Showing 13,041 - 13,060 results of 19,511 for search '"algorithms"', query time: 0.08s Refine Results
  1. 13041

    Time-Delayed Acceleration Feedback Control of a Single-Link Flexible Manipulator Using Kalman Filter by Yuming Huang, Weidong Chen, Minqiang Shao

    Published 2021-01-01
    “…In light of the estimated augmented states, a hybrid controller that combines a feedback control algorithm and a feedforward control algorithm is designed according to optimal control theory and Moore–Penrose theory. …”
    Get full text
    Article
  2. 13042

    Cloud data secure deduplication scheme via role-based symmetric encryption by Jinbo XIONG, Yuanyuan ZHANG, Youliang TIAN, Zuobin YING, Qi LI, Rong MA

    Published 2018-05-01
    “…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
    Get full text
    Article
  3. 13043

    Random k conditional nearest neighbor for high-dimensional data by Jiaxuan Lu, Hyukjun Gweon

    Published 2025-01-01
    “…The k nearest neighbor (kNN) approach is a simple and effective algorithm for classification and a number of variants have been proposed based on the kNN algorithm. …”
    Get full text
    Article
  4. 13044

    Recognition of Damage Degree of Tooth Root Crack based on PCA and Grey Relational by Jie Liu, Huanyu Li, Weiqiang Zhao

    Published 2020-09-01
    “…The relational degree of PCA and GRA combined algorithm is larger and the discrimination degree is more obvious than that of direct GRA calculation. …”
    Get full text
    Article
  5. 13045

    Generalized Equilibrium Problems Related to Ky Fan Inequalities by Ionel Rovenţa

    Published 2014-01-01
    “…As an application, we present a fixed point type algorithm inspired by a model from Tada and Takahashi (2007).…”
    Get full text
    Article
  6. 13046

    Hamiltonian-connected graphs and their strong closures by Pak-Ken Wong

    Published 1997-01-01
    “…We also give an efficient algorithm to compute the strong closure of G.…”
    Get full text
    Article
  7. 13047

    Downregulation of FXYD2 Is Associated with Poor Prognosis and Increased Regulatory T Cell Infiltration in Clear Cell Renal Cell Carcinoma by Zedan Zhang, Yanlin Tang, Lei Li, Wuping Yang, Yawei Xu, Jingcheng Zhou, Kaifang Ma, Kenan Zhang, Hongkai Zhuang, Yanqing Gong, Kan Gong

    Published 2022-01-01
    “…Through the ESTIMATE algorithm, ssGSEA algorithm, CIBERSORT algorithm, TIMER database, and our laboratory experiment, FXYD2 was found to correlate with the immune landscape, especially regulatory T cells (Treg), in ccRCC. …”
    Get full text
    Article
  8. 13048

    Predictive Forwarding Rule Caching for Latency Reduction in Dynamic SDN by Doosik Um, Hyung-Seok Park, Hyunho Ryu, Kyung-Joon Park

    Published 2024-12-01
    “…This paper introduces a caching technique for forwarding rules based on predicted link states in SDN, which was named the CRIMSON (Cashing Routing Information in Mobile SDN Network) algorithm. The CRIMSON algorithm detects network link state changes caused by node mobility and caches new forwarding rules based on predicted topology changes. …”
    Get full text
    Article
  9. 13049

    Optimized Design of 3D Spatial Images Based on Kalman Filter Equation by Wei Shan

    Published 2021-01-01
    “…The algorithm takes the first row of the matrix image as the initial parameter of the Kalman filter prediction equation and then takes the first row of the recovered image as the initial parameter of the second Kalman filter prediction equation. …”
    Get full text
    Article
  10. 13050

    Reliability of spatial rod metal structures of high level of responsibility by V. F. Mushchanov, A. N. Orzhekhovskiy, A. V. Mushchanov, M. N. Tseplyaev

    Published 2024-05-01
    “…As a result of the research work for the considered structures, a 2-stage algorithm for assessing reliability was developed, which differs from the previously developed ones by the possibility of assessing the development of progressive collapse. …”
    Get full text
    Article
  11. 13051

    Penerapan Metode K-Means Berbasis Jarak untuk Deteksi Kendaraan Bergerak by Yuslena Sari, Andreyan Rizky Baskara, Puguh Budi Prakoso

    Published 2022-08-01
    “…In this paper, the K-Means algorithm applies Euclidean distance, Manhattan distance, Canberra distance, Chebyshev distance and Braycurtis distance. …”
    Get full text
    Article
  12. 13052

    Implementing Two Dimensions Decentralized Carrier Phase Shift Method for Multicell Serial-Parallel Inverters by Phu Cong Nguyen, Quoc Dung Phan, Tuyen Dinh Nguyen

    Published 2025-01-01
    “…This paper proposes and verifies an algorithm to ensure that the carrier phase angles of cells in the 2D structure are evenly alternating, thereby improving the algorithm to balance the alternating current between parallel branches connecting the load. …”
    Get full text
    Article
  13. 13053

    Bidimensionally partitioned online sequential broad learning system for large-scale data stream modeling by Wei Guo, Jianjiang Yu, Caigen Zhou, Xiaofeng Yuan, Zhanxiu Wang

    Published 2024-12-01
    “…Theoretical analyses and simulation experiments demonstrate the effectiveness and superiority of the proposed algorithm.…”
    Get full text
    Article
  14. 13054

    Issues of diagnostics and treatment of abdominal pain at irritable bowel syndrome at outpatient stage of the healthcare by Yu. A. Kucheryavy, T. L. Lapina, M. A. Livzan, M. F. Osipenko

    Published 2015-12-01
    “…Implementation of diagnostic algorithm allows to distinguish the organic disease or to establishthe diagnosis of functional disease. …”
    Get full text
    Article
  15. 13055

    Enhanced photovoltaic panel diagnostics through AI integration with experimental DC to DC Buck Boost converter implementation by Chouaib Labiod, Redha Meneceur, Ali Bebboukha, Abdelmoumene Hechifa, Kamel Srairi, Adel Ghanem, Ievgen Zaitsev, Mohit Bajaj

    Published 2025-01-01
    “…The HHO algorithm is combined with an advanced machine learning model, XGBoost, to accurately detect faults within the PV system. …”
    Get full text
    Article
  16. 13056

    Analisis Seleksi Atribut Dalam Memprediksi Kegagalan Skripsi Mahasiswa Menggunakan Algoritme Naïve Bayes pada Jurusan Sistem Informasi Universitas Brawijaya by Satrio Hadi Wijoyo, Satrio Agung Wicaksono, Admaja Dwi Herlambang

    Published 2023-04-01
    “…One of them is the failure in completing the thesis using the naïve Bayes algorithm. The stages of this research started from data collection, data preprocessing, implementation of the Naïve Bayes algorithm, testing, and analysis of the results. …”
    Get full text
    Article
  17. 13057

    Research on Innovative Apple Grading Technology Driven by Intelligent Vision and Machine Learning by Bo Han, Jingjing Zhang, Rolla Almodfer, Yingchao Wang, Wei Sun, Tao Bai, Luan Dong, Wenjing Hou

    Published 2025-01-01
    “…An improved DPC-AWKNN segmentation algorithm is proposed for segmenting the apple body. …”
    Get full text
    Article
  18. 13058

    Three-Dimensional Inversion of Borehole-Surface Resistivity Method Based on the Unstructured Finite Element by Zhi Wang, Sinan Fang

    Published 2021-01-01
    “…The comprehensive application of the above methods makes the 3D inversion algorithm efficient, accurate, and stable. The three-dimensional inversion test is performed on the synthetic data of multiple theoretical geoelectric models with topography (a single anomaly model under valley and a single anomaly model under mountain) to verify the effectiveness of the proposed algorithm.…”
    Get full text
    Article
  19. 13059

    Tangential Human Posture Recognition with Sequential Images Based on MIMO Radar by Chuanwei DING, Zhilin LIU, Li ZHANG, Heng ZHAO, Qing ZHOU, Hong HONG, Xiaohua ZHU

    Published 2025-02-01
    “…First, a Constant False Alarm Rate (CFAR) algorithm is applied to locate the human target. A sliding window along the slow time axis is then utilized to divide the received signal into sequential frames. …”
    Get full text
    Article
  20. 13060

    All-Weather Retrieval of Total Column Water Vapor From Aura OMI Visible Observations by Jiafei Xu, Zhizhao Liu

    Published 2025-01-01
    “…We propose a practical machine learning-based TCWV retrieval algorithm to derive TCWV over land from OMI visible observations under all weather conditions, considering multiple dependable factors linked with OMI TCWV and air mass factor. …”
    Get full text
    Article