-
9661
Parallel RFSAI-BFGS Preconditioners for Large Symmetric Eigenproblems
Published 2013-01-01“…The overall RFSAI-BFGS preconditioned Newton algorithm has shown comparable efficiencies with a well-established eigenvalue solver on all the test problems.…”
Get full text
Article -
9662
Seamless Integration of RESTful Services into the Web of Data
Published 2012-01-01“…It also shows how these descriptions along with an algorithm to translate SPARQL queries to HTTP requests can be used to integrate RESTful services into a global read-write Web of Data.…”
Get full text
Article -
9663
Single Feature Extraction Method of Bearing Fault Signals Based on Slope Entropy
Published 2022-01-01“…Then, some relevant data are computed, and the identification ratios are calculated by the K-nearest neighbor (KNN) algorithm. The experimental result indicated that the identification ratio of SloE is the highest at 97.71% by comparing with the identification ratios of the other five kinds of entropy, which is higher by at least 13.54% than the others and 27.5% higher than the lowest one.…”
Get full text
Article -
9664
Target Tracking with NLOS Detection and Mitigation in Wireless Sensor Networks
Published 2013-11-01“…Combining the movement equation with observation position, the position of mobile target node can be tracked precisely with Kalman filter algorithm. Using the estimated NLOS range errors, we correct the localization result and modify Kalman filter to mitigate the NLOS propagations. …”
Get full text
Article -
9665
The Application of Speech Synthesis Technology Based on Deep Neural Network in Intelligent Broadcasting
Published 2022-01-01“…Further, the scheme for transforming the parameters obtained from the temporary decomposition (TD) algorithm, DNN trains the event vectors obtained from TD decomposition, establishes the transformation model, and recombines with the untransformed event function. …”
Get full text
Article -
9666
Coupled Finite Volume Methods and Extended Finite Element Methods for the Dynamic Crack Propagation Modelling with the Pressurized Crack Surfaces
Published 2017-01-01“…Having constructed the approximation of dynamic extended finite element methods, the derivation of governing equation for dynamic extended finite element methods is presented. The implicit time algorithm is elaborated for the time descritisation of dominant equation. …”
Get full text
Article -
9667
Numerical Treatment of the Model for HIV Infection of CD4+T Cells by Using Multistep Laplace Adomian Decomposition Method
Published 2012-01-01“…Fourth-order Runge-Kutta method (RK4) is used to evaluate the effectiveness of the proposed algorithm. When we do not know the exact solution of a given problem, generally we use the RK4 method for comparison since it is widely used and accepted. …”
Get full text
Article -
9668
Compactness on Soft Topological Ordered Spaces and Its Application on the Information System
Published 2021-01-01“…In the end, we provide an algorithm for expecting the missing values of objects on the information system depending on the concept of ordered soft compact spaces.…”
Get full text
Article -
9669
Investigation on SIW Slot Antenna Array with Beam Scanning Ability
Published 2019-01-01“…A sparse substrate integrated waveguide (SIW) slot antenna array and its application on phase scanning are studied in this paper. The genetic algorithm is used to optimize the best arrangement for 8-element and 7-element sparse arrays over an aperture of 4.5λ0. …”
Get full text
Article -
9670
Traffic-Aware Data Delivery Scheme for Urban Vehicular Sensor Networks
Published 2013-01-01“…Besides the packet forwarding through intersections, we also propose an improved geographically greedy routing algorithm for packet forwarding in straightway mode. …”
Get full text
Article -
9671
Monitoring Area Coverage Based on Control Multimedia Nodes Position in Mixed Underwater Mobile Wireless Sensor Networks
Published 2022-01-01“…Simulation results show that this algorithm can improve the coverage effect of mixed wireless sensor networks and reduce the moving distance of mobile nodes.…”
Get full text
Article -
9672
Revolutionizing colorectal cancer detection: A breakthrough in microbiome data analysis.
Published 2025-01-01“…This innovative approach markedly enhances the Area Under the Curve (AUC) performance of the Deep Neural Network (DNN) algorithm in colorectal cancer (CRC) detection using gut microbiome data, elevating it from 0.800 to 0.923. …”
Get full text
Article -
9673
Generation and study of the synthetic brain electron microscopy dataset for segmentation purpose
Published 2023-10-01“…In this work, we present an algorithm for the synthesis of 6 types of organelles. …”
Get full text
Article -
9674
A Generalized Decision-Making Technique Based on Bipolar-Valued Multivague Soft Sets
Published 2022-01-01“…Finally, a bipolar-valued multivague soft set-designed decision-making algorithm, as well as a real-life example, are discussed generalizing the Roy and Maji method.…”
Get full text
Article -
9675
Energy Analysis in Combined Reforming of Propane
Published 2013-01-01“…Thermodynamic equilibrium data for combined reforming was generated for temperature range of 400–1000°C at 1 bar pressure and combined oxidant (CO2 + H2O) stream to propane (fuel) ratio of 3, 6, and 9 by employing the Gibbs free energy minimization algorithm of HSC Chemistry software 5.1. Total energy requirement including preheating and reaction enthalpy calculations were done using the equilibrium product composition. …”
Get full text
Article -
9676
Deepfake Dilemmas: Imagine Tomorrow’s Surveillance Society through Three Scenarios
Published 2024-12-01“…Moving beyond technical considerations, the research employs social prediction methods to explore three potential future scenarios involving deepfake avatars: seamless integration that facilitates self-expression but complicates digital identity control; pervasive algorithmic surveillance that exacerbates social control and privacy issues; and the concept of ghost avatars, that is, digital representations that function as commodities or tools of resistance. …”
Get full text
Article -
9677
Numerical Calculations on the Unsteady Aerodynamic Force of the Tilt-Rotor Aircraft in Conversion Mode
Published 2019-01-01“…The dual time-stepping approach and the finite volume scheme are applied to solve the unsteady N-S equation. A parallel algorithm is utilized in this work to improve the computational efficiency. …”
Get full text
Article -
9678
Feature Selection Using Particle Swarm Optimization in Intrusion Detection
Published 2015-10-01“…Evolutionary optimization approach like genetic algorithm (GA) has been used to search the most discriminative subset of transformed features. …”
Get full text
Article -
9679
A Color-Image Encryption Scheme Using a 2D Chaotic System and DNA Coding
Published 2019-01-01“…The results of simulation and security tests reveal that the proposed algorithm offers robust encryption and demonstrates the ability to resist exhaustive, statistical, and differential attacks.…”
Get full text
Article -
9680
A Two-Level Iterative Node Importance Evaluation of Aircraft Function Modules Based on Influence Matrix
Published 2023-01-01“…The influence matrix was constructed by using the node access probability calculated by the PageRank algorithm and the function module weight calculated based on centrality. …”
Get full text
Article