Showing 3,741 - 3,760 results of 12,475 for search '"algorithms"', query time: 0.08s Refine Results
  1. 3741

    Machine Learning and Safe and Inclusive Architecture for Fragile Users by Antonio Magarò, Adolfo F. L. Baratta

    Published 2019-06-01
    “…The contribution presents the first results of a research conducted in the Department of Architecture, Roma Tre University, aimed at testing Machine Learning algorithms for train Neural Networks in learning data from BIM, with the purpose of generating Augmented Reality contents. …”
    Get full text
    Article
  2. 3742

    Slax: a composable JAX library for rapid and flexible prototyping of spiking neural networks by Thomas M Summe, Siddharth Joshi

    Published 2025-01-01
    “…To address this, we introduce Slax, a JAX-based library designed to accelerate SNN algorithm design and evaluation. Slax is compatible with the broader JAX and Flax ecosystem and provides optimized implementations of diverse training algorithms, enabling direct performance comparisons. …”
    Get full text
    Article
  3. 3743

    Developing Financial Forecast Modeling With Deep Learning On Silver/Ons Parity by Adem Üntez, Mümtaz İpek

    Published 2022-03-01
    “…LSTM and ARIMA architectures, which are deep learning algorithms, are used. By loading the train-ing and test data into the established algorithms, the system was learned and a graphical estimation was requested on the silver / ounce parity for the next 10 days.Written algorithms can produce different results each time they are run. …”
    Get full text
    Article
  4. 3744

    Intelligent Wireless Sensors with Application to the Identification of Structural Modal Parameters and Steel Cable Forces: From the Lab to the Field by Y. Lei, W. A. Shen, Y. Song, Y. Wang

    Published 2010-01-01
    “…In this paper, performance of the two embedded engineering algorithms, namely the fast Fourier transform and peak-picking algorithm implemented in the wireless sensing nodes codeveloped at Stanford University and the University of Michigan is investigated through laboratory and field experimental studies. …”
    Get full text
    Article
  5. 3745

    Vibration Control by Means of Piezoelectric Actuators Shunted with LR Impedances: Performance and Robustness Analysis by M. Berardengo, A. Cigada, S. Manzoni, M. Vanali

    Published 2015-01-01
    “…Some of these algorithms derive from the theory of the tuned mass dampers. …”
    Get full text
    Article
  6. 3746

    Multi-Person Localization Based on a Thermopile Array Sensor with Machine Learning and a Generative Data Model by Stefan Klir, Julian Lerch, Simon Benkner, Tran Quoc Khanh

    Published 2025-01-01
    “…Both algorithms provide a high mean average precision (mAP) exceeding 98%. …”
    Get full text
    Article
  7. 3747

    Shortest-Path Optimization of Ship Diesel Engine Disassembly and Assembly Based on AND/OR Network by Deng-Zhi Chen, Chen Wei, Guo-Ling Jia, Zhi-Hua Hu

    Published 2020-01-01
    “…The breadth-first shortest-path algorithm outperforms the MILP solver from the perspective of solution quality and computing time, and all developed algorithms are competitive in terms of computing time.…”
    Get full text
    Article
  8. 3748

    Trajectory Simulation of Emergency Vehicles and Interactions with Surrounding Traffic by Cristián E. Cortés, Bruno Stefoni

    Published 2023-01-01
    “…The efficient dispatch of emergency vehicles (EMVs) requires realistic shortest-path algorithms involving the movement of EMVs within an urban network under emergency conditions. …”
    Get full text
    Article
  9. 3749

    Evaluation of Algebraic Iterative Image Reconstruction Methods for Tetrahedron Beam Computed Tomography Systems by Joshua Kim, Huaiqun Guan, David Gersten, Tiezhi Zhang

    Published 2013-01-01
    “…While the TBCT system was designed to overcome the scatter and detector issues faced by cone beam computed tomography (CBCT), it still suffers the same large cone angle artifacts as CBCT due to the use of approximate reconstruction algorithms. It has been shown that iterative reconstruction algorithms are better able to model irregular system geometries and that algebraic iterative algorithms in particular have been able to reduce cone artifacts appearing at large cone angles. …”
    Get full text
    Article
  10. 3750

    MORF: Multi-view oblique random forest for hepatotoxicity prediction by Binsheng Sui, Qingzhuo He, Bowei Yan, Kunhong Liu, Yong Xu, Song He, Xiaochen Bo

    Published 2025-02-01
    “…These two types of ODT algorithms serve as the base learners to construct two MORF. …”
    Get full text
    Article
  11. 3751

    Numerical Solutions of Odd Order Linear and Nonlinear Initial Value Problems Using a Shifted Jacobi Spectral Approximations by A. H. Bhrawy, M. A. Alghamdi

    Published 2012-01-01
    “…Through several numerical examples, we evaluate the accuracy and performance of the proposed algorithms. The algorithms are easy to implement and yield very accurate results.…”
    Get full text
    Article
  12. 3752

    The Optimization of Multimode Fiber Speckle Sensor for Microvibration by Haoyang Song, Feiyu Sun, Yunxu Sun, Wei Liu

    Published 2023-01-01
    “…A vibration sensing system with optical fiber speckles is demonstrated and optimized with different optical fiber diameters and speckle statistical algorithms. The types of fiber diameter and material lead to a different performance of fiber specklegram sensor (FSS), which has been experimentally explored. …”
    Get full text
    Article
  13. 3753

    KC-Means: A Fast Fuzzy Clustering by Israa Abdzaid Atiyah, Adel Mohammadpour, S. Mahmoud Taheri

    Published 2018-01-01
    “…A novel hybrid clustering method, named KC-Means clustering, is proposed for improving upon the clustering time of the Fuzzy C-Means algorithm. The proposed method combines K-Means and Fuzzy C-Means algorithms into two stages. …”
    Get full text
    Article
  14. 3754

    Location Privacy and Energy Preservation in Sensor Allocation Systems by Hosam Rowaihy

    Published 2012-08-01
    “…We propose sensor-to-task assignments algorithms that take into account location privacy issues. …”
    Get full text
    Article
  15. 3755

    Evaluating the Performance of SVM, Isolation Forest, and DBSCAN for Anomaly Detection by Lu Haowen

    Published 2025-01-01
    “…Identifying the most effective algorithm for anomaly detection is essential for enhancing nidustrial productivity. …”
    Get full text
    Article
  16. 3756

    Open Data Release and Privacy Concerns: Complexity in Mitigating Vulnerability with Controlled Perturbation by Shah Imran Alam, Ihtiram Raza Khan, Syed Imtiyaz Hassan, Farheen Siddiqui, M. Afshar Alam, Anil Kumar Mahto

    Published 2021-01-01
    “…K-anonymity algorithm was the foundation of many of its successor algorithms of all privacy-preserving algorithms. l-diversity claims to add another dimension of privacy protection. …”
    Get full text
    Article
  17. 3757

    The Statistical Detecting of Sulfur Hexafluoride and Nitrous Oxide Effect on Seasonal Rainfalls in Iran During Recent Decade by Yosef Ghavidel Rahimi, Maysam Tolabi Nejad, Manochehr Farajzadeh

    Published 2013-11-01
    “…In fact, they are among the progressive networks with supervising training algorithms and suitable for nonlinear data. Other two categories of training algorithms including BP training algorithms and number normalization algorithm were used for training of networks. …”
    Get full text
    Article
  18. 3758

    Emotional Interaction and Behavioral Decision-Making Mechanism in Network Science Education Based on Deep Learning by Pengjiao Li, Qian Meng

    Published 2022-01-01
    “…From deep statistical learning algorithms to completing network science education, designing or modifying more comprehensive and faster bpq-l learning algorithms based on traditional learning algorithms can allow us to find target sentiments.…”
    Get full text
    Article
  19. 3759

    Virtual Node-Driven Cloud–Edge Collaborative Resource Scheduling for Surveillance with Visual Sensors by Xinyang Gu, Zhansheng Duan, Guangyuan Ye, Zhenjun Chang

    Published 2025-01-01
    “…Additionally, we propose three alternative virtual node-driven scheduling algorithms, the extension of a random algorithm, a genetic algorithm, and a heuristic algorithm, respectively. …”
    Get full text
    Article
  20. 3760

    Multifeature Fusion Detection Method for Fake Face Attack in Identity Authentication by Haiqing Liu, Shiqiang Zheng, Shuhua Hao, Yuancheng Li

    Published 2018-01-01
    “…In this paper, we use the CASIA, PRINT-ATTACK, and REPLAY-ATTACK database to compare the various LBP algorithms that incorporate optical flow and fusion algorithms.…”
    Get full text
    Article