-
9701
Study on Effect of Consumer Information in Personal Credit Risk Evaluation
Published 2022-01-01“…This study selects Chinese borrowers’ information from a platform that has both online shopping and consumer loan service as sample, studies the effect of consumer information in personal credit risk evaluation, and uses the lLogistic regression model, light gradient boosting machine (LightGBM) algorithm, and Shapley Additive Explanation (SHAP). …”
Get full text
Article -
9702
Research on the evolution of college online public opinion risk based on improved Grey Wolf Optimizer combined with LSTM model.
Published 2025-01-01“…This research proposes a public opinion crisis prediction model that applies the Grey Wolf Optimizer (GWO) algorithm combined with long short-term memory (LSTM) and implements it to analyze a trending topic on Sina Weibo to validate its prediction accuracy. …”
Get full text
Article -
9703
Achieving Network Localizability in Nonlocalizable WSN with Moving Passive Event
Published 2013-10-01“…We design a corresponding algorithm in distributed manner for the implementation of our approach. …”
Get full text
Article -
9704
Optimization Design and Experimental Study of Low-Pressure Axial Fan with Forward-Skewed Blades
Published 2007-01-01“…Using back propagation (BP) neural network and genetic algorithm (GA), the optimization was performed for a radial blade. …”
Get full text
Article -
9705
Multiobjective Day-Ahead Scheduling of Reconfigurable-Based Microgrids Through Electric Vehicles and Demand Response Integration
Published 2025-01-01“…Because of these two compromising objectives, the evolutionary multiobjective seagull optimization algorithm is utilized to find the best local solutions. …”
Get full text
Article -
9706
ATKB-PID: an adaptive control method for micro tension under complex hot rolling conditions
Published 2025-01-01“…This method incorporates a linear attention layer and utilizes a K-Nearest Neighbors (KNN) algorithm to predict the optimal learning rate and inertia coefficient under actual operating conditions. …”
Get full text
Article -
9707
Systems Thinking Safety Analysis: Nuclear Security Assessment of Physical Protection System in Nuclear Power Plants
Published 2013-01-01“…The systems thinking algorithm is used for the quantifications by the Vensim software package. …”
Get full text
Article -
9708
Dispatching Design for Customized Bus of Hybrid Vehicles Based on Reservation Data
Published 2021-01-01“…Finally, a calculation example is designed and the genetic algorithm is used to solve the model. The results show that the hybrid vehicle solution is more reasonable than the traditional single-vehicle solution and reveal that the model is feasible to optimize scheduling plan. …”
Get full text
Article -
9709
A law of meaning
Published 2025-01-01“…We implement the law in an algorithm using Dunning’s log-likelihood and illustrate it by extracting markers for ‘know’, negation, first person subject and complementizers from translations of the New Testament in a variety sample of 83 languages with manual evaluation of all extracted markers. …”
Get full text
Article -
9710
A Novel Method for Identifying Resonance Frequency Band in Weak Bearing Fault Diagnosis of Electric Driving System
Published 2024-01-01“…The modified principle and algorithm flow of the proposed method are derived. …”
Get full text
Article -
9711
Study on Acoustic Emission Localization of Concrete Using Modified Velocity
Published 2019-01-01“…To improve the accuracy of the acoustic emission (AE) source localization, a new 3D AE source localization method was investigated which used a combination of the modified velocity and the 3D localization algorithm based on the exhaustive method. The wave speed has a significant effect on the AE location results. …”
Get full text
Article -
9712
Multiscale network alignment model based on convolution of homogeneous multilayer graphs
Published 2024-12-01“…In terms of node characteristics, the K-nearest neighbor algorithm was used to aggregate node neighborhood information to model the deep network structure, so as to enhance the data. …”
Get full text
Article -
9713
The Manifestation of Stopping Sets and Absorbing Sets as Deviations on the Computation Trees of LDPC Codes
Published 2010-01-01“…The connections between trapping sets and deviations on computation trees are explored in depth using the notion of problematic trapping sets in order to bridge the experimental and analytic approaches to these error mechanisms. A new iterative algorithm for finding low-weight problematic trapping sets is presented and shown to be capable of identifying many trapping sets that are frequently observed during iterative decoding of low-density parity-check codes on the additive white Gaussian noise channel. …”
Get full text
Article -
9714
The power of dialogue and discovery
Published 2018-09-01“…Our classrooms offer algorithmic and rote teaching methods, depriving students of important elements of successful mathematics learning. …”
Get full text
Article -
9715
Comprehensive Evaluation of Talent Growth Factor Index System Based on Hesitant Fuzzy Language
Published 2021-01-01“…The entropy of hesitation fuzzy language terms adopts the algorithm, which calculates the index weights according to the relative entropy values and adjusts the expert weights with the expert group consensus model. …”
Get full text
Article -
9716
Displacement and Force Control of a Quarter Car Using a Mixed Mode MR Mount
Published 2013-01-01“…These simulation results presented a basis for designing an effective algorithm to control both the displacement transmissibility and force transmissibility. …”
Get full text
Article -
9717
The number of nonunimodular roots of a reciprocal polynomial
Published 2023-01-01“…It seems reasonable to believe that if the coefficients are bounded then the analogue of Lehmer’s Conjecture is true: either $L=0$ or there exists a gap so that $L$ could not be arbitrarily close to $0$. We present an algorithm for calculating the limit ratio and a numerical method for its approximation. …”
Get full text
Article -
9718
Passenger Behavior Simulation in Congested Urban Rail Transit System: A Capacity-Limited Optimal Strategy Model for Passenger Assignment
Published 2022-01-01“…We have proposed a simulation-based algorithm to solve the model and apply it to the Beijing Subway to demonstrate the feasibility of the model. …”
Get full text
Article -
9719
Path Planning of Continuum Robot Based on Path Fitting
Published 2020-01-01“…Considering the complexity of calculation and the structural characteristics of Continuum Robot, a feasible obstacle avoidance discrete path is obtained by using the improved RRT algorithm. Then, joint fitting is performed on the existing discrete path according to the kinematic model of Continuum Robot, joint obstacle avoidance was conducted in the process of fitting, and finally, a motion path suitable for the Continuum Robot was selected. …”
Get full text
Article -
9720
Minimum Delay Multipath Routing Based on TDMA for Underwater Acoustic Sensor Network
Published 2016-02-01“…This paper proposes a novel multipath routing structure and a conflict-free algorithm based on TDMA scheme. The forwarding nodes are selected based on the propagation delay and location information. …”
Get full text
Article