Showing 1,301 - 1,320 results of 64,539 for search '"algorithm"', query time: 0.22s Refine Results
  1. 1301

    Practical aspects of using of parallel computing in genetic algorithm by V. V. Frolov

    Published 2019-06-01
    Subjects: “…genetic algorithm…”
    Get full text
    Article
  2. 1302

    A Modified Grey Wolf Algorithm with Applications to Engineering by Vahid Mahboub

    Published 2024-04-01
    “…In this contribution, a modified gray wolf algorithm for use in engineering applications is presented. …”
    Get full text
    Article
  3. 1303

    Algorithmization of the problem of videoscopic evaluation of the steel ropes state by Panfilov A.V., Yusupov A.R., Gavrikov M.M., Sinetsky R.M.

    Published 2023-03-01
    “…The paper presents the results of preliminary testing of the developed algorithms and programs, the composition and methods for determining the main indicators for evaluating their effectiveness are proposed.…”
    Get full text
    Article
  4. 1304
  5. 1305
  6. 1306

    Algorithm for blind separation of PCMA based on CHASE decoding by Jian DU, Ke-xian GONG, Hua PENG

    Published 2015-03-01
    “…On the basis of SOVA-PSP, a novel algorithm for blind separation of PCMA signal was presented based on CHASE decoding. …”
    Get full text
    Article
  7. 1307

    Research on multi-bit decoding algorithms for polar codes by Zhouqing SHEN, Junna SHANG

    Published 2018-11-01
    “…Aiming at the problem of high delay of successive cancellation lists (SCL) decoding algorithm for polar codes,a multi-bit SCL (MSCL) decoding algorithm based on log-likelihood ratio was proposed.The multiple codeword bits could be decoded simultaneously at a single decision time.Without loss of SCL decoding performance,the decoding delay was reduced from 3N-2 clocks to 4N/M-2 clocks.Compared with the existing multi-bit SCL decoding algorithm,the MSCL decoding algorithm had a lower complexity of the path metric calculation.In order to reduce the decoding delay and memory space of the cyclical redundancy check (CRC) assisted SCL (CA-SCL) decoding algorithm,a segmented CRC assisted MSCL (SCA-MSCL) decoding algorithm was proposed,and a segmentation information codeword length correction algorithm was proposed.By adjusting the length of the relevant segment,the information bit index set A was guaranteed.Under the same premise,the corresponding information bit index at the end of each segment could be divisible by M.The SCA-MSCL algorithm could output decoded code words as early as possible by using multiple CRC decisions,thereby reducing the decoder’s storage space and decoding delay.…”
    Get full text
    Article
  8. 1308

    Road damage detection based on improved YOLO algorithm by Luyao Ma, Ming Chen

    Published 2025-08-01
    “…Experimental results show that compared to existing methods, this algorithm boosts the retrieval rate by 2.3%, increases the average value by 0.3, and improves the harmonic mean F1 by 0.7 relative to other models. …”
    Get full text
    Article
  9. 1309
  10. 1310

    FAST ALGORITHMS IN MATHEMATICAL AURALIZATION MODELS IN ROOM ACOUSTICS by N.F. TODOROV

    Published 2009-03-01
    “…We develop auralization algorithms for computer simulation of sounding of audio files in a certain hall. …”
    Get full text
    Article
  11. 1311
  12. 1312

    DNA algorithm of primeness test based on finite automaton by YANG Xue-qing, LIU Zhong-kan

    Published 2006-01-01
    “…Finite automaton,a computational model of extremely limited computing ability,was proved to have the capa-bility of solving primeness test by construction.Then,a DNA algorithm of the primeness test based on finite automaton was proposed.Furthermore,the method of constructing the finite automaton was presented in detail.The state of the fi-nite automaton was encoded by single-stranded DNA.The input was encoded by double-stranded DNA.The transition rule was represented by a double strand with a ring.The state of transition was realized by enzyme-mediated chemical reactions.The innovation of the algorithm is that it can be applied not only in primeness test but also in prime factoriza-tion and further in attack of RSA cipher.The advantage of this method is that it can be easily implemented.The time re-quired is polynomial in the size of the problem instead of exponential in the size of the problem.…”
    Get full text
    Article
  13. 1313

    Improved rule-based backward fuzzy reasoning algorithm by ZHANG Wen1, ZHANG Gui-xu1

    Published 2008-01-01
    “…An improved rule-based backward fuzzy reasoning algorithm was pointed. The algorithm is based on the fuzzy Petri net (FPN) which represents fuzzy production rules. …”
    Get full text
    Article
  14. 1314
  15. 1315

    Heterogeneous redundancies scheduling algorithm for mimic security defense by Qinrang LIU, Senjie LIN, Zeyu GU

    Published 2018-07-01
    “…The scheduling of heterogeneous redundancies is one of the key lines of mimic security defense,but the existing scheduling strategies are lack of consideration about the similarity among redundancies and the scheduling algorithms are incomprehensive.A new scheduling algorithm called random seed & minimum similarity (RSMS) algorithm was proposed,which combined dynamics and reliability by determining a scheduling scheme with minimum global-similarity after choosing a seed-redundancy randomly.Theoretical analysis and simulation results show that RSMS algorithm possessed a far longer scheduling cycle than maximum dissimilarity algorithm,as well as a far lower failure rate than random scheduling algorithm,which represents an effective balance between dynamics and reliability.…”
    Get full text
    Article
  16. 1316
  17. 1317

    Machine Learning Algorithms Performance Evaluation for Intrusion Detection by Shyla ., Kapil Kumar, Vishal Bhatnagar

    Published 2021-01-01
    “…In this paper authors introduces Intrusion detection system (IDS) framework that is deployed over KDD Cup99 dataset by using machine learning algorithms as Support Vector Machine (SVM), Naïve Bayes and Random Forest for the purpose of improving the precision, accuracy and recall value to compute the best suited algorithm.…”
    Get full text
    Article
  18. 1318
  19. 1319

    The PSO-IFAH optimization algorithm for transient electromagnetic inversion. by Zhengyu Xu, Guofeng Zhao, Xian Liao, Nengyi Fu

    Published 2025-01-01
    “…The particle swarm optimization (PSO) algorithm and firefly algorithm (FA) were successful swarm intelligence algorithms inspired by nature. …”
    Get full text
    Article
  20. 1320

    Algorithms for planning working time under interval uncertainty by Yu. N. Sotskov, N. G. Egorova, N. M. Matsveichuk

    Published 2020-06-01
    “…Computational experiment on the computer showed the effectiveness of the developed algorithms for constructing schedules for time-management.…”
    Get full text
    Article