Showing 8,081 - 8,100 results of 12,475 for search '"algorithms"', query time: 0.07s Refine Results
  1. 8081

    Designing a Neural Observer to Estimate the State Variables of the Dynamical System of a Specific Class of Leukaemia by Yousef Farshidi, Reza Ghasemi, Aminin Sharafian Ardekani

    Published 2022-09-01
    “…In order to adjust the neural network weights, the error back propagation learning algorithm was implemented. First of all, in this algorithm, the system outputs are generated according to random weights. …”
    Get full text
    Article
  2. 8082

    Development of a Driving Cycle for Fuzhou Using K-Means and AMPSO by Minrui Zhao, Hongni Gao, Qi Han, Jiaang Ge, Wei Wang, Jue Qu

    Published 2021-01-01
    “…First, bad data in the original dataset are preprocessed, the time-series standard smoothing algorithm is used to smoothen the data, and Lagrange’s interpolation is used to realize data interpolation. …”
    Get full text
    Article
  3. 8083

    Identification of Weakly Pitch-Shifted Voice Based on Convolutional Neural Network by Yongchao Ye, Lingjie Lao, Diqun Yan, Rangding Wang

    Published 2020-01-01
    “…Extensive results show that the algorithm achieves high detection rates for both binary and multiple classifications.…”
    Get full text
    Article
  4. 8084

    Mobile Base Station and Clustering to Maximize Network Lifetime in Wireless Sensor Networks by Oday Jerew, Kim Blackmore, Weifa Liang

    Published 2012-01-01
    “…In the work of Jerew and Liang (2009) we have proposed a novel clustering-based heuristic algorithm for finding a trajectory of the mobile BS that strikes a nontrivial tradeoff between the traffic load among sensor nodes and the tour time constraint of the mobile BS. …”
    Get full text
    Article
  5. 8085

    Metaheuristic Approaches for Hydropower System Scheduling by Ieda G. Hidalgo, Regiane S. de Barros, Jéssica P. T. Fernandes, João Paulo F. Estrócio, Paulo B. Correia

    Published 2015-01-01
    “…They combine Genetic Algorithm with Strength Pareto Evolutionary Algorithm and Ant Colony Optimization. …”
    Get full text
    Article
  6. 8086

    Impact of Dual Placement and Routing on WDDL Netlist Security in FPGA by Emna Amouri, Habib Mehrez, Zied Marrakchi

    Published 2013-01-01
    “…Then, we introduce a timing-balance-driven routing algorithm which is architecture independent. Our placement and routing techniques proved to be very promising. …”
    Get full text
    Article
  7. 8087

    Reducing Side Effects of Hiding Sensitive Itemsets in Privacy Preserving Data Mining by Chun-Wei Lin, Tzung-Pei Hong, Hung-Chuan Hsu

    Published 2014-01-01
    “…In this paper, a novel hiding-missing-artificial utility (HMAU) algorithm is proposed to hide sensitive itemsets through transaction deletion. …”
    Get full text
    Article
  8. 8088

    Joint DOA and Polarization Estimation for Unequal Power Sources by Qingyuan Fang, Yong Han, Ming Jin, Wenyi Dong

    Published 2015-01-01
    “…In addition, the performances of the proposed method are provided, as well the Cramer Rao Bound (CRB), which show approximate performance as the polarimetric MUSIC algorithm.…”
    Get full text
    Article
  9. 8089

    Wavelet Domain Multidictionary Learning for Single Image Super-Resolution by Xiaomin Wu, Jiulun Fan, Jian Xu, Yanzi Wang

    Published 2015-01-01
    “…Comparisons with various state-of-the-art methods by experiments showed that our proposed algorithm is superior to some related works.…”
    Get full text
    Article
  10. 8090

    Low-Shot Wall Defect Detection for Autonomous Decoration Robots Using Deep Reinforcement Learning by Fanyu Zeng, Xi Cai, Shuzhi Sam Ge

    Published 2020-01-01
    “…In this work, we solve this issue to propose the low-shot wall defect detection algorithm using deep reinforcement learning (DRL) for autonomous decoration robots. …”
    Get full text
    Article
  11. 8091

    Accelerating the Adaptive Eyre–Milton FFT-based method for infinitely double contrasted media by Dolbeau, Martin, Bleyer, Jérémy, Sab, Karam

    Published 2024-11-01
    “…Sab et al. (2024) have recently proposed an FFT-based iterative algorithm, termed Adaptive Eyre–Milton (AEM), for solving the Lippmann–Schwinger equation in the context of periodic homogenization of infinitely double contrasted linear elastic composites (heterogeneous materials with linear constitutive laws that contain both pores and rigid inclusions). …”
    Get full text
    Article
  12. 8092

    A Modified NM-PSO Method for Parameter Estimation Problems of Models by An Liu, Erwie Zahara, Ming-Ta Yang

    Published 2012-01-01
    “…The results demonstrate that the proposed M-NM-PSO method yields better estimation results than those obtained by the genetic algorithm, the modified genetic algorithm (real-coded GA (RCGA)), the conventional particle swarm optimization (PSO) method, and the conventional NM-PSO method.…”
    Get full text
    Article
  13. 8093

    Data-Driven Approaches for Diagnosis of Incipient Faults in Cutting Arms of the Roadheader by Qiang Liu, Songyong Liu, Qianjin Dai, Xiao Yu, Daoxiang Teng, Ming Wei

    Published 2021-01-01
    “…In this study, four machine learning tools (the back-propagation neural network based on genetic algorithm optimization, the naive Bayes based on genetic algorithm optimization, the support vector machines based on particle swarm optimization, and the support vector machines based on dynamic cuckoo) are applied to address the challenge in the IFDI of cutting arms. …”
    Get full text
    Article
  14. 8094

    Representing groups of students as personas: A systematic review of persona creation, application, and trends in the educational domain by Ali Farooq, Amani Alabed, Pilira Stella Msefula, Reham AL Tamime, Joni Salminen, Soon-gyo Jung, Bernard J. Jansen

    Published 2025-06-01
    “…The findings suggest significant opportunities for the educational sector to leverage algorithmic methods to advance persona creation and broaden their application scope.…”
    Get full text
    Article
  15. 8095

    Parallel Swarms Oriented Particle Swarm Optimization by Tad Gonsalves, Akira Egashira

    Published 2013-01-01
    “…The attractive feature of the PSO-PSO version of the algorithm is that it does not introduce any new parameters to improve its convergence performance. …”
    Get full text
    Article
  16. 8096

    A Novel Vibration Suppression Method for Welding Robots Based on Welding Pool Instability Evaluation and Trajectory Optimization by Mingtian Ma, Hong Lu, Yongquan Zhang, Zidong Wu, He Huang, Xujie Yuan, Xu Feng, Zhi Liu, Zhangjie Li

    Published 2024-12-01
    “…The proposed vibration suppression algorithm is based on the optimization of the welding trajectory. …”
    Get full text
    Article
  17. 8097

    Structural Damage Identification Based on the Transmissibility Function and Support Vector Machine by Yansong Diao, Xue Men, Zuofeng Sun, Kongzheng Guo, Yumei Wang

    Published 2018-01-01
    “…Finally, the classification algorithm and regression algorithm of support vector machine are employed to identify the damage location and damage severity respectively. …”
    Get full text
    Article
  18. 8098

    Design and structure of overlapping regions in PCA via deep learning by Yan Zheng, Xi-Chen Cui, Fei Guo, Ming-Liang Dou, Ze-Xiong Xie, Ying-Jin Yuan

    Published 2025-06-01
    “…Utilizing the model, we developed the SmartCut algorithm aimed at designing oligonucleotides and enhancing the success rate of PCA experiments. …”
    Get full text
    Article
  19. 8099

    Fuzzy Theory-Based Data Placement for Scientific Workflows in Hybrid Cloud Environments by Zheyi Chen, Xu Zhao, Bing Lin

    Published 2020-01-01
    “…To address this problem, we propose an adaptive discrete particle swarm optimization algorithm based on the fuzzy theory and genetic algorithm operators (DPSO-FGA) to minimize the fuzzy data transmission time of scientific workflows. …”
    Get full text
    Article
  20. 8100

    A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing by Xinyue Cao, Zhangjie Fu, Xingming Sun

    Published 2016-01-01
    “…Logistic map-based chaotic cryptography algorithm is used to preserve the privacy of outsourcing data, which has a fast operation speed and a good effect of encryption. …”
    Get full text
    Article