-
7601
VIRUS CHANGE MODEL IN ORGANIZATIONAL TRANSFORMATION
Published 2018-09-01“…The model consists of organizational virus structure, chang-es algorithm and immune instruments for process interruption. …”
Get full text
Article -
7602
Improving the Sound Source Identification Performance of Sparsity Constrained Deconvolution Beamforming Utilizing SFISTA
Published 2020-01-01“…In this paper, an alternative sparsity constrained deconvolution beamforming utilizing the smoothing fast iterative shrinkage-thresholding algorithm (SFISTA) is proposed for sound source identification. …”
Get full text
Article -
7603
Comparison Study of Two Different Sun-Tracking Methods in Optical Efficiency of Heliostat Field
Published 2012-01-01“…With the new algorithm, comprehensive analysis to compare the optical efficiency of individual heliostat and the overall heliostat field for the two sun-tracking methods has been carried out.…”
Get full text
Article -
7604
Dynamic Model Identification for 6-DOF Industrial Robots
Published 2015-01-01“…The artificial bee colony algorithm is introduced to estimate the unknown parameters. …”
Get full text
Article -
7605
Motivation Analysis of Technological Startups Business Models Based on Intelligent Data Mining and Analysis
Published 2022-01-01“…To improve the motivation analysis effect of the technological startups business model, this study combines intelligent data mining technology to analyze related factors and proposes a method of adjusting parameters of machine-learning model based on Bayesian optimization algorithm. Moreover, this study integrates the prior information and sample information of the machine learning algorithm performance function and builds an intelligent analysis model based on the elements of the technological startups business model. …”
Get full text
Article -
7606
Large-Scale Evolutionary Strategy Based on Gradient Approximation
Published 2021-01-01“…For large-scale optimization, CMA-ES has the disadvantages of high complexity and premature stagnation. An improved CMA-ES algorithm called GI-ES was proposed in this paper. …”
Get full text
Article -
7607
Optimal Fitting Method of Nonlinear Simultaneous Equations Considering Structural Tensor Image Modeling
Published 2021-01-01“…Finally, it can be known through the analysis of the simulation results that the OFMNSE algorithm put forward in this paper can improve the congestion issue of the multimedia network transmission process and reduce the packet loss rate of data during the transmission effectively under the condition of different relative cache sizes compared with the conventional algorithm.…”
Get full text
Article -
7608
Robust Output Feedback Disturbance Rejection Control by Simultaneously Estimating State and Disturbance
Published 2011-01-01“…Moreover, the controller algorithm developed in this paper can effectively avoid the peaking phenomenon. …”
Get full text
Article -
7609
Indifferentiable hash functions in the standard model
Published 2021-07-01“…Abstract Indifferentiability of iterated hash functions is seen as evidence that there are no structural flaws in the iteration structure of the algorithm. However, it is often overlooked that such considerations only hold in the random oracle model and do not give any guarantee in the standard model. …”
Get full text
Article -
7610
Modeling and Simulation of Real Estate Valuation Based on Genetic Neural Network Model
Published 2022-01-01“…Experiments show that the genetic algorithm is effective in optimizing the BP house price valuation model and improves the calculation efficiency and valuation accuracy of the valuation model.…”
Get full text
Article -
7611
Optimizing Crew Rostering with Multilicense on High-Speed Railway Lines
Published 2014-01-01“…According to the characteristics of the problem and the requirements in application, this paper presents the design of an improved ant colony algorithm for solving the optimization model. The reasonableness of the model and the effectiveness of the algorithm are verified by a numerical example with 43 generated crew routes.…”
Get full text
Article -
7612
Developing automated strategy of life cycle cost analysis (LCCA) with building information modeling (BIM) integration for building projects
Published 2025-03-01“…To address the issue, this current research attempts to automate the LCCA process and develop an advanced algorithm for LCCA with building information modelling (BIM) integration. …”
Get full text
Article -
7613
Frequency Resource Sharing and Allocation Scheme Based on Coalition Formation Game in Hybrid D2D-Cellular Network
Published 2015-01-01“…Compared with the exhaustive search, our algorithm has much lower computer complexity. In addition, we prove that stability and convergence of the proposed algorithm using the concept of a defection function. …”
Get full text
Article -
7614
Interactive trajectory prediction for autonomous driving based on Transformer
Published 2025-02-01“…In this paper, we propose a novel trajectory prediction algorithm based on Transformer networks, a data-driven method that ingeniously harnesses dual-input channels. …”
Get full text
Article -
7615
Binocular Video-Based Automatic Pixel-Level Crack Detection and Quantification Using Deep Convolutional Neural Networks for Concrete Structures
Published 2025-01-01“…In this methodology, the proposed method based on the following four modules is adopted: a lightweight classification algorithm, a high-precision segmentation algorithm, a semi-global block matching algorithm (SGBM), and a crack quantification technique. …”
Get full text
Article -
7616
Simulation Study of Deep Belief Network-Based Rice Transplanter Navigation Deviation Pattern Identification and Adaptive Control
Published 2025-01-01“…Among them, the deviation pattern identification method is a two-stage algorithm. First, determine whether the current navigation status is abnormal. …”
Get full text
Article -
7617
A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
Published 2025-01-01“…This study introduces a novel image encryption algorithm specifically designed to bolster the security of images in resource‐constrained IoT ecosystems. …”
Get full text
Article -
7618
Presenting a multi-objective mathematical model with an integrated approach to scheduling and financial flow in production projects using NSGA-II
Published 2023-11-01“…The use of the NSGA-II algorithm enhances the efficiency of finding optimal solutions. …”
Get full text
Article -
7619
Opportunities for Prevention of Complications in Intestinal Stoma Surgery
Published 2025-02-01“…To confirm the effectiveness of the proposed algorithm, an analysis of 52 clinical observations in patients who underwent surgeries with the formation of an end colostomy was carried out, which made up two clinical groups. …”
Get full text
Article -
7620
Application of Machine Learning Techniques to Distinguish between Mare, Cryptomare, and Light Plains in Central Lunar South Pole−Aitken Basin
Published 2025-01-01“…A two-step image classification approach was applied to the data sets, an unsupervised K-Means algorithm followed by a supervised Maximum Likelihood Classification (MLC) algorithm. …”
Get full text
Article