Showing 9,661 - 9,680 results of 12,475 for search '"algorithms"', query time: 0.10s Refine Results
  1. 9661

    Parallel RFSAI-BFGS Preconditioners for Large Symmetric Eigenproblems by L. Bergamaschi, A. Martínez

    Published 2013-01-01
    “…The overall RFSAI-BFGS preconditioned Newton algorithm has shown comparable efficiencies with a well-established eigenvalue solver on all the test problems.…”
    Get full text
    Article
  2. 9662

    Seamless Integration of RESTful Services into the Web of Data by Markus Lanthaler, Christian Gütl

    Published 2012-01-01
    “…It also shows how these descriptions along with an algorithm to translate SPARQL queries to HTTP requests can be used to integrate RESTful services into a global read-write Web of Data.…”
    Get full text
    Article
  3. 9663

    Single Feature Extraction Method of Bearing Fault Signals Based on Slope Entropy by Erna Shi

    Published 2022-01-01
    “…Then, some relevant data are computed, and the identification ratios are calculated by the K-nearest neighbor (KNN) algorithm. The experimental result indicated that the identification ratio of SloE is the highest at 97.71% by comparing with the identification ratios of the other five kinds of entropy, which is higher by at least 13.54% than the others and 27.5% higher than the lowest one.…”
    Get full text
    Article
  4. 9664

    Target Tracking with NLOS Detection and Mitigation in Wireless Sensor Networks by Xiaoping Wu, Junguo Hu, Yujia Jiang, Enbin Liu, Guoying Wang

    Published 2013-11-01
    “…Combining the movement equation with observation position, the position of mobile target node can be tracked precisely with Kalman filter algorithm. Using the estimated NLOS range errors, we correct the localization result and modify Kalman filter to mitigate the NLOS propagations. …”
    Get full text
    Article
  5. 9665

    The Application of Speech Synthesis Technology Based on Deep Neural Network in Intelligent Broadcasting by Jihong Yang

    Published 2022-01-01
    “…Further, the scheme for transforming the parameters obtained from the temporary decomposition (TD) algorithm, DNN trains the event vectors obtained from TD decomposition, establishes the transformation model, and recombines with the untransformed event function. …”
    Get full text
    Article
  6. 9666

    Coupled Finite Volume Methods and Extended Finite Element Methods for the Dynamic Crack Propagation Modelling with the Pressurized Crack Surfaces by Shouyan Jiang, Chengbin Du

    Published 2017-01-01
    “…Having constructed the approximation of dynamic extended finite element methods, the derivation of governing equation for dynamic extended finite element methods is presented. The implicit time algorithm is elaborated for the time descritisation of dominant equation. …”
    Get full text
    Article
  7. 9667

    Numerical Treatment of the Model for HIV Infection of CD4+T Cells by Using Multistep Laplace Adomian Decomposition Method by Nurettin Doğan

    Published 2012-01-01
    “…Fourth-order Runge-Kutta method (RK4) is used to evaluate the effectiveness of the proposed algorithm. When we do not know the exact solution of a given problem, generally we use the RK4 method for comparison since it is widely used and accepted. …”
    Get full text
    Article
  8. 9668

    Compactness on Soft Topological Ordered Spaces and Its Application on the Information System by T. M. Al-shami

    Published 2021-01-01
    “…In the end, we provide an algorithm for expecting the missing values of objects on the information system depending on the concept of ordered soft compact spaces.…”
    Get full text
    Article
  9. 9669

    Investigation on SIW Slot Antenna Array with Beam Scanning Ability by Yanfei Li, Yang Li

    Published 2019-01-01
    “…A sparse substrate integrated waveguide (SIW) slot antenna array and its application on phase scanning are studied in this paper. The genetic algorithm is used to optimize the best arrangement for 8-element and 7-element sparse arrays over an aperture of 4.5λ0. …”
    Get full text
    Article
  10. 9670

    Traffic-Aware Data Delivery Scheme for Urban Vehicular Sensor Networks by Chunmei Ma, Nianbo Liu

    Published 2013-01-01
    “…Besides the packet forwarding through intersections, we also propose an improved geographically greedy routing algorithm for packet forwarding in straightway mode. …”
    Get full text
    Article
  11. 9671

    Monitoring Area Coverage Based on Control Multimedia Nodes Position in Mixed Underwater Mobile Wireless Sensor Networks by Qiangyi Li, Ningzhong Liu

    Published 2022-01-01
    “…Simulation results show that this algorithm can improve the coverage effect of mixed wireless sensor networks and reduce the moving distance of mobile nodes.…”
    Get full text
    Article
  12. 9672

    Revolutionizing colorectal cancer detection: A breakthrough in microbiome data analysis. by Mwenge Mulenga, Arutchelvan Rajamanikam, Suresh Kumar, Saharuddin Bin Muhammad, Subha Bhassu, Chandramathi Samudid, Aznul Qalid Md Sabri, Manjeevan Seera, Christopher Ifeanyi Eke

    Published 2025-01-01
    “…This innovative approach markedly enhances the Area Under the Curve (AUC) performance of the Deep Neural Network (DNN) algorithm in colorectal cancer (CRC) detection using gut microbiome data, elevating it from 0.800 to 0.923. …”
    Get full text
    Article
  13. 9673

    Generation and study of the synthetic brain electron microscopy dataset for segmentation purpose by N.A. Sokolov, E.P. Vasiliev, A.A. Getmanskaya

    Published 2023-10-01
    “…In this work, we present an algorithm for the synthesis of 6 types of organelles. …”
    Get full text
    Article
  14. 9674

    A Generalized Decision-Making Technique Based on Bipolar-Valued Multivague Soft Sets by Hanan H. Sakr, Abdisalam Hassan Muse, Ramy Aldallal

    Published 2022-01-01
    “…Finally, a bipolar-valued multivague soft set-designed decision-making algorithm, as well as a real-life example, are discussed generalizing the Roy and Maji method.…”
    Get full text
    Article
  15. 9675

    Energy Analysis in Combined Reforming of Propane by K. Moon, Ganesh R. Kale

    Published 2013-01-01
    “…Thermodynamic equilibrium data for combined reforming was generated for temperature range of 400–1000°C at 1 bar pressure and combined oxidant (CO2 + H2O) stream to propane (fuel) ratio of 3, 6, and 9 by employing the Gibbs free energy minimization algorithm of HSC Chemistry software 5.1. Total energy requirement including preheating and reaction enthalpy calculations were done using the equilibrium product composition. …”
    Get full text
    Article
  16. 9676

    Deepfake Dilemmas: Imagine Tomorrow’s Surveillance Society through Three Scenarios by Fatma Doğan Akkaya

    Published 2024-12-01
    “…Moving beyond technical considerations, the research employs social prediction methods to explore three potential future scenarios involving deepfake avatars: seamless integration that facilitates self-expression but complicates digital identity control; pervasive algorithmic surveillance that exacerbates social control and privacy issues; and the concept of ghost avatars, that is, digital representations that function as commodities or tools of resistance. …”
    Get full text
    Article
  17. 9677

    Numerical Calculations on the Unsteady Aerodynamic Force of the Tilt-Rotor Aircraft in Conversion Mode by Hao Chen

    Published 2019-01-01
    “…The dual time-stepping approach and the finite volume scheme are applied to solve the unsteady N-S equation. A parallel algorithm is utilized in this work to improve the computational efficiency. …”
    Get full text
    Article
  18. 9678

    Feature Selection Using Particle Swarm Optimization in Intrusion Detection by Iftikhar Ahmad

    Published 2015-10-01
    “…Evolutionary optimization approach like genetic algorithm (GA) has been used to search the most discriminative subset of transformed features. …”
    Get full text
    Article
  19. 9679

    A Color-Image Encryption Scheme Using a 2D Chaotic System and DNA Coding by Haidar Raad Shakir

    Published 2019-01-01
    “…The results of simulation and security tests reveal that the proposed algorithm offers robust encryption and demonstrates the ability to resist exhaustive, statistical, and differential attacks.…”
    Get full text
    Article
  20. 9680

    A Two-Level Iterative Node Importance Evaluation of Aircraft Function Modules Based on Influence Matrix by Chang Liu, Jinyan Wang, Kangxing Wang

    Published 2023-01-01
    “…The influence matrix was constructed by using the node access probability calculated by the PageRank algorithm and the function module weight calculated based on centrality. …”
    Get full text
    Article