Suggested Topics within your search.
Suggested Topics within your search.
-
13101
Identification of Weakly Pitch-Shifted Voice Based on Convolutional Neural Network
Published 2020-01-01“…Extensive results show that the algorithm achieves high detection rates for both binary and multiple classifications.…”
Get full text
Article -
13102
Mobile Base Station and Clustering to Maximize Network Lifetime in Wireless Sensor Networks
Published 2012-01-01“…In the work of Jerew and Liang (2009) we have proposed a novel clustering-based heuristic algorithm for finding a trajectory of the mobile BS that strikes a nontrivial tradeoff between the traffic load among sensor nodes and the tour time constraint of the mobile BS. …”
Get full text
Article -
13103
Metaheuristic Approaches for Hydropower System Scheduling
Published 2015-01-01“…They combine Genetic Algorithm with Strength Pareto Evolutionary Algorithm and Ant Colony Optimization. …”
Get full text
Article -
13104
Impact of Dual Placement and Routing on WDDL Netlist Security in FPGA
Published 2013-01-01“…Then, we introduce a timing-balance-driven routing algorithm which is architecture independent. Our placement and routing techniques proved to be very promising. …”
Get full text
Article -
13105
Reducing Side Effects of Hiding Sensitive Itemsets in Privacy Preserving Data Mining
Published 2014-01-01“…In this paper, a novel hiding-missing-artificial utility (HMAU) algorithm is proposed to hide sensitive itemsets through transaction deletion. …”
Get full text
Article -
13106
Joint DOA and Polarization Estimation for Unequal Power Sources
Published 2015-01-01“…In addition, the performances of the proposed method are provided, as well the Cramer Rao Bound (CRB), which show approximate performance as the polarimetric MUSIC algorithm.…”
Get full text
Article -
13107
Wavelet Domain Multidictionary Learning for Single Image Super-Resolution
Published 2015-01-01“…Comparisons with various state-of-the-art methods by experiments showed that our proposed algorithm is superior to some related works.…”
Get full text
Article -
13108
Low-Shot Wall Defect Detection for Autonomous Decoration Robots Using Deep Reinforcement Learning
Published 2020-01-01“…In this work, we solve this issue to propose the low-shot wall defect detection algorithm using deep reinforcement learning (DRL) for autonomous decoration robots. …”
Get full text
Article -
13109
Accelerating the Adaptive Eyre–Milton FFT-based method for infinitely double contrasted media
Published 2024-11-01“…Sab et al. (2024) have recently proposed an FFT-based iterative algorithm, termed Adaptive Eyre–Milton (AEM), for solving the Lippmann–Schwinger equation in the context of periodic homogenization of infinitely double contrasted linear elastic composites (heterogeneous materials with linear constitutive laws that contain both pores and rigid inclusions). …”
Get full text
Article -
13110
A Modified NM-PSO Method for Parameter Estimation Problems of Models
Published 2012-01-01“…The results demonstrate that the proposed M-NM-PSO method yields better estimation results than those obtained by the genetic algorithm, the modified genetic algorithm (real-coded GA (RCGA)), the conventional particle swarm optimization (PSO) method, and the conventional NM-PSO method.…”
Get full text
Article -
13111
Data-Driven Approaches for Diagnosis of Incipient Faults in Cutting Arms of the Roadheader
Published 2021-01-01“…In this study, four machine learning tools (the back-propagation neural network based on genetic algorithm optimization, the naive Bayes based on genetic algorithm optimization, the support vector machines based on particle swarm optimization, and the support vector machines based on dynamic cuckoo) are applied to address the challenge in the IFDI of cutting arms. …”
Get full text
Article -
13112
Representing groups of students as personas: A systematic review of persona creation, application, and trends in the educational domain
Published 2025-06-01“…The findings suggest significant opportunities for the educational sector to leverage algorithmic methods to advance persona creation and broaden their application scope.…”
Get full text
Article -
13113
Cooperative UAV Scheduling for Power Grid Deicing Using Fuzzy Learning and Evolutionary Optimization
Published 2025-01-01“…The algorithm is fully parallelizable and therefore can solve the problem very efficiently based on GPU parallel acceleration. …”
Get full text
Article -
13114
Parallel Swarms Oriented Particle Swarm Optimization
Published 2013-01-01“…The attractive feature of the PSO-PSO version of the algorithm is that it does not introduce any new parameters to improve its convergence performance. …”
Get full text
Article -
13115
A Novel Vibration Suppression Method for Welding Robots Based on Welding Pool Instability Evaluation and Trajectory Optimization
Published 2024-12-01“…The proposed vibration suppression algorithm is based on the optimization of the welding trajectory. …”
Get full text
Article -
13116
Structural Damage Identification Based on the Transmissibility Function and Support Vector Machine
Published 2018-01-01“…Finally, the classification algorithm and regression algorithm of support vector machine are employed to identify the damage location and damage severity respectively. …”
Get full text
Article -
13117
Design and structure of overlapping regions in PCA via deep learning
Published 2025-06-01“…Utilizing the model, we developed the SmartCut algorithm aimed at designing oligonucleotides and enhancing the success rate of PCA experiments. …”
Get full text
Article -
13118
Fuzzy Theory-Based Data Placement for Scientific Workflows in Hybrid Cloud Environments
Published 2020-01-01“…To address this problem, we propose an adaptive discrete particle swarm optimization algorithm based on the fuzzy theory and genetic algorithm operators (DPSO-FGA) to minimize the fuzzy data transmission time of scientific workflows. …”
Get full text
Article -
13119
A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing
Published 2016-01-01“…Logistic map-based chaotic cryptography algorithm is used to preserve the privacy of outsourcing data, which has a fast operation speed and a good effect of encryption. …”
Get full text
Article -
13120
Mobile photon counting detector CT with multi material decomposition methods for neuroimaging of patients in intensive care unit
Published 2024-12-01“…The extended MD Plus algorithm, including virtual non-contrast (VNC) and bone removal, was also validated for various clinical applications.…”
Get full text
Article