-
9941
Variational analysis for simulating free-surface flows in a porous medium
Published 2003-01-01“…The matrix characteristics and the stability criteria have been investigated to develop a stable numerical algorithm for solving the governing equation. A computer programme has been written to solve a symmetric positive definite system obtained from the variational finite element analysis. …”
Get full text
Article -
9942
Qualitative Reasoning for Quantitative Simulation
Published 2018-01-01“…In the approach, qualitative simulation determined landmark points to be advanced, and quantitative simulation calculated the duration required. Using the proposed algorithm, the simulation is advanced instead of iterating simulation time for a predefined time step and checking whether or not there is any activity in the interval, directly to the time points that are qualitatively different.…”
Get full text
Article -
9943
Waypoint Tracking Control for Autonomous Mobile Sampling and Dissolved Oxygen Enrichment of Unmanned Surface Vehicle
Published 2022-01-01“…Through setting a series of monitoring target points and monitoring parameters in the configuration software of the remote user terminal or in the APP of the mobile user terminal, the USV can realize the automatic cruise monitoring using an autonomous navigation and tracking control algorithm, and quantitative water sampling collection. …”
Get full text
Article -
9944
A visual-physiology multimodal system for detecting outlier behavior of participants in a reality TV show
Published 2019-07-01“…We also suggest a dynamic time warp-based clustering algorithm for the outlier and micro-expression detection technique. …”
Get full text
Article -
9945
Identification of Modal Parameters for Reinforcement of Walls in Earthen Ruins
Published 2021-01-01“…The wall vibrations caused by ambient actions were analyzed using the stochastic subspace algorithm to estimate the modal parameters of the wall. …”
Get full text
Article -
9946
Multi-Instance Contingent Fusion for the Verification of Infant Fingerprints
Published 2024-01-01“…The sum-score fusion algorithm was implemented. The approach mentioned above yielded verification accuracies of 73.8%, 69.05%, and 57.14% for time intervals of 1 month, 3 months, and 6 months, respectively, between the enrolment and query fingerprints.…”
Get full text
Article -
9947
Application of federated learning in predicting breast cancer
Published 2025-01-01“…Subsequently, each participant then sends the updated model parameters to the central server, where the FedAvg algorithm combines them to produce a global model. …”
Get full text
Article -
9948
Strategic issues of raising international financing
Published 2022-07-01“…For the solution of one of the key strategic goals of corporate finance – execution of mergers and acquisitions transactions – we present an algorithm of raising financing by using syndicated loans and eurobonds.…”
Get full text
Article -
9949
Energy-Efficient Robust Control for Direct Drive and Energy Recuperation Hydraulic Servo System
Published 2020-01-01“…Moreover, the optimized parameters are obtained by the simulated annealing algorithm. To further reduce the energy consumption, the variable supply pressure control circuit is introduced into the system. …”
Get full text
Article -
9950
Relationship between Green Financing and Investment Logic and Effectiveness Evaluation of Financing Decisions
Published 2022-01-01“…Specifically, a decision model was established for the government participation in green financing via green product subsidy, and a solving algorithm was developed for the model. After that, the authors analyzed the correlations of green financing with the investment level and investment efficiency of green enterprises. …”
Get full text
Article -
9951
Design Methodology of a New Wavelet Basis Function for Fetal Phonocardiographic Signals
Published 2013-01-01“…In this work, a novel algorithm based on wavelet transform has been developed for denoising of fPCG signals. …”
Get full text
Article -
9952
Multiple-Feature Extracting Modules Based Leak Mining System Design
Published 2013-01-01“…In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. In addition, we analyze portal sites of the governments of various countries or regions in order to investigate the information leaking status of each site. …”
Get full text
Article -
9953
The Evidence of Cooperative Binding of a Ligand to G4 DNA
Published 2017-01-01“…The cross-validation between a new hard + soft modelling and conventional stepwise complex formation algorithm has been conducted. A number of simulated examples will illustrate the methodology. …”
Get full text
Article -
9954
Stochastic Generation of Subsurface Profiles for Realistic Simulation of Through-the-Earth Communication Systems
Published 2019-01-01“…Given the difficulties in implementing underground measurements taking years to achieve enough database for a variety of mines and depths, we propose, as a more versatile solution, realistic simulations of a variety of underground structures to statistically characterize magnetic field attenuation. An algorithm based on the Monte Carlo method is presented and uses the Finite Element Method (FEM) to compute field propagation through each random structure. …”
Get full text
Article -
9955
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs
Published 2024-01-01“…To address these requirements, we propose a threshold elliptic curve digital signature algorithm that counters malicious adversaries in environments with three or more participants. …”
Get full text
Article -
9956
Fuzzy-Based Adaptive Countering Method against False Endorsement Insertion Attacks in Wireless Sensor Networks
Published 2015-07-01“…A major benefit of the proposed method is that the fuzzy systems can be optimized automatically by combining a genetic algorithm and a simulation. Thus, users only need to write a model of the WSN to apply the proposed method to a WSN. …”
Get full text
Article -
9957
Optimal Policies for the Pricing and Replenishment of Fashion Apparel considering the Effect of Fashion Level
Published 2019-01-01“…First, we provide a framework for fashion apparel by formulating a model that includes both price and demand at different fashion levels. We then provide an algorithm to derive the optimal dynamic pricing strategy and replenishment cycle. …”
Get full text
Article -
9958
An active detection of compromised nodes based on en-route trap in wireless sensor network
Published 2021-08-01“…A trust model is used to evaluate trust level of neighbor nodes with respect to their authentication behaviors. A detecting algorithm of compromised node is used to detect compromised nodes. …”
Get full text
Article -
9959
From Incoherence to Sustainability: Performance, Activism, and Social Media in the Most Recent Russian Poetry
Published 2024-10-01“…The central hypothesis of this article is that all of these poets react differently to the methods of discursive organization provided (and enforced) by social networks and strive in different ways to liberate themselves from the censorship of the algorithm: some emphasize the discursive incoherence of the platform, while others, on the contrary, seek to develop a sustainable manner of uniting private discourses into a new totality. …”
Get full text
Article -
9960
Human Position Detection Based on Depth Camera Image Information in Mechanical Safety
Published 2022-01-01“…Meanwhile, a human position detection method based on Intel RealSense depth camera and MobileNet-SSD algorithm is proposed and applied to robot safety protection. …”
Get full text
Article