Showing 13,641 - 13,660 results of 19,511 for search '"algorithms"', query time: 0.10s Refine Results
  1. 13641

    Optimizing Train Timetable Based on Departure Time Preference of Passengers for High-Speed Rails by Zhipeng Huang, Huimin Niu, Ruhu Gao, Haoyu Fan, Chenglin Liu

    Published 2021-01-01
    “…Finally, a real-world numerical experiment is conducted to verify the effectiveness of both the model and the algorithm.…”
    Get full text
    Article
  2. 13642

    Research on the evaluation method of cooperative jamming effectiveness based on IPSO-ELM by A. Tianjian Yang, B. Xing Wang, C. Siyi Cheng, D. You Chen, E. Xi Zhang

    Published 2025-01-01
    “…Finally, the IPSO-ELM algorithm is subjected to rigorous assessment via simulation, confirming its performance of accuracy and efficiency. …”
    Get full text
    Article
  3. 13643

    Shallow Foundation Settlement Quantification: Application of Hybridized Adaptive Neuro-Fuzzy Inference System Model by Mariamme Mohammed, Ahmad Sharafati, Nadhir Al-Ansari, Zaher Mundher Yaseen

    Published 2020-01-01
    “…This research emphasis on the implementation of newly developed machine learning models called hybridized Adaptive Neuro-Fuzzy Inference System (ANFIS) with Particle Swarm Optimization (PSO) algorithm, Ant Colony optimizer (ACO), Differential Evolution (DE), and Genetic Algorithm (GA) as efficient approaches to predict settlement of shallow foundation over cohesion soil properties. …”
    Get full text
    Article
  4. 13644

    A high speed processor for elliptic curve cryptography over NIST prime field by Xianghong Hu, Xueming Li, Xin Zheng, Yuan Liu, Xiaoming Xiong

    Published 2022-07-01
    “…We first present a three‐clock cycle, divide‐and‐conquer multiplication algorithm which greatly reduces the number of execution cycles of multiplication. …”
    Get full text
    Article
  5. 13645

    Data-driven optimization design method and tool platform for green residential area layout by Shanshan Wang, Dayu Zhang, Xiaosai Hao, Jia Liang, Shanshan Li

    Published 2025-01-01
    “…A parametric generative algorithm is developed to automatically generate design schemes for typical Chinese urban residential areas based on a sustainable, performance-oriented design flow. …”
    Get full text
    Article
  6. 13646

    The Role of Performance Metrics in Estimating Market Values of Footballers in Europe's Top Five Leagues by Murat Işık, Mehmet Ali Yalçınkaya

    Published 2024-12-01
    “…The CNN algorithm achieved the highest accuracy, with a success rate of 97%. …”
    Get full text
    Article
  7. 13647

    Identification of Vibration Signal for Residual Pressure Utilization Hydraulic Unit Using MRFO-BP Neural Network by Qingjiao Cao, Liying Wang, Jiajie Zhang, Tengfei Guo, Xiyuan Liu

    Published 2022-01-01
    “…The weights and thresholds in BP neural network are optimized by the MRFO algorithm. The feature vectors are input into the optimized BP neural network to realize the identification and classification of vibration signals. …”
    Get full text
    Article
  8. 13648

    Ship-Borne Phased Array Radar Using GA Based Adaptive α-β-γ Filter for Beamforming Compensation and Air Target Tracking by J. Mar, Chen-Chih Liu, M. B. Basnet

    Published 2015-01-01
    “…Finally, it is proved that the proposed GA based adaptive α-β-γ filter is a real time applicable algorithm for ship-borne phased array radar.…”
    Get full text
    Article
  9. 13649

    Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination by ZHANG Tianpeng, REN Zhiyu, DU Xuehui, WANG Haichao

    Published 2024-04-01
    “…After analyzing the sparse matrix encryption algorithm, it is found that there are two challenges. …”
    Get full text
    Article
  10. 13650

    Two-party cooperative blind signature based on SM2 by Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG

    Published 2022-12-01
    “…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
    Get full text
    Article
  11. 13651

    A Two-Stage Robust Optimization Method Based on the Expected Scenario for Islanded Microgrid Energy Management by Qing Duan, Wanxing Sheng, Haoqing Wang, Caihong Zhao, Chunyan Ma

    Published 2021-01-01
    “…According to the structural characteristics of the proposed model based on the E-TSRO method, a column-and-constraint generation (C & CG) algorithm is utilized to solve the proposed model. …”
    Get full text
    Article
  12. 13652

    Enhancing Stock Portfolio Selection with Trapezoidal Bipolar Fuzzy VIKOR Technique with Boruta-GA Hybrid Optimization Model: A Multicriteria Decision-Making Approach by Sunil Kumar Sharma

    Published 2025-01-01
    “…The Boruta-GA approach combines the advantages of the Genetic Algorithm (GA) and Boruta Optimization Algorithm (BOA) methods, implementing the comprehensive feature selection capability of Boruta to detect all relevant features and harnessing the strength of GA to bring about improvement within a wide range of datasets. …”
    Get full text
    Article
  13. 13653

    Maximum Butterfly Generators Search in Bipartite Networks by Jianrong Huang, Guangyao Pang, Fei Hao

    Published 2024-12-01
    “…Furthermore, an effective MBGS search algorithm is proposed. Extensive experiments on real-world networks with ground-truth communities and interesting case studies validated the effectiveness and efficiency of our MBGS model and algorithm.…”
    Get full text
    Article
  14. 13654

    Binaural Active Audition for Humanoid Robots to Localise Speech over Entire Azimuth Range by Hyun-Don Kim, Kazunori Komatani, Tetsuya Ogata, Hiroshi G. Okuno

    Published 2009-01-01
    “…The expectation-maximisation (EM) algorithm helped the system to cope with several moving sound sources and reduce localisation errors. …”
    Get full text
    Article
  15. 13655

    Culture under Complex Perspective: A Classification for Traditional Chinese Cultural Elements Based on NLP and Complex Networks by Lin Qi, Yuwei Wang, Jindong Chen, Mengjie Liao, Jian Zhang

    Published 2021-01-01
    “…After analyzing the topological characteristics of the network, the community detection algorithm is used to identify the topics of cultural elements. …”
    Get full text
    Article
  16. 13656

    Hybrid Deep-Learning Framework Based on Gaussian Fusion of Multiple Spatiotemporal Networks for Walking Gait Phase Recognition by Tao Zhen, Jian-lei Kong, Lei Yan

    Published 2020-01-01
    “…The framework proposed in this paper implements the inner loop that also contains the EM algorithm in the outer loop and optimizes the reverse gradient in the entire network. …”
    Get full text
    Article
  17. 13657

    ESP32 and MAX30100 with Chebyshev Filter for Enhanced Heart and Oxygen Measurement by Magfirawaty Magfirawaty, Naval Indra Waskita, Hizkia Menahem Tandungan, Ridhan Hafizh, Syifa Jauza Suwaendi

    Published 2024-10-01
    “…The digital signal processing method uses the Chebyshev II filter on PPG to reduce noise, and the RSA algorithm is employed to enhance data security. The results of testing the MAX30100 sensor value without a filter produced the lowest error value of 0.97%, the highest 6.59% for BPM, the lowest error value of 1.88%, and the highest error of 2.66% for SpO2. …”
    Get full text
    Article
  18. 13658

    A New Method Based on Operational Strategies for Early Detection of Breast Cancers by Samira Khajehkhasan, Soheil Fakheri

    Published 2020-08-01
    “…Results: This article proposes a new algorithm for diagnosing benign and malignant cancers. …”
    Get full text
    Article
  19. 13659

    Fault Diagnosis Method of Distribution Equipment Based on Hybrid Model of Robot and Deep Learning by Shan Rongrong, Ma Zhenyu, Ye Hong, Lin Zhenxing, Qiu Gongming, Ge Chengyu, Lu Yang, Yu Kun

    Published 2022-01-01
    “…Finally, the residual network is used to improve the region-based fully convolutional networks (R-FCN) algorithm, and the improved R-FCN algorithm trained by the online hard example mining method is used for fault feature learning. …”
    Get full text
    Article
  20. 13660

    Utilizing machine learning to predict hospital admissions for pediatric COVID-19 patients (PrepCOVID-Machine) by Chuin-Hen Liew, Song-Quan Ong, David Chun-Ern Ng

    Published 2025-01-01
    “…Grid Search was used to optimize the hyperparameters of each algorithm. The study analyzed 1988 children and 30 study variables after data were processed. …”
    Get full text
    Article