Showing 11,241 - 11,260 results of 12,475 for search '"algorithms"', query time: 0.07s Refine Results
  1. 11241

    Rolling Bearings Fault Diagnosis under Variable Speed Conditions Based on Multitime-Frequency Ridge Extraction by Qing Xiong, Yixuan Li, Xiaoli Qiu, Dong Yu, Weihua Zhang, Qingze Chen

    Published 2024-01-01
    “…First, the time-frequency representation of the fault signal is obtained through the adaptive short-time Fourier transform (STFT), and then the FPOMRE algorithm is used to extract additional ridges below the lowest time-frequency ridge multiple times. …”
    Get full text
    Article
  2. 11242

    Employee attendance system using face recognition and GPS using local binary pattern histogram by Narahari Vigraha Prasada, Ikrimach

    Published 2024-12-01
    “…Conventional approaches such as manual sign-ins and RFID cards or fingerprint scanning have shown important weaknesses, especially with regard to proxy attendance (buddy punching). We chose the LBPH algorithm since it has a higher flexibility against changes of light, which means that we can use it in many situations like indoor or outdoor cases. …”
    Get full text
    Article
  3. 11243

    Exploring Shared SRAM Tables in FPGAs for Larger LUTs and Higher Degree of Sharing by Ali Asghar, Muhammad Mazher Iqbal, Waqar Ahmed, Mujahid Ali, Husain Parvez, Muhammad Rashid

    Published 2017-01-01
    “…We also make use of a recently proposed high performance Boolean matching algorithm to perform NPN classification. To enhance area savings further, we evaluate the feasibility of more than two LUTs sharing the same SRAM table. …”
    Get full text
    Article
  4. 11244

    Big Data Analysis Using Apache Spark MLlib and Hadoop HDFS with Scala and Java by Hoger Khayrolla Omar, Alaa Khalil Jumaa

    Published 2019-05-01
    “…The results showed that the performance of Scala about 10% to 20% is better than Java depending on the algorithm type. The aim of the study is to analyze big data with more suitable programming languages and as consequences gaining better performance. …”
    Get full text
    Article
  5. 11245

    Prediction of High-ozone Events Using GAM, SMOTE, and Tail Dependence Approaches in Texas (2005–2019) by Benjamin Brown-Steiner, Xiong Zhou, Matthew J. Alvarado, Brook T. Russell

    Published 2021-07-01
    “…We also find that the tail dependence approach is capable of predicting extreme ozone events, but algorithmic stability and configuration complexity can make this approach difficult to operationalize on a broad scale and that the selection of the threshold needs to be carefully considered. …”
    Get full text
    Article
  6. 11246

    A Brain-Computer Interface for Teleoperation of a Semiautonomous Mobile Robotic Assistive System Using SLAM by Vidya Nandikolla, Bryan Ghoslin, Kevin Matsuno, Daniel A. Medina Portilla

    Published 2022-01-01
    “…The mobile base’s SLAM algorithm has obstacle avoidance capability and path planning to assist the robot maneuver safely. …”
    Get full text
    Article
  7. 11247

    Human Evolution: the Limits of Technocentrism by M. I. Boichenko

    Published 2021-06-01
    “…Technology is a technique that has gained recognition and has been mastered by those who did not invent it but used the algorithm proposed by the inventor, a detailed and functionally sound explanation, a method of constructing this technique. …”
    Get full text
    Article
  8. 11248

    Accelerating Multiple Compound Comparison Using LINGO-Based Load-Balancing Strategies on Multi-GPUs by Chun-Yuan Lin, Chung-Hung Wang, Che-Lun Hung, Yu-Shiang Lin

    Published 2015-01-01
    “…In this paper, we propose a GPU-based algorithm for MCC problem, called CUDA-MCC, on single- and multi-GPUs. …”
    Get full text
    Article
  9. 11249

    A Novel Approach of Label Construction for Predicting Remaining Useful Life of Machinery by Hailong Lin, Zihao Lei, Guangrui Wen, Xiaojun Tian, Xin Huang, Jinsong Liu, Haoxuan Zhou, Xuefeng Chen

    Published 2021-01-01
    “…Furthermore, the fuzzy C-means (FCM) algorithm is innovatively used to divide the degradation data into several stages to obtain the turning point of degradation. …”
    Get full text
    Article
  10. 11250

    Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments by Doaa Mohsin Abd Ali Afraji, Jaime Lloret, Lourdes Peñalver

    Published 2025-12-01
    “…The future work is proposed to build superior datasets and use accurate algorithm to improve the security models. This paper focuses on explainability as a way of making the AI model creation process and any consequent decisions explainable and transparent. …”
    Get full text
    Article
  11. 11251

    Development and Implementation of an FPGA-Embedded Multimedia Remote Monitoring System for Information Technology Server Room Management by Yongqin Zhu, Kaiwen Hou

    Published 2024-01-01
    “…Additionally, the system employs the fast Fourier transform algorithm and butterfly operations to derive voltage and current AC quantities, while utilizing relative temperature differences to identify equipment faults within the server room. …”
    Get full text
    Article
  12. 11252

    Functional genomic imaging (FGI), a virtual tool for visualization of functional gene expression modules in heterogeneous tumor samples by Xinlei Chen, Youbing Guo, Xiaorong Gu, Danyi Wen

    Published 2025-01-01
    “…FGI uses weighted gene co-expression network analysis (WGCNA), followed by a modified Phenograph clustering algorithm to identify co-expression gene clusters. …”
    Get full text
    Article
  13. 11253

    Parametric Yield-Driven Resource Binding in High-Level Synthesis with Multi-Vth/Vdd Library and Device Sizing by Yibo Chen, Yu Wang, Yuan Xie, Andres Takach

    Published 2012-01-01
    “…A parametric yield-driven resource binding algorithm is then proposed, which uses the characterized power and delay distributions and efficiently maximizes power yield under a timing yield constraint. …”
    Get full text
    Article
  14. 11254

    Predicting and synthesizing terahertz spoof surface plasmon polariton devices with a convolutional neural network model by Vahid Najafy, Bijan Abbasi-Arand, Maryam Hesari-Shermeh

    Published 2025-01-01
    “…Three examples are provided for inversely designing several sensor devices and absorbers in the terahertz band using the proposed CNN and the genetic optimization algorithm.…”
    Get full text
    Article
  15. 11255

    A Novel Ferroptosis-Related Gene Signature for Prognosis Prediction in Ewing Sarcoma by Runhan Zhao, Zefang Li, Yanran Huang, Chuang Xiong, Chao Zhang, Hao Liang, Jingtao Xu, Xiaoji Luo

    Published 2022-01-01
    “…Based on the train cohort, AURKA, RGS4, and RIPK1 were identified as key genes through the univariate Cox regression analysis, the random survival forest algorithm, and the multivariate Cox regression analysis and utilized to establish a prognostic FRG signature. …”
    Get full text
    Article
  16. 11256

    A review of state-of-the-art resolution improvement techniques in SPECT imaging by Zhibiao Cheng, Ping Chen, Jianhua Yan

    Published 2025-01-01
    “…It delves into advancements in detector design and modifications, projection sampling techniques, traditional reconstruction algorithm development and optimization, and the emerging role of deep learning. …”
    Get full text
    Article
  17. 11257

    A Unified Bayesian Model for Generalized Community Detection in Attribute Networks by Qiang Tian, Wenjun Wang, Yingjie Xie, Huaming Wu, Pengfei Jiao, Lin Pan

    Published 2020-01-01
    “…To optimize the objective function of the model, we use an effective Gibbs sampling algorithm. Experiments on a number of synthetic and real networks show that our model has superior performance compared with some baselines on community detection.…”
    Get full text
    Article
  18. 11258

    A Deep Learning Based Traffic State Estimation Method for Mixed Traffic Flow Environment by Fan Ding, Yongyi Zhang, Rui Chen, Zhanwen Liu, Huachun Tan

    Published 2022-01-01
    “…This article presents a traffic state estimation method based on a deep learning algorithm under a low and dynamic CVs penetration rate environment. …”
    Get full text
    Article
  19. 11259

    C-BERT: A Mongolian reverse dictionary based on fused lexical semantic clustering and BERT by Amuguleng Wang, Yilagui Qi, Dahu Baiyila

    Published 2025-01-01
    “…Initially, the K-means algorithm was used to cluster preprocessed entries from well-known Mongolian dictionaries into 5000 clusters, forming a comprehensive training set. …”
    Get full text
    Article
  20. 11260

    MARKETING RESEARCH IN THE FIELD OF PUBLIC ADMINISTRATION by Viktor Sychenko, Olha Kudyrko

    Published 2024-12-01
    “…The data collection algorithm was summarized and the analysis of the main elements of the marketing research process for the field of public administration was carried out, in particular, the question of qualitative research methods, which can be used when collecting primary information from respondents, was investigated in detail. …”
    Get full text
    Article