Showing 1,241 - 1,260 results of 64,539 for search '"algorithm"', query time: 0.18s Refine Results
  1. 1241

    An empirical study of the naïve REINFORCE algorithm for predictive maintenance by Rajesh Siraskar, Satish Kumar, Shruti Patil, Arunkumar Bongale, Ketan Kotecha, Ambarish Kulkarni

    Published 2025-03-01
    “…Abstract Reinforcement Learning (RL) is a biologically inspired, autonomous machine learning method. RL algorithms can help generate optimal predictive maintenance (PdM) policies for complex industrial systems. …”
    Get full text
    Article
  2. 1242
  3. 1243

    COMPARATIVE ANALYSIS OF COLORING ALGORITHMS FOR ORDINARY WEIGHTED GRAPH by Andrey Sergeyevich Merzlenko, Valery Grigoryevich Kobak

    Published 2014-06-01
    “…Algorithms of solving the “minimax” weighted graph coloring problem are considered and compared. …”
    Get full text
    Article
  4. 1244
  5. 1245

    Clustering Algorithm by Boundary Detection Base on Entropy of KNN by Jiaman Ding, Jinyuan Yin, Lianyin Jia, Xiaodong Fu, Hongbin Wang

    Published 2025-01-01
    “…Clustering analysis has been widely applied in various fields, and boundary detection based clustering algorithms have shown effective performance. In this work, we propose a clustering algorithm by boundary detection based on entropy of KNN (CBDEK). …”
    Get full text
    Article
  6. 1246
  7. 1247
  8. 1248

    DNA algorithm of primeness test based on finite automaton by YANG Xue-qing, LIU Zhong-kan

    Published 2006-01-01
    “…Finite automaton,a computational model of extremely limited computing ability,was proved to have the capa-bility of solving primeness test by construction.Then,a DNA algorithm of the primeness test based on finite automaton was proposed.Furthermore,the method of constructing the finite automaton was presented in detail.The state of the fi-nite automaton was encoded by single-stranded DNA.The input was encoded by double-stranded DNA.The transition rule was represented by a double strand with a ring.The state of transition was realized by enzyme-mediated chemical reactions.The innovation of the algorithm is that it can be applied not only in primeness test but also in prime factoriza-tion and further in attack of RSA cipher.The advantage of this method is that it can be easily implemented.The time re-quired is polynomial in the size of the problem instead of exponential in the size of the problem.…”
    Get full text
    Article
  9. 1249

    High maneuvering target tracking ATPM-IMM algorithm by Hao ZENG, Wangqiang MU, Shunping YANG

    Published 2022-07-01
    Subjects: “…interacting multiple model algorithm…”
    Get full text
    Article
  10. 1250

    A Rapid Numerical Algorithm to Compute Matrix Inversion by F. Soleymani

    Published 2012-01-01
    “…The aim of the present work is to suggest and establish a numerical algorithm based on matrix multiplications for computing approximate inverses. …”
    Get full text
    Article
  11. 1251

    Wireless indoor localization technology based on fingerprint algorithm by Mengdan ZHANG, Guangyue LU, Honggang WANG, Jiming LIU

    Published 2016-10-01
    “…Then the principle of the existing indoor localization algorithm and its developing condition at present were summarized. …”
    Get full text
    Article
  12. 1252

    Snake-shaped robot design and path planning algorithm by Zhao Guang-hui, Cheng Wan-sheng

    Published 2025-08-01
    “…The algorithm’s effectiveness is validated through simulation analysis. …”
    Get full text
    Article
  13. 1253

    Noise-Suppressing Newton Algorithm for Kinematic Control of Robots by Xiuchun Xiao, Lin Wei, Dongyang Fu, Jingwen Yan, Huan Wang

    Published 2025-01-01
    Subjects: “…Noise-suppressing Newton algorithm…”
    Get full text
    Article
  14. 1254

    A Novel Tornado Detection Algorithm Based on XGBoost by Qiangyu Zeng, Guoxiu Zhang, Shangdan Huang, Wenwen Song, Jianxin He, Hao Wang, Yin Liu

    Published 2025-01-01
    “…In addition, the TDA-XGB algorithm combines artificial intelligence-assisted learning to optimize the traditional algorithm based on the tornado vortex signature (TVS) and tornado debris signature (TDS), further improving the detection effect. …”
    Get full text
    Article
  15. 1255

    An algorithm of parameter identification in applied crop ontogenesis models by Vitalijus Denisovas, Natalija Juščenko

    Published 2005-12-01
    “…The proposed parameter identification algorithm of applied crop development model was approved using standard meteorological and agrometeorological data obtained from Lithuanian Hidrometeorological Service and Lithuanian Institute of Agriculture. …”
    Get full text
    Article
  16. 1256

    A Cryptosystem for Database Security Based on TSFS Algorithm by Saad Abdulkareem Abdulameer, Ali Habeeb Kashmar, Ammar Ibraheem Shihab

    Published 2020-05-01
    “…Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. …”
    Get full text
    Article
  17. 1257

    Evaluating Subpixel Target Detection Algorithms in Hyperspectral Imagery by Yuval Cohen, Yitzhak August, Dan G. Blumberg, Stanley R. Rotman

    Published 2012-01-01
    “…We demonstrate our ability to evaluate detectors and find the best settings for their free parameters by comparing our results using the following stochastic algorithms for target detection: the constrained energy minimization (CEM), generalized likelihood ratio test (GLRT), and adaptive coherence estimator (ACE) algorithms. …”
    Get full text
    Article
  18. 1258

    Image zero-watermarking algorithm based on region of interest by ZHANG Li-bao, MA Xin-yue, CHEN Qi

    Published 2009-01-01
    “…Based on ROI, a new watermarking algorithm was proposed.First, ROI was selected.Then, the wavelet transform was executed and ROI mask was constructed.Finally, the zero-watermarking was designed for the wavelet coefficients in ROI mask.The experimental results show that the zero-watermarking is more robust in the new algorithm than others that are not designed for ROI when the ROI of image is decoded at higher quality than the background.Additionally, the new algorithm can ensure ROI not to be disturbed by the watermarking information because of the zero-watermarking.…”
    Get full text
    Article
  19. 1259
  20. 1260