Showing 13,661 - 13,680 results of 19,511 for search '"algorithms"', query time: 0.10s Refine Results
  1. 13661

    Automated Generation of Custom Processor Core from C Code by Jelena Trajkovic, Samar Abdi, Gabriela Nicolescu, Daniel D. Gajski

    Published 2012-01-01
    “…We then apply designer-guided constraints to an interactive data path refinement algorithm that attempts to reduce the number of the most expensive components while meeting the constraints. …”
    Get full text
    Article
  2. 13662

    Semisupervised Association Learning Based on Partial Differential Equations for Sparse Representation of Image Class Attributes by Wei Song, Guang Hu, Liuqing OuYang, Zhenjie Zhu

    Published 2021-01-01
    “…Using the variational expectation-maximization algorithm, the whole generative process model can be inferred. …”
    Get full text
    Article
  3. 13663

    Spatiotemporal Video Denoising Based on Adaptive Thresholding and Clustering by Ali Abdullah Yahya, Jieqing Tan, Benyu Su, Kui Liu, Ali Naser Hadi

    Published 2017-01-01
    “…Execution time of the proposed algorithm consumes less time in denoising than that in the VBM3D algorithm.…”
    Get full text
    Article
  4. 13664

    Designing and implementing a Web-based real time routing service for crisis management (a case study for district 11 of Tehran) by javad sadidi, seyed hassan hosseini sajedi

    Published 2019-06-01
    “…In this service ANP model was used to evaluate increasing interaction between the factors, and since the purpose of this study was to find the best possible routs between two nodes by non-negative weight according to the main distance factor, Dijkstra's algorithm has been chosen as a proper routing algorithm. …”
    Get full text
    Article
  5. 13665

    Validation of the version 4.5 MAESTRO ozone and NO<sub>2</sub> measurements by P. S. Jeffery, J. R. Drummond, C. T. McElroy, K. A. Walker, J. Zou

    Published 2025-02-01
    “…The version 4.5 retrieval algorithm represents an improvement from previous versions, with changes including updated pressure and temperature input information, an improved algorithm for high-Sun reference spectrum calculation, improved Rayleigh scattering modelling, and the change to a Twomey–Tikhonov inversion algorithm from a Chahine relaxation technique. …”
    Get full text
    Article
  6. 13666

    Sentiment Analysis Twitter Bahasa Indonesia Berbasis WORD2VEC Menggunakan Deep Convolutional Neural Network by Hans Juwiantho, Esther Irawati Setiawan, Joan Santoso, Mauridhi Hery Purnomo

    Published 2020-02-01
    “…The results of experiments that have been carried out with the Deep Convolutional Neural Network algorithm have the best accuracy value of 76.40%. …”
    Get full text
    Article
  7. 13667

    A fast monocular 6D pose estimation method for textureless objects based on perceptual hashing and template matching by Jose Moises Araya-Martinez, Jose Moises Araya-Martinez, Vinicius Soares Matthiesen, Vinicius Soares Matthiesen, Simon Bøgh, Jens Lambrecht, Rui Pimentel de Figueiredo

    Published 2025-01-01
    “…In this study, we propose a template-based matching algorithm that utilizes a novel perceptual hashing method for binary images, enabling fast and robust pose estimation. …”
    Get full text
    Article
  8. 13668

    Understanding Health-Related Discussions on Reddit: Development of a Topic Assignment Method and Exploratory Analysis by Garrett J Chan, Mark Fung, Jill Warrington, Sarah A Nowak

    Published 2025-01-01
    “…By iterating through multiple rounds of topic assignment, we improved the accuracy of the algorithm. Ultimately, this algorithm created 82 topics sorted into 17 broader medical disciplines. …”
    Get full text
    Article
  9. 13669

    End-Edge Collaborative Lightweight Secure Federated Learning for Anomaly Detection of Wireless Industrial Control Systems by Chi Xu, Xinyi Du, Lin Li, Xinchun Li, Haibin Yu

    Published 2024-01-01
    “…Then, to reduce the wireless communication cost for parameter exchange and edge federal learning, we propose a dynamic parameter pruning algorithm by evaluating the contribution of each parameter based on the information entropy gain. …”
    Get full text
    Article
  10. 13670

    A Series of Frequency Shift Antennas Based on Shape Blending by Aiting Wu, Yuebin Sun, Pengquan Zhang, Tiejun Du

    Published 2021-01-01
    “…In this paper, an automatic antenna design method based on the shape blending algorithm is proposed. The algorithm is used to construct the shape of the wide slot of a CPW-fed antenna. …”
    Get full text
    Article
  11. 13671

    A Low-Duty-Cycle and Congestion-Robust Design of Adaptive Wi-Fi 7 Multi-Link Operation Control Over User Side by Yirong Cheng, Abhishek Sehgal, Kyeong Jin Kim, Neha Dawar, Yuming Zhu

    Published 2025-01-01
    “…We have devised an adaptive algorithm that dynamically adjusts MLO configurations based on periodic measurements at the MAC/IP layers. …”
    Get full text
    Article
  12. 13672

    Chaos-Based Engineering Applications with a 6D Memristive Multistable Hyperchaotic System and a 2D SF-SIMM Hyperchaotic Map by Fei Yu, Shuai Qian, Xi Chen, Yuanyuan Huang, Shuo Cai, Jie Jin, Sichun Du

    Published 2021-01-01
    “…Secondly, based on the double entropy source structure, a new image encryption algorithm is proposed. The algorithm uses the diffusion-scrambling-diffusion encryption scheme to realize the conversion from the original plaintext image to the ciphertext image. …”
    Get full text
    Article
  13. 13673

    Dynamic Identification of Critical Transmission Lines in Power Systems With Wind Power Integration Based on Maximum Influence Theory by Gang Ruan, Changzheng Shao, Hao Wang, Yingxu Jin, Lingzi Zhu, Dongxu Chang

    Published 2025-01-01
    “…Based on the influence maximization model in time-sequence cascading faults graph (IMTG), the line fault influence calculation algorithm (LFIC) and improved critical line identification algorithm (ILIT) are proposed to identify the critical transmission lines. …”
    Get full text
    Article
  14. 13674

    Wind Turbine SCADA Data Imbalance: A Review of Its Impact on Health Condition Analyses and Mitigation Strategies by Adaiton Oliveira-Filho, Monelle Comeau, James Cave, Charbel Nasr, Pavel Côté, Antoine Tahan

    Published 2024-12-01
    “…Five categories of such strategies were identified: Normal Behavior Models (NBMs), data-level strategies, algorithm-level strategies, cost-sensitive learning, and data augmentation techniques. …”
    Get full text
    Article
  15. 13675

    Transient Voltage Information Entropy Difference Unit Protection Based on Fault Condition Attribute Fusion by Zhenwei Guo, Ruiqiang Zhao, Zebo Huang, Yongyan Jiang, Haojie Li, Yingcai Deng

    Published 2025-01-01
    “…Finally, the accuracy and reliability of the proposed algorithm were verified by extensive ATP-Draw simulation tests.…”
    Get full text
    Article
  16. 13676

    A novel method of adaptive weighted -nearest neighbor fingerprint indoor positioning considering user’s orientation by Jingxue Bi, Yunjia Wang, Xin Li, Hongji Cao, Hongxia Qi, Yongkang Wang

    Published 2018-06-01
    “…Second, the fuzzy c -means algorithm is used to cluster orientation fingerprint database taking the hybrid distance of the signal domain and position domain as the clustering feature. …”
    Get full text
    Article
  17. 13677

    Collaborative Optimization of Direct Current Distribution Network Based on Scaled Electric Vehicles Charging and Discharging and Soft Open Points Topology Reconfiguration by Yongqiang Kang, Gang Lu, Meng Chen, Xinglong Li, Shuaibing Li

    Published 2025-01-01
    “…The upper and lower models use the multi-objective particle swarm optimization (MOPSO) algorithm and simulated annealing algorithm to jointly optimize the optimal EV discharge power and the optimal SOP access configuration simultaneously. …”
    Get full text
    Article
  18. 13678

    Multiple UAV Swarms Collaborative Firefighting Strategy Considering Forest Fire Spread and Resource Constraints by Pei Zhu, Rui Song, Jiangao Zhang, Ziheng Xu, Yaqi Gou, Zhi Sun, Quan Shao

    Published 2024-12-01
    “…The multiple UAV swarm adaptive information-driven collaborative search (MUSAIDCS) algorithm and the resource-limited firefighting model were established. …”
    Get full text
    Article
  19. 13679

    An Integrated Image Encryption Scheme Based on Elliptic Curve by Ijaz Khalid, Tariq Shah, Sayed M. Eldin, Dawood Shah, Muhammad Asif, Imran Saddique

    Published 2023-01-01
    “…Afterwards, the proposed scheme uses the first 128-bits for the confidentiality of the data, while the remaining 128-bits are for authentication. In the encryption algorithm, the confusion module is achieved by affine power affine transformation. …”
    Get full text
    Article
  20. 13680

    Power Transformer Health Index Using Cost-Sensitive Learning to Consider the Impact of Misclassification by Junsoo Che, Gihun Park, Jeongsik Oh, Su-Han Pyo, Byeonghyeon An, Taesik Park

    Published 2024-01-01
    “…The effectiveness of the proposed health index calculation algorithm is validated using in-service power transformer inspection data, demonstrating a reduction in the risk of specific misclassification scenarios.…”
    Get full text
    Article