Showing 8,521 - 8,540 results of 12,475 for search '"algorithms"', query time: 0.06s Refine Results
  1. 8521

    Culture under Complex Perspective: A Classification for Traditional Chinese Cultural Elements Based on NLP and Complex Networks by Lin Qi, Yuwei Wang, Jindong Chen, Mengjie Liao, Jian Zhang

    Published 2021-01-01
    “…After analyzing the topological characteristics of the network, the community detection algorithm is used to identify the topics of cultural elements. …”
    Get full text
    Article
  2. 8522

    Hybrid Deep-Learning Framework Based on Gaussian Fusion of Multiple Spatiotemporal Networks for Walking Gait Phase Recognition by Tao Zhen, Jian-lei Kong, Lei Yan

    Published 2020-01-01
    “…The framework proposed in this paper implements the inner loop that also contains the EM algorithm in the outer loop and optimizes the reverse gradient in the entire network. …”
    Get full text
    Article
  3. 8523

    A New Method Based on Operational Strategies for Early Detection of Breast Cancers by Samira Khajehkhasan, Soheil Fakheri

    Published 2020-08-01
    “…Results: This article proposes a new algorithm for diagnosing benign and malignant cancers. …”
    Get full text
    Article
  4. 8524

    Fault Diagnosis Method of Distribution Equipment Based on Hybrid Model of Robot and Deep Learning by Shan Rongrong, Ma Zhenyu, Ye Hong, Lin Zhenxing, Qiu Gongming, Ge Chengyu, Lu Yang, Yu Kun

    Published 2022-01-01
    “…Finally, the residual network is used to improve the region-based fully convolutional networks (R-FCN) algorithm, and the improved R-FCN algorithm trained by the online hard example mining method is used for fault feature learning. …”
    Get full text
    Article
  5. 8525

    Utilizing machine learning to predict hospital admissions for pediatric COVID-19 patients (PrepCOVID-Machine) by Chuin-Hen Liew, Song-Quan Ong, David Chun-Ern Ng

    Published 2025-01-01
    “…Grid Search was used to optimize the hyperparameters of each algorithm. The study analyzed 1988 children and 30 study variables after data were processed. …”
    Get full text
    Article
  6. 8526

    Spatiotemporal Video Denoising Based on Adaptive Thresholding and Clustering by Ali Abdullah Yahya, Jieqing Tan, Benyu Su, Kui Liu, Ali Naser Hadi

    Published 2017-01-01
    “…Execution time of the proposed algorithm consumes less time in denoising than that in the VBM3D algorithm.…”
    Get full text
    Article
  7. 8527

    Designing and implementing a Web-based real time routing service for crisis management (a case study for district 11 of Tehran) by javad sadidi, seyed hassan hosseini sajedi

    Published 2019-06-01
    “…In this service ANP model was used to evaluate increasing interaction between the factors, and since the purpose of this study was to find the best possible routs between two nodes by non-negative weight according to the main distance factor, Dijkstra's algorithm has been chosen as a proper routing algorithm. …”
    Get full text
    Article
  8. 8528

    Validation of the version 4.5 MAESTRO ozone and NO<sub>2</sub> measurements by P. S. Jeffery, J. R. Drummond, C. T. McElroy, K. A. Walker, J. Zou

    Published 2025-02-01
    “…The version 4.5 retrieval algorithm represents an improvement from previous versions, with changes including updated pressure and temperature input information, an improved algorithm for high-Sun reference spectrum calculation, improved Rayleigh scattering modelling, and the change to a Twomey–Tikhonov inversion algorithm from a Chahine relaxation technique. …”
    Get full text
    Article
  9. 8529

    Sentiment Analysis Twitter Bahasa Indonesia Berbasis WORD2VEC Menggunakan Deep Convolutional Neural Network by Hans Juwiantho, Esther Irawati Setiawan, Joan Santoso, Mauridhi Hery Purnomo

    Published 2020-02-01
    “…The results of experiments that have been carried out with the Deep Convolutional Neural Network algorithm have the best accuracy value of 76.40%. …”
    Get full text
    Article
  10. 8530

    Understanding Health-Related Discussions on Reddit: Development of a Topic Assignment Method and Exploratory Analysis by Garrett J Chan, Mark Fung, Jill Warrington, Sarah A Nowak

    Published 2025-01-01
    “…By iterating through multiple rounds of topic assignment, we improved the accuracy of the algorithm. Ultimately, this algorithm created 82 topics sorted into 17 broader medical disciplines. …”
    Get full text
    Article
  11. 8531

    A Series of Frequency Shift Antennas Based on Shape Blending by Aiting Wu, Yuebin Sun, Pengquan Zhang, Tiejun Du

    Published 2021-01-01
    “…In this paper, an automatic antenna design method based on the shape blending algorithm is proposed. The algorithm is used to construct the shape of the wide slot of a CPW-fed antenna. …”
    Get full text
    Article
  12. 8532

    A Low-Duty-Cycle and Congestion-Robust Design of Adaptive Wi-Fi 7 Multi-Link Operation Control Over User Side by Yirong Cheng, Abhishek Sehgal, Kyeong Jin Kim, Neha Dawar, Yuming Zhu

    Published 2025-01-01
    “…We have devised an adaptive algorithm that dynamically adjusts MLO configurations based on periodic measurements at the MAC/IP layers. …”
    Get full text
    Article
  13. 8533

    Chaos-Based Engineering Applications with a 6D Memristive Multistable Hyperchaotic System and a 2D SF-SIMM Hyperchaotic Map by Fei Yu, Shuai Qian, Xi Chen, Yuanyuan Huang, Shuo Cai, Jie Jin, Sichun Du

    Published 2021-01-01
    “…Secondly, based on the double entropy source structure, a new image encryption algorithm is proposed. The algorithm uses the diffusion-scrambling-diffusion encryption scheme to realize the conversion from the original plaintext image to the ciphertext image. …”
    Get full text
    Article
  14. 8534

    Dynamic Identification of Critical Transmission Lines in Power Systems With Wind Power Integration Based on Maximum Influence Theory by Gang Ruan, Changzheng Shao, Hao Wang, Yingxu Jin, Lingzi Zhu, Dongxu Chang

    Published 2025-01-01
    “…Based on the influence maximization model in time-sequence cascading faults graph (IMTG), the line fault influence calculation algorithm (LFIC) and improved critical line identification algorithm (ILIT) are proposed to identify the critical transmission lines. …”
    Get full text
    Article
  15. 8535

    Transient Voltage Information Entropy Difference Unit Protection Based on Fault Condition Attribute Fusion by Zhenwei Guo, Ruiqiang Zhao, Zebo Huang, Yongyan Jiang, Haojie Li, Yingcai Deng

    Published 2025-01-01
    “…Finally, the accuracy and reliability of the proposed algorithm were verified by extensive ATP-Draw simulation tests.…”
    Get full text
    Article
  16. 8536

    A novel method of adaptive weighted -nearest neighbor fingerprint indoor positioning considering user’s orientation by Jingxue Bi, Yunjia Wang, Xin Li, Hongji Cao, Hongxia Qi, Yongkang Wang

    Published 2018-06-01
    “…Second, the fuzzy c -means algorithm is used to cluster orientation fingerprint database taking the hybrid distance of the signal domain and position domain as the clustering feature. …”
    Get full text
    Article
  17. 8537

    Collaborative Optimization of Direct Current Distribution Network Based on Scaled Electric Vehicles Charging and Discharging and Soft Open Points Topology Reconfiguration by Yongqiang Kang, Gang Lu, Meng Chen, Xinglong Li, Shuaibing Li

    Published 2025-01-01
    “…The upper and lower models use the multi-objective particle swarm optimization (MOPSO) algorithm and simulated annealing algorithm to jointly optimize the optimal EV discharge power and the optimal SOP access configuration simultaneously. …”
    Get full text
    Article
  18. 8538

    Multiple UAV Swarms Collaborative Firefighting Strategy Considering Forest Fire Spread and Resource Constraints by Pei Zhu, Rui Song, Jiangao Zhang, Ziheng Xu, Yaqi Gou, Zhi Sun, Quan Shao

    Published 2024-12-01
    “…The multiple UAV swarm adaptive information-driven collaborative search (MUSAIDCS) algorithm and the resource-limited firefighting model were established. …”
    Get full text
    Article
  19. 8539

    An Integrated Image Encryption Scheme Based on Elliptic Curve by Ijaz Khalid, Tariq Shah, Sayed M. Eldin, Dawood Shah, Muhammad Asif, Imran Saddique

    Published 2023-01-01
    “…Afterwards, the proposed scheme uses the first 128-bits for the confidentiality of the data, while the remaining 128-bits are for authentication. In the encryption algorithm, the confusion module is achieved by affine power affine transformation. …”
    Get full text
    Article
  20. 8540

    GCL_FCS30: a global coastline dataset with 30-m resolution and a fine classification system from 2010 to 2020 by Jian Zuo, Li Zhang, Jingfeng Xiao, Bowei Chen, Bo Zhang, Yingwen Hu, M. M. Abdullah Al Mamun, Yang Wang, Kaixin Li

    Published 2025-01-01
    “…The coastline extraction employed a combined algorithm incorporating the Modified Normalized Difference Water Index and an adaptive threshold segmentation method. …”
    Get full text
    Article