Showing 9,201 - 9,220 results of 12,475 for search '"algorithms"', query time: 0.07s Refine Results
  1. 9201

    Measurement Feedback Self-Tuning Weighted Measurement Fusion Kalman Filter for Systems with Correlated Noises by Xin Wang, Shu-Li Sun

    Published 2012-01-01
    “…The simulation result of radar-tracking system shows the effectiveness of the presented algorithm.…”
    Get full text
    Article
  2. 9202

    Distributed Filter with Consensus Strategies for Sensor Networks by Xie Li, Huang Caimou, Hu Haoji

    Published 2013-01-01
    “…Consensus algorithm for networked dynamic systems is an important research problem for data fusion in sensor networks. …”
    Get full text
    Article
  3. 9203

    The municipalities’ environmental situation assessment as a basis for customizing strategies by P. S. Trifonova

    Published 2022-12-01
    “…The article presents the author’s approach to assessing the tension of the ecological situation of the territories, which makes it possible to identify the most acute environmental problems. A multi-stage algorithm for calculating a complex and integral indicator of the intensity of the ecological situation of territories is proposed. …”
    Get full text
    Article
  4. 9204

    Face Recognition Method Based on Fuzzy 2DPCA by Xiaodong Li

    Published 2014-01-01
    “…In order to improve the recognition performance of the traditional 2DPCA, a new 2DPCA algorithm based on the fuzzy theory is proposed in this paper, namely, the fuzzy 2DPCA (F2DPCA). …”
    Get full text
    Article
  5. 9205

    Abel–Goncharov Type Multiquadric Quasi-Interpolation Operators with Higher Approximation Order by Ruifeng Wu

    Published 2021-01-01
    “…Furthermore, the advantage of our method is that the associated algorithm is very simple and easy to implement.…”
    Get full text
    Article
  6. 9206

    Analysis of Multimedia Teaching Path of Popular Music Based on Multiple Intelligence Teaching Mode by Dongfang Wang

    Published 2022-01-01
    “…In the stage of music audio segmentation, the deep belief network algorithm is used to accurately carry out music multimedia teaching. …”
    Get full text
    Article
  7. 9207

    BUCKLING OF BEAMS WITH A BOUNDARY ELEMENT TECHNIQUE by ABDERRAZEK MESSAOUDI, LASZLO PETER KISS

    Published 2022-09-01
    “…The eigenvalue issues can be reduced to algebraic eigenvalue problems, which are subsequently solvable numerically with the use of an efficient algorithm from the boundary element method. Within this article, the critical load findings of these beams are compared to those obtained using commercial finite element software, and the results are in excellent correlation. …”
    Get full text
    Article
  8. 9208

    WmFall: WiFi-based multistage fall detection with channel state information by Xu Yang, Fangyuan Xiong, Yuan Shao, Qiang Niu

    Published 2018-10-01
    “…Considering that falling and sitting are very similar to each other, a special method is designed for distinguishing them with deep learning algorithm. Finally, the fall detection system is evaluated in a laboratory, which has 89% detection precision with false alarm rate of 8% on the average.…”
    Get full text
    Article
  9. 9209

    Optimal Allocation of Shared Manufacturing Resources Based on Bilevel Programming by Peng Liu, Caiyun Liu, Xiaoling Wei

    Published 2021-01-01
    “…The weights of the upper indicators are determined by Analytic Hierarchy Process (AHP) and Improved Order Relation Analysis (Improved G1) combination weighting method and the bilevel programming model is solved by the Improved Fast Elitist Non-Dominated Sorting Genetic Algorithm (Improved NSGA-II). Finally, the effectiveness of the model is validated by a numerical example.…”
    Get full text
    Article
  10. 9210

    Similarity Property and Slide Attack of Block Cipher FESH by Yafei Zheng, Wenling Wu

    Published 2023-01-01
    “…Taking FESH, an award-winning block cipher of the National Cryptographic Algorithm Design Competition 2019, as an example, similarity properties of the encryption and key transformation are found, owing to the similar structures that the encryption and key transformation adopted, and the constants generation. …”
    Get full text
    Article
  11. 9211

    Development of the conceptual and terminological apparatus of warehousing logistics in the works of Russian and foreign authors by M. Yu. Uchirova, A. N. Larina

    Published 2022-07-01
    “…The main approaches to the basic concepts of warehousing logistics in the works of russian and foreign authors are considered. the peculiarities of understanding the terms “warehouse”, “warehousing”, “warehousing system” are revealed. the main historical stages of the development of warehouses and storage facilities are reflected. based on the information provided, the following key features are highlighted: the warehouse is a complex system with its own interconnections and internal processes; a modern warehouse economy should be formed according to an optimized logistics system, of which it is a part, and be able to adapt to the slightest fluctuations and changes in this system; difficulties arising in the field of building a warehousing system can be solved with the help of a competently and clearly developed warehouse model based on the application of a logistics approach and the development of an adaptive warehouse management algorithm.…”
    Get full text
    Article
  12. 9212

    Comparison of Quadratic– and Median-Based Roughness Penalties for Penalized-Likelihood Sinogram Restoration in Computed Tomography

    Published 2006-01-01
    “…Since the quadratic penalty allows for derivation of an algorithm that is guaranteed to monotonically increase the penalized-likelihood objective function, we find it to be preferable to the median-based penalty.…”
    Get full text
    Article
  13. 9213

    Obfuscation of combination circuits of digital devices from unauthorized access by L. A. Zolotorevich

    Published 2019-09-01
    “…We consider the formation of a common approach to solving problems of control and verification in the design of modern integrated circuits based on the analysis of fault models of structural realizations of digital devices, errors arising in the design process, as well as deliberate distortions during the design and manufacturing stages, i. e. creation and development of taxonomy of possible deviations in the project. The algorithm of logical obfuscation and coding of digital structures based on the use of methods and means of test diagnostics is proposed.…”
    Get full text
    Article
  14. 9214

    Extending the Root-Locus Method to Fractional-Order Systems by Farshad Merrikh-Bayat, Mahdi Afshar

    Published 2008-01-01
    “…Three illustrative examples are presented to confirm the effectiveness of the proposed algorithm.…”
    Get full text
    Article
  15. 9215

    Robust secure design for relay wireless sensor networks with simultaneous wireless information and power transfer by Hehao Niu, Bangning Zhang, Daoxing Guo, Mingyue Lu

    Published 2017-06-01
    “…By studying the hidden convexity of the problem, we propose an iterative algorithm combining semi-definite relaxation and a gradient-based method. …”
    Get full text
    Article
  16. 9216

    Research on Green Transport Mode of Chinese Bulk Cargo Based on Fourth-Party Logistics by Jixiao Wu, Yinghui Wang, Wenlu Li, Haixia Wu

    Published 2021-01-01
    “…This paper improves the particle swarm optimization algorithm to compare the integrated cost and carbon emissions of different bulk fourth-party transport networks to verify the benefits of the fourth-party logistics on bulk cargo transport networks’ cost reduction and emission reduction. …”
    Get full text
    Article
  17. 9217

    Location Strategy for Traffic Emission Remote Sensing Monitors to Capture the Violated Emissions by Mahmoud Owais

    Published 2019-01-01
    “…The problem is formulated into a graph theory problem, and then a novel adapted metaheuristic algorithm is used to solve the problem. The methodology, using a benchmark problem, has managed to solve the problem to the optimality. …”
    Get full text
    Article
  18. 9218

    MND for Helping People with Different Disabilities by Wael Hosny Fouad Aly

    Published 2014-07-01
    “…Smart phones are used to communicate with the sensor nodes to take instructions to navigate through the appropriate path. Dijkstra's algorithm is used for navigation. MND WSN also monitors the disabled person while navigating. …”
    Get full text
    Article
  19. 9219

    Robust H∞ Control of DC Motor in the Presence of Input Delay and Disturbance by the Predictor-Based Method by Nima Maleki, Elahe Moradi

    Published 2022-01-01
    “…The first-order model of a DC motor has been studied previously using PID and STA (super twisting algorithm) methods. However, in this paper, the delay-dependent robust H∞  controller is used on both the first and second orders of the DC motor. …”
    Get full text
    Article
  20. 9220

    An Intelligent Traffic Flow Control System Based on Radio Frequency Identification and Wireless Sensor Networks by Kuei-Hsiang Chao, Pi-Yun Chen

    Published 2014-05-01
    “…At the same time, the sensor analyzes and judges the information using an extension algorithm designed to achieve the objective of controlling the flow of traffic. …”
    Get full text
    Article