Showing 9,081 - 9,100 results of 12,475 for search '"algorithms"', query time: 0.06s Refine Results
  1. 9081

    Fully Discrete Finite Element Approximation for the Stabilized Gauge-Uzawa Method to Solve the Boussinesq Equations by Jae-Hong Pyo

    Published 2013-01-01
    “…The stabilized Gauge-Uzawa method (SGUM), which is a 2nd-order projection type algorithm used to solve Navier-Stokes equations, has been newly constructed in the work of Pyo, 2013. …”
    Get full text
    Article
  2. 9082

    Active stabilization of a chaotic urban system by Günter Haag, Tilo Hagel, Timm Sigg

    Published 1997-01-01
    “…Therefore, the system and its parameters are changed during the control process only. The algorithm is applied to an urban system within a metropolitan area obeying a Lorenz-type dynamics as well as to the Hénon attractor as an example for a discrete scenario.…”
    Get full text
    Article
  3. 9083

    Detection of Fuzzy Association Rules by Fuzzy Transforms by Ferdinando Di Martino, Salvatore Sessa

    Published 2012-01-01
    “…In the extraction of the fuzzy association rules we use the AprioriGen algorithm and a confidence index calculated via the inverse fuzzy transform. …”
    Get full text
    Article
  4. 9084

    A New Technique for Solving Neutral Delay Differential Equations Based on Euler Wavelets by Mutaz Mohammad, Alexander Trounev

    Published 2022-01-01
    “…Based on the operational matrix, the neutral delay differential equations are reduced to a system of algebraic equations, which is solved through a numerical algorithm. The effectiveness and efficiency of the technique have been illustrated by several examples of neutral delay differential equations. …”
    Get full text
    Article
  5. 9085

    Determination of symmetry plane on human brain CT images by Darius Grigaitis, Mečys Meilūnas

    Published 2023-11-01
    “… A method of automatic detection of human brain symmetry plain in computed tomography (CT) images is  described. An algorithm consists of four steps: region of interest, symmetry curve detection, symmetry axis evaluation and calculation of symmetry plane. …”
    Get full text
    Article
  6. 9086

    Optimization and Performance Analysis of Rail-Train Coupling System with Inerters by Shichang Han, Xian Wang, Chunxi Yang, Guowei Xie, Zhongcheng Qiu, Chen Wang

    Published 2021-01-01
    “…Optimizations for only inertance and all suspension parameters are carried out by the particle swarm algorithm (PSO). Performance benefits for both the train and the rail system are demonstrated and suspension layouts with inerters connected in parallel and series are compared with the traditional one in both time domain and frequency domain.…”
    Get full text
    Article
  7. 9087

    A characterisation of higher torsion classes by Jenny August, Johanne Haugland, Karin M. Jacobsen, Sondre Kvamme, Yann Palu, Hipolito Treffinger

    Published 2025-01-01
    “…Moreover, we use the characterisation to classify the d-torsion classes associated to higher Auslander algebras of type $\mathbb {A}$ , and give an algorithm to compute them explicitly. The classification is furthermore extended to the setup of higher Nakayama algebras.…”
    Get full text
    Article
  8. 9088

    A Study on Coastline Extraction and Its Trend Based on Remote Sensing Image Data Mining by Yun Zhang, Xueming Li, Jianli Zhang, Derui Song

    Published 2013-01-01
    “…These results show that it is an effective method for carrying out the pretreatment of low-precision remote sensing images by multisource image matching algorithm with SIFT operator, geometric correction on satellite images at scarce control points, and other techniques; the result of the coastline extracted by the edge detection method based on a chromatic aberration Canny operator has a height coincident with the actual measured result; we found that the coastline length of China is predicted to increase in the future by using the grey prediction method, with the total length reaching up to 19,471,983 m by 2015.…”
    Get full text
    Article
  9. 9089

    Analysis of Distributed Wireless Sensor Systems with a Switched Quantizer by Hui Sun, Xianyu Wang, Kaixin Yang, Tongrui Peng

    Published 2021-01-01
    “…The proposed estimator based on switched quantitative event-triggered Kalman consensus filtering (KCF) algorithm is used to monitor the aircraft cabin environmental parameters when suffering packet loss and path loss issues during the communication process for WSN. …”
    Get full text
    Article
  10. 9090

    A Comparative Study on TIBA Imputation Methods in FCMdd-Based Linear Clustering with Relational Data by Takeshi Yamamoto, Katsuhiro Honda, Akira Notsu, Hidetomo Ichihashi

    Published 2011-01-01
    “…Relational fuzzy clustering has been developed for extracting intrinsic cluster structures of relational data and was extended to a linear fuzzy clustering model based on Fuzzy c-Medoids (FCMdd) concept, in which Fuzzy c-Means-(FCM-) like iterative algorithm was performed by defining linear cluster prototypes using two representative medoids for each line prototype. …”
    Get full text
    Article
  11. 9091

    Generalized Mixed Equilibrium Problems and Fixed Point Problem for a Countable Family of Total Quasi-ϕ-Asymptotically Nonexpansive Mappings in Banach Spaces by Jinhua Zhu, Shih-Sen Chang, Min Liu

    Published 2012-01-01
    “…The purpose of this paper is first to introduce the concept of total quasi-ϕ-asymptotically nonexpansive mapping which contains many kinds of mappings as its special cases and then to use a hybrid algorithm to introduce a new iterative scheme for finding a common element of the set of solutions for a system of generalized mixed equilibrium problems and the set of common fixed points for a countable family of total quasi-ϕ-asymptotically nonexpansive mappings. …”
    Get full text
    Article
  12. 9092

    Improvement of the Nonparametric Estimation of Functional Stationary Time Series Using Yeo-Johnson Transformation with Application to Temperature Curves by Sameera Abdulsalam Othman, Haithem Taha Mohammed Ali

    Published 2021-01-01
    “…In this article, Box-Cox and Yeo-Johnson transformation models are applied to two time series datasets of monthly temperature averages to improve the forecast ability. An application algorithm was proposed to transform the positive original responses using the first model and the stationary responses using the second model to improve the nonparametric estimation of the functional time series. …”
    Get full text
    Article
  13. 9093

    A four-primary-color micro-LED display with wide color gamut, low blue light hazard, and promise to improve working efficiency in the working conditions by Peiyu Sun, Min Min, Qingfeng Wu, Weijun Huang, Qing Xiao, Wei Xiao, Chaodan Zheng

    Published 2025-01-01
    “…In this study, we use genetic algorithm to search the displays satisfying the demands of health, wide color gamut, and promise to improve working efficiency in the working conditions, when the correlated color temperature is around 6500 K. …”
    Get full text
    Article
  14. 9094

    H∞ Estimation for a Class of Lipschitz Nonlinear Discrete-Time Systems with Time Delay by Huihong Zhao, Chenghui Zhang, Guangchen Wang, Guojing Xing

    Published 2011-01-01
    “…Finally, through guaranteeing the positivity of the minimum, a sufficient condition for the existence of the H∞ estimator is proposed and the estimator is derived in terms of Riccati-like difference equations. The proposed algorithm is proved to be effective by a numerical example.…”
    Get full text
    Article
  15. 9095

    The Hermitian -Conjugate Generalized Procrustes Problem by Hai-Xia Chang, Xue-Feng Duan, Qing-Wen Wang

    Published 2013-01-01
    “…The representation of the corresponding optimal approximation problem is presented. Finally, an algorithm for solving two problems above is proposed, and the numerical examples show its feasibility.…”
    Get full text
    Article
  16. 9096

    Groebner Bases Based Verification Solution for SystemVerilog Concurrent Assertions by Ning Zhou, Xinyan Gao, Jinzhao Wu, Jianchao Wei, Dakui Li

    Published 2014-01-01
    “…We define a constrained subset of SVAs so that an efficient polynomial modeling mechanism for both circuit descriptions and assertions can be applied. We present an algorithm framework based on the algebraic representations using Groebner bases for concurrent SVAs checking. …”
    Get full text
    Article
  17. 9097

    Exact Interior Reconstruction with Cone-Beam CT by Yangbo Ye, Hengyong Yu, Ge Wang

    Published 2007-01-01
    “…The available projection onto convex set (POCS) algorithm and singular value decomposition (SVD) method can be applied to perform the exact interior reconstruction. …”
    Get full text
    Article
  18. 9098

    Mission Planning Issues of Imaging Satellites: Summary, Discussion, and Prospects by Guohui Zhang, Xinhong Li, Gangxuan Hu, Zhibin Zhang, Jiping An, Wanxin Man

    Published 2021-01-01
    “…By analyzing the existing research results, we can know that the research on task planning mainly focuses on three aspects: research objects, established model, and solution algorithm. Starting from these three aspects vertically and then horizontally, this paper comprehensively discusses the theoretical basis, application, and advantages and disadvantages of related technologies in the research literature in recent years. …”
    Get full text
    Article
  19. 9099

    DISTRIBUTION OF ADDITIONAL COST AND PROFIT AS THE DECISION-MAKING FACTOR FOR THE INVESTMENT PROJECT by A. Kuznetsov

    Published 2017-10-01
    “…The research presents the scheme and algorithm for pricing structure analysis, which can be performed on the stage of investment project development as well as on any of the execution stages.…”
    Get full text
    Article
  20. 9100

    Smart Approach for Botnet Detection Based on Network Traffic Analysis by Alaa Obeidat, Rola Yaqbeh

    Published 2022-01-01
    “…In this article, we suggest a method for identifying the behavior of data traffic using machine learning classifiers including genetic algorithm to detect botnet activities. By categorizing behavior based on time slots, we investigate the viability of detecting botnet behavior without seeing a whole network data flow. …”
    Get full text
    Article