-
8081
Designing a Neural Observer to Estimate the State Variables of the Dynamical System of a Specific Class of Leukaemia
Published 2022-09-01“…In order to adjust the neural network weights, the error back propagation learning algorithm was implemented. First of all, in this algorithm, the system outputs are generated according to random weights. …”
Get full text
Article -
8082
Development of a Driving Cycle for Fuzhou Using K-Means and AMPSO
Published 2021-01-01“…First, bad data in the original dataset are preprocessed, the time-series standard smoothing algorithm is used to smoothen the data, and Lagrange’s interpolation is used to realize data interpolation. …”
Get full text
Article -
8083
Identification of Weakly Pitch-Shifted Voice Based on Convolutional Neural Network
Published 2020-01-01“…Extensive results show that the algorithm achieves high detection rates for both binary and multiple classifications.…”
Get full text
Article -
8084
Mobile Base Station and Clustering to Maximize Network Lifetime in Wireless Sensor Networks
Published 2012-01-01“…In the work of Jerew and Liang (2009) we have proposed a novel clustering-based heuristic algorithm for finding a trajectory of the mobile BS that strikes a nontrivial tradeoff between the traffic load among sensor nodes and the tour time constraint of the mobile BS. …”
Get full text
Article -
8085
Metaheuristic Approaches for Hydropower System Scheduling
Published 2015-01-01“…They combine Genetic Algorithm with Strength Pareto Evolutionary Algorithm and Ant Colony Optimization. …”
Get full text
Article -
8086
Impact of Dual Placement and Routing on WDDL Netlist Security in FPGA
Published 2013-01-01“…Then, we introduce a timing-balance-driven routing algorithm which is architecture independent. Our placement and routing techniques proved to be very promising. …”
Get full text
Article -
8087
Reducing Side Effects of Hiding Sensitive Itemsets in Privacy Preserving Data Mining
Published 2014-01-01“…In this paper, a novel hiding-missing-artificial utility (HMAU) algorithm is proposed to hide sensitive itemsets through transaction deletion. …”
Get full text
Article -
8088
Joint DOA and Polarization Estimation for Unequal Power Sources
Published 2015-01-01“…In addition, the performances of the proposed method are provided, as well the Cramer Rao Bound (CRB), which show approximate performance as the polarimetric MUSIC algorithm.…”
Get full text
Article -
8089
Wavelet Domain Multidictionary Learning for Single Image Super-Resolution
Published 2015-01-01“…Comparisons with various state-of-the-art methods by experiments showed that our proposed algorithm is superior to some related works.…”
Get full text
Article -
8090
Low-Shot Wall Defect Detection for Autonomous Decoration Robots Using Deep Reinforcement Learning
Published 2020-01-01“…In this work, we solve this issue to propose the low-shot wall defect detection algorithm using deep reinforcement learning (DRL) for autonomous decoration robots. …”
Get full text
Article -
8091
Accelerating the Adaptive Eyre–Milton FFT-based method for infinitely double contrasted media
Published 2024-11-01“…Sab et al. (2024) have recently proposed an FFT-based iterative algorithm, termed Adaptive Eyre–Milton (AEM), for solving the Lippmann–Schwinger equation in the context of periodic homogenization of infinitely double contrasted linear elastic composites (heterogeneous materials with linear constitutive laws that contain both pores and rigid inclusions). …”
Get full text
Article -
8092
A Modified NM-PSO Method for Parameter Estimation Problems of Models
Published 2012-01-01“…The results demonstrate that the proposed M-NM-PSO method yields better estimation results than those obtained by the genetic algorithm, the modified genetic algorithm (real-coded GA (RCGA)), the conventional particle swarm optimization (PSO) method, and the conventional NM-PSO method.…”
Get full text
Article -
8093
Data-Driven Approaches for Diagnosis of Incipient Faults in Cutting Arms of the Roadheader
Published 2021-01-01“…In this study, four machine learning tools (the back-propagation neural network based on genetic algorithm optimization, the naive Bayes based on genetic algorithm optimization, the support vector machines based on particle swarm optimization, and the support vector machines based on dynamic cuckoo) are applied to address the challenge in the IFDI of cutting arms. …”
Get full text
Article -
8094
Representing groups of students as personas: A systematic review of persona creation, application, and trends in the educational domain
Published 2025-06-01“…The findings suggest significant opportunities for the educational sector to leverage algorithmic methods to advance persona creation and broaden their application scope.…”
Get full text
Article -
8095
Parallel Swarms Oriented Particle Swarm Optimization
Published 2013-01-01“…The attractive feature of the PSO-PSO version of the algorithm is that it does not introduce any new parameters to improve its convergence performance. …”
Get full text
Article -
8096
A Novel Vibration Suppression Method for Welding Robots Based on Welding Pool Instability Evaluation and Trajectory Optimization
Published 2024-12-01“…The proposed vibration suppression algorithm is based on the optimization of the welding trajectory. …”
Get full text
Article -
8097
Structural Damage Identification Based on the Transmissibility Function and Support Vector Machine
Published 2018-01-01“…Finally, the classification algorithm and regression algorithm of support vector machine are employed to identify the damage location and damage severity respectively. …”
Get full text
Article -
8098
Design and structure of overlapping regions in PCA via deep learning
Published 2025-06-01“…Utilizing the model, we developed the SmartCut algorithm aimed at designing oligonucleotides and enhancing the success rate of PCA experiments. …”
Get full text
Article -
8099
Fuzzy Theory-Based Data Placement for Scientific Workflows in Hybrid Cloud Environments
Published 2020-01-01“…To address this problem, we propose an adaptive discrete particle swarm optimization algorithm based on the fuzzy theory and genetic algorithm operators (DPSO-FGA) to minimize the fuzzy data transmission time of scientific workflows. …”
Get full text
Article -
8100
A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing
Published 2016-01-01“…Logistic map-based chaotic cryptography algorithm is used to preserve the privacy of outsourcing data, which has a fast operation speed and a good effect of encryption. …”
Get full text
Article