,a DNA algorithm of the primeness test based on finite automaton was proposed.Furthermore,the method of constructing the finite automaton was presented in detail.The state of the fi-nite automaton was encoded by single-stranded DNA.The input was encoded by double-stranded DNA.The transition rule was represented by a double strand with a ring.The state of transition was realized by enzyme-mediated chemical reactions.The innovation of the algorithm is that it can be applied not only in primeness test but also in prime factoriza-tion and further in attack of RSA cipher.The advantage of this method is that it can be easily implemented.The time re-quired is polynomial in the size of the problem instead of exponential in the size of the problem.…”
Get full text
Article -
1249
High maneuvering target tracking ATPM-IMM algorithm
Published 2022-07-01Subjects: “…interacting multiple model algorithm…”
Get full text
Article -
1250
A Rapid Numerical Algorithm to Compute Matrix Inversion
Published 2012-01-01“…The aim of the present work is to suggest and establish a numerical algorithm based on matrix multiplications for computing approximate inverses. …”
Get full text
Article -
1251
Wireless indoor localization technology based on fingerprint algorithm
Published 2016-10-01“…Then the principle of the existing indoor localization algorithm and its developing condition at present were summarized. …”
Get full text
Article -
1252
Snake-shaped robot design and path planning algorithm
Published 2025-08-01“…The algorithm’s effectiveness is validated through simulation analysis. …”
Get full text
Article -
1253
Noise-Suppressing Newton Algorithm for Kinematic Control of Robots
Published 2025-01-01Subjects: “…Noise-suppressing Newton algorithm…”
Get full text
Article -
1254
A Novel Tornado Detection Algorithm Based on XGBoost
Published 2025-01-01“…In addition, the TDA-XGB algorithm combines artificial intelligence-assisted learning to optimize the traditional algorithm based on the tornado vortex signature (TVS) and tornado debris signature (TDS), further improving the detection effect. …”
Get full text
Article -
1255
An algorithm of parameter identification in applied crop ontogenesis models
Published 2005-12-01“…The proposed parameter identification algorithm of applied crop development model was approved using standard meteorological and agrometeorological data obtained from Lithuanian Hidrometeorological Service and Lithuanian Institute of Agriculture. …”
Get full text
Article -
1256
A Cryptosystem for Database Security Based on TSFS Algorithm
Published 2020-05-01“…Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. …”
Get full text
Article -
1257
Evaluating Subpixel Target Detection Algorithms in Hyperspectral Imagery
Published 2012-01-01“…We demonstrate our ability to evaluate detectors and find the best settings for their free parameters by comparing our results using the following stochastic algorithms for target detection: the constrained energy minimization (CEM), generalized likelihood ratio test (GLRT), and adaptive coherence estimator (ACE) algorithms. …”
Get full text
Article -
1258
Image zero-watermarking algorithm based on region of interest
Published 2009-01-01“…Based on ROI, a new watermarking algorithm was proposed.First, ROI was selected.Then, the wavelet transform was executed and ROI mask was constructed.Finally, the zero-watermarking was designed for the wavelet coefficients in ROI mask.The experimental results show that the zero-watermarking is more robust in the new algorithm than others that are not designed for ROI when the ROI of image is decoded at higher quality than the background.Additionally, the new algorithm can ensure ROI not to be disturbed by the watermarking information because of the zero-watermarking.…”
Get full text
Article -
1259
-
1260
Named Entity Recognition for Nepali: Data Sets and Algorithms
Published 2022-05-01Get full text
Article