Showing 9,941 - 9,960 results of 12,475 for search '"algorithms"', query time: 0.08s Refine Results
  1. 9941

    Variational analysis for simulating free-surface flows in a porous medium by Shabbir Ahmed, Charles Collins

    Published 2003-01-01
    “…The matrix characteristics and the stability criteria have been investigated to develop a stable numerical algorithm for solving the governing equation. A computer programme has been written to solve a symmetric positive definite system obtained from the variational finite element analysis. …”
    Get full text
    Article
  2. 9942

    Qualitative Reasoning for Quantitative Simulation by Mehmet Fatih Hocaoğlu

    Published 2018-01-01
    “…In the approach, qualitative simulation determined landmark points to be advanced, and quantitative simulation calculated the duration required. Using the proposed algorithm, the simulation is advanced instead of iterating simulation time for a predefined time step and checking whether or not there is any activity in the interval, directly to the time points that are qualitatively different.…”
    Get full text
    Article
  3. 9943

    Waypoint Tracking Control for Autonomous Mobile Sampling and Dissolved Oxygen Enrichment of Unmanned Surface Vehicle by Jian Yuan, Hailin Liu, Wenxia Zhang

    Published 2022-01-01
    “…Through setting a series of monitoring target points and monitoring parameters in the configuration software of the remote user terminal or in the APP of the mobile user terminal, the USV can realize the automatic cruise monitoring using an autonomous navigation and tracking control algorithm, and quantitative water sampling collection. …”
    Get full text
    Article
  4. 9944

    A visual-physiology multimodal system for detecting outlier behavior of participants in a reality TV show by Shinjin Kang, Donggyun Kim, Youngbin Kim

    Published 2019-07-01
    “…We also suggest a dynamic time warp-based clustering algorithm for the outlier and micro-expression detection technique. …”
    Get full text
    Article
  5. 9945

    Identification of Modal Parameters for Reinforcement of Walls in Earthen Ruins by Bei Liu, Yucheng Shi, Kun Liu, Tao Li, Shaopeng Wang

    Published 2021-01-01
    “…The wall vibrations caused by ambient actions were analyzed using the stochastic subspace algorithm to estimate the modal parameters of the wall. …”
    Get full text
    Article
  6. 9946

    Multi-Instance Contingent Fusion for the Verification of Infant Fingerprints by Tiwalade O. Odu, Moses O. Olaniyan, Tokunbo Ogunfunmi, Isaac A. Samuel, Joke A. Badejo, Aderemi A. Atayero

    Published 2024-01-01
    “…The sum-score fusion algorithm was implemented. The approach mentioned above yielded verification accuracies of 73.8%, 69.05%, and 57.14% for time intervals of 1 month, 3 months, and 6 months, respectively, between the enrolment and query fingerprints.…”
    Get full text
    Article
  7. 9947

    Application of federated learning in predicting breast cancer by Chai Jiarui

    Published 2025-01-01
    “…Subsequently, each participant then sends the updated model parameters to the central server, where the FedAvg algorithm combines them to produce a global model. …”
    Get full text
    Article
  8. 9948

    Strategic issues of raising international financing by A. A. Tarasov

    Published 2022-07-01
    “…For the solution of one of the key strategic goals of corporate finance – execution of mergers and acquisitions transactions – we present an algorithm of raising financing by using syndicated loans and eurobonds.…”
    Get full text
    Article
  9. 9949

    Energy-Efficient Robust Control for Direct Drive and Energy Recuperation Hydraulic Servo System by Weiping Wang, Jiyun Zhao

    Published 2020-01-01
    “…Moreover, the optimized parameters are obtained by the simulated annealing algorithm. To further reduce the energy consumption, the variable supply pressure control circuit is introduced into the system. …”
    Get full text
    Article
  10. 9950

    Relationship between Green Financing and Investment Logic and Effectiveness Evaluation of Financing Decisions by Lei Kong, Yu Lei, Qian Zhang, Jing Zhang, Xingzhi Guo, Daoyuan Shi

    Published 2022-01-01
    “…Specifically, a decision model was established for the government participation in green financing via green product subsidy, and a solving algorithm was developed for the model. After that, the authors analyzed the correlations of green financing with the investment level and investment efficiency of green enterprises. …”
    Get full text
    Article
  11. 9951

    Design Methodology of a New Wavelet Basis Function for Fetal Phonocardiographic Signals by Vijay S. Chourasia, Anil Kumar Tiwari

    Published 2013-01-01
    “…In this work, a novel algorithm based on wavelet transform has been developed for denoising of fPCG signals. …”
    Get full text
    Article
  12. 9952

    Multiple-Feature Extracting Modules Based Leak Mining System Design by Ying-Chiang Cho, Jen-Yi Pan

    Published 2013-01-01
    “…In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. In addition, we analyze portal sites of the governments of various countries or regions in order to investigate the information leaking status of each site. …”
    Get full text
    Article
  13. 9953

    The Evidence of Cooperative Binding of a Ligand to G4 DNA by A. G. Kudrev

    Published 2017-01-01
    “…The cross-validation between a new hard + soft modelling and conventional stepwise complex formation algorithm has been conducted. A number of simulated examples will illustrate the methodology. …”
    Get full text
    Article
  14. 9954

    Stochastic Generation of Subsurface Profiles for Realistic Simulation of Through-the-Earth Communication Systems by Josua Daniel Pena Carreno, A. Judson De Barros Braga

    Published 2019-01-01
    “…Given the difficulties in implementing underground measurements taking years to achieve enough database for a variety of mines and depths, we propose, as a more versatile solution, realistic simulations of a variety of underground structures to statistically characterize magnetic field attenuation. An algorithm based on the Monte Carlo method is presented and uses the Finite Element Method (FEM) to compute field propagation through each random structure. …”
    Get full text
    Article
  15. 9955

    An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs by Jing Wang, Xue Yuan, Yingjie Xu, Yudi Zhang

    Published 2024-01-01
    “…To address these requirements, we propose a threshold elliptic curve digital signature algorithm that counters malicious adversaries in environments with three or more participants. …”
    Get full text
    Article
  16. 9956

    Fuzzy-Based Adaptive Countering Method against False Endorsement Insertion Attacks in Wireless Sensor Networks by Hae Young Lee

    Published 2015-07-01
    “…A major benefit of the proposed method is that the fuzzy systems can be optimized automatically by combining a genetic algorithm and a simulation. Thus, users only need to write a model of the WSN to apply the proposed method to a WSN. …”
    Get full text
    Article
  17. 9957

    Optimal Policies for the Pricing and Replenishment of Fashion Apparel considering the Effect of Fashion Level by Qi Chen, Qi Xu, Wenjie Wang

    Published 2019-01-01
    “…First, we provide a framework for fashion apparel by formulating a model that includes both price and demand at different fashion levels. We then provide an algorithm to derive the optimal dynamic pricing strategy and replenishment cycle. …”
    Get full text
    Article
  18. 9958

    An active detection of compromised nodes based on en-route trap in wireless sensor network by Jiang-Tao Wang, Zhi-Xiong Liu

    Published 2021-08-01
    “…A trust model is used to evaluate trust level of neighbor nodes with respect to their authentication behaviors. A detecting algorithm of compromised node is used to detect compromised nodes. …”
    Get full text
    Article
  19. 9959

    From Incoherence to Sustainability: Performance, Activism, and Social Media in the Most Recent Russian Poetry by Kirill Korchagin

    Published 2024-10-01
    “…The central hypothesis of this article is that all of these poets react differently to the methods of discursive organization provided (and enforced) by social networks and strive in different ways to liberate themselves from the censorship of the algorithm: some emphasize the discursive incoherence of the platform, while others, on the contrary, seek to develop a sustainable manner of uniting private discourses into a new totality. …”
    Get full text
    Article
  20. 9960

    Human Position Detection Based on Depth Camera Image Information in Mechanical Safety by Cheng Zhou, Dacong Ren, Xiangyan Zhang, Cungui Yu, Likai Ju

    Published 2022-01-01
    “…Meanwhile, a human position detection method based on Intel RealSense depth camera and MobileNet-SSD algorithm is proposed and applied to robot safety protection. …”
    Get full text
    Article