-
3681
Efficient Solutions of Multidimensional Sixth-Order Boundary Value Problems Using Symmetric Generalized Jacobi-Galerkin Method
Published 2012-01-01“…The proposed algorithms are extended to solve the two-dimensional sixth-order differential equations. …”
Get full text
Article -
3682
DRAV: Detection and repair of data availability violations in Internet of Things
Published 2019-11-01“…In this work, the detection and repair of data availability violations (DRAV) framework is proposed to detect and repair data violations in Internet of Things with a distributed parallel computing environment. DRAV uses algorithms in the MapReduce programming framework, and these include detection and repair algorithms based on enhanced conditional function dependency for data consistency violation, MapJoin, and ReduceJoin algorithms based on master data for k -nearest neighbor–based integrity violation detection, and repair algorithms. …”
Get full text
Article -
3683
Two accelerated gradient-based iteration methods for solving the Sylvester matrix equation AX + XB = C
Published 2024-12-01“…In this paper, combining the precondition technique and momentum item with the gradient-based iteration algorithm, two accelerated iteration algorithms are presented for solving the Sylvester matrix equation $ AX+XB = C $. …”
Get full text
Article -
3684
Statistical Analysis of Public Sentiment on the Ghanaian Government: A Machine Learning Approach
Published 2021-01-01“…The data was preprocessed, manually labeled by the researcher, and then trained using the aforementioned algorithms. These algorithms are three of the most popular learning algorithms which have had lots of success in diverse fields. …”
Get full text
Article -
3685
Online Coregularization for Multiview Semisupervised Learning
Published 2013-01-01“…Experiments show that our derived online coregularization algorithms achieve risk and accuracy comparable to offline algorithms while consuming less time and memory. …”
Get full text
Article -
3686
Online Parameter Estimation in Digital Twins for Real-Time Condition Monitoring
Published 2025-01-01“…This paper introduces innovative online parameter estimation algorithms that employ both deterministic and stochastic methodologies in digital twins for real-time condition monitoring. …”
Get full text
Article -
3687
Big Data Analytics: A Tutorial of Some Clustering Techniques
Published 2021-09-01“…Other algorithms use overlapping techniques where an object may belong to one or more clusters. …”
Get full text
Article -
3688
Performance evaluation of perceptible impulsive noise detection methods based on auditory models
Published 2025-01-01“…We compared the results of eight algorithms, hypothesizing that computationally simpler algorithms could perform as well as more complex ones. …”
Get full text
Article -
3689
Comparative evaluation of SNVs, indels, and structural variations detected with short- and long-read sequencing data
Published 2024-04-01“…The recall of SV detection with short-read-based algorithms was significantly lower in repetitive regions, especially for small- to intermediate-sized SVs, than that detected with long-read-based algorithms. …”
Get full text
Article -
3690
Evolutionary Computation and Its Applications in Neural and Fuzzy Systems
Published 2011-01-01“…In this paper, we first introduce evolutionary algorithms with emphasis on genetic algorithms and evolutionary strategies. …”
Get full text
Article -
3691
Joint User Detection and Channel Estimation in Grant-Free Random Access for Massive MIMO Systems
Published 2023-01-01“…As a result, these algorithms generate highly precise estimations of user channels. …”
Get full text
Article -
3692
The Application of Pattern Recognition in Electrofacies Analysis
Published 2014-01-01“…In this paper, we study several commonly used clustering and classification algorithms. On the basis of advantages and disadvantages of existing algorithms, we introduce the KMRIC algorithm, which improves initial centers of K-means. …”
Get full text
Article -
3693
Incremental Fuzzy Clustering Based on Feature Reduction
Published 2022-01-01“…In the era of big data, more and more datasets are gradually beyond the application scope of traditional clustering algorithms because of their large scale and high dimensions. …”
Get full text
Article -
3694
Combining Interval Branch and Bound and Stochastic Search
Published 2014-01-01“…This paper presents global optimization algorithms that incorporate the idea of an interval branch and bound and the stochastic search algorithms. …”
Get full text
Article -
3695
Pedestrian navigation: how can inertial measurment units assist smartphones?
Published 2021-04-01“…This paper is devoted to construction of reference walking trajectories for developing pedestrian navigation algorithms for smartphones. Such trajectories can be used both for verification of classical algorithms of navigation or for application of machine learning technics. …”
Get full text
Article -
3696
Randomized geographic-based routing with nearly guaranteed delivery for three-dimensional ad hoc network
Published 2016-10-01“…Several routing algorithms have been proposed for efficient routing in mobile ad hoc networks, most of them consider mobile nodes embedded in two-dimensional environments. …”
Get full text
Article -
3697
Autonomous Planning of Multigravity-Assist Trajectories with Deep Space Maneuvers Using a Differential Evolution Approach
Published 2013-01-01“…The biologically inspired concept of hidden genes has been recently introduced in genetic algorithms to solve optimization problems where the number of design variables is variable. …”
Get full text
Article -
3698
Heterogeneous Breast Phantom Development for Microwave Imaging Using Regression Models
Published 2012-01-01“…As new algorithms for microwave imaging emerge, it is important to have standard accurate benchmarking tests. …”
Get full text
Article -
3699
Copy-Move Forgery Verification in Images Using Local Feature Extractors and Optimized Classifiers
Published 2023-09-01“…CoMoFoD, CASIA, and MICC datasets and a combination of CoMoFoD and CASIA datasets images are used to quantify the performance of the proposed algorithms. The proposed algorithms are more efficient than state-of-the-art algorithms even though the suspected image is post-processed.…”
Get full text
Article -
3700
Sparse Graph Embedding Based on the Fuzzy Set for Image Classification
Published 2021-01-01“…In recent years, many face image feature extraction and dimensional reduction algorithms have been proposed for linear and nonlinear data, such as local-based graph embedding algorithms or fuzzy set algorithms. …”
Get full text
Article