-
13661
Automated Generation of Custom Processor Core from C Code
Published 2012-01-01“…We then apply designer-guided constraints to an interactive data path refinement algorithm that attempts to reduce the number of the most expensive components while meeting the constraints. …”
Get full text
Article -
13662
Semisupervised Association Learning Based on Partial Differential Equations for Sparse Representation of Image Class Attributes
Published 2021-01-01“…Using the variational expectation-maximization algorithm, the whole generative process model can be inferred. …”
Get full text
Article -
13663
Spatiotemporal Video Denoising Based on Adaptive Thresholding and Clustering
Published 2017-01-01“…Execution time of the proposed algorithm consumes less time in denoising than that in the VBM3D algorithm.…”
Get full text
Article -
13664
Designing and implementing a Web-based real time routing service for crisis management (a case study for district 11 of Tehran)
Published 2019-06-01“…In this service ANP model was used to evaluate increasing interaction between the factors, and since the purpose of this study was to find the best possible routs between two nodes by non-negative weight according to the main distance factor, Dijkstra's algorithm has been chosen as a proper routing algorithm. …”
Get full text
Article -
13665
Validation of the version 4.5 MAESTRO ozone and NO<sub>2</sub> measurements
Published 2025-02-01“…The version 4.5 retrieval algorithm represents an improvement from previous versions, with changes including updated pressure and temperature input information, an improved algorithm for high-Sun reference spectrum calculation, improved Rayleigh scattering modelling, and the change to a Twomey–Tikhonov inversion algorithm from a Chahine relaxation technique. …”
Get full text
Article -
13666
Sentiment Analysis Twitter Bahasa Indonesia Berbasis WORD2VEC Menggunakan Deep Convolutional Neural Network
Published 2020-02-01“…The results of experiments that have been carried out with the Deep Convolutional Neural Network algorithm have the best accuracy value of 76.40%. …”
Get full text
Article -
13667
A fast monocular 6D pose estimation method for textureless objects based on perceptual hashing and template matching
Published 2025-01-01“…In this study, we propose a template-based matching algorithm that utilizes a novel perceptual hashing method for binary images, enabling fast and robust pose estimation. …”
Get full text
Article -
13668
Understanding Health-Related Discussions on Reddit: Development of a Topic Assignment Method and Exploratory Analysis
Published 2025-01-01“…By iterating through multiple rounds of topic assignment, we improved the accuracy of the algorithm. Ultimately, this algorithm created 82 topics sorted into 17 broader medical disciplines. …”
Get full text
Article -
13669
End-Edge Collaborative Lightweight Secure Federated Learning for Anomaly Detection of Wireless Industrial Control Systems
Published 2024-01-01“…Then, to reduce the wireless communication cost for parameter exchange and edge federal learning, we propose a dynamic parameter pruning algorithm by evaluating the contribution of each parameter based on the information entropy gain. …”
Get full text
Article -
13670
A Series of Frequency Shift Antennas Based on Shape Blending
Published 2021-01-01“…In this paper, an automatic antenna design method based on the shape blending algorithm is proposed. The algorithm is used to construct the shape of the wide slot of a CPW-fed antenna. …”
Get full text
Article -
13671
A Low-Duty-Cycle and Congestion-Robust Design of Adaptive Wi-Fi 7 Multi-Link Operation Control Over User Side
Published 2025-01-01“…We have devised an adaptive algorithm that dynamically adjusts MLO configurations based on periodic measurements at the MAC/IP layers. …”
Get full text
Article -
13672
Chaos-Based Engineering Applications with a 6D Memristive Multistable Hyperchaotic System and a 2D SF-SIMM Hyperchaotic Map
Published 2021-01-01“…Secondly, based on the double entropy source structure, a new image encryption algorithm is proposed. The algorithm uses the diffusion-scrambling-diffusion encryption scheme to realize the conversion from the original plaintext image to the ciphertext image. …”
Get full text
Article -
13673
Dynamic Identification of Critical Transmission Lines in Power Systems With Wind Power Integration Based on Maximum Influence Theory
Published 2025-01-01“…Based on the influence maximization model in time-sequence cascading faults graph (IMTG), the line fault influence calculation algorithm (LFIC) and improved critical line identification algorithm (ILIT) are proposed to identify the critical transmission lines. …”
Get full text
Article -
13674
Wind Turbine SCADA Data Imbalance: A Review of Its Impact on Health Condition Analyses and Mitigation Strategies
Published 2024-12-01“…Five categories of such strategies were identified: Normal Behavior Models (NBMs), data-level strategies, algorithm-level strategies, cost-sensitive learning, and data augmentation techniques. …”
Get full text
Article -
13675
Transient Voltage Information Entropy Difference Unit Protection Based on Fault Condition Attribute Fusion
Published 2025-01-01“…Finally, the accuracy and reliability of the proposed algorithm were verified by extensive ATP-Draw simulation tests.…”
Get full text
Article -
13676
A novel method of adaptive weighted -nearest neighbor fingerprint indoor positioning considering user’s orientation
Published 2018-06-01“…Second, the fuzzy c -means algorithm is used to cluster orientation fingerprint database taking the hybrid distance of the signal domain and position domain as the clustering feature. …”
Get full text
Article -
13677
Collaborative Optimization of Direct Current Distribution Network Based on Scaled Electric Vehicles Charging and Discharging and Soft Open Points Topology Reconfiguration
Published 2025-01-01“…The upper and lower models use the multi-objective particle swarm optimization (MOPSO) algorithm and simulated annealing algorithm to jointly optimize the optimal EV discharge power and the optimal SOP access configuration simultaneously. …”
Get full text
Article -
13678
Multiple UAV Swarms Collaborative Firefighting Strategy Considering Forest Fire Spread and Resource Constraints
Published 2024-12-01“…The multiple UAV swarm adaptive information-driven collaborative search (MUSAIDCS) algorithm and the resource-limited firefighting model were established. …”
Get full text
Article -
13679
An Integrated Image Encryption Scheme Based on Elliptic Curve
Published 2023-01-01“…Afterwards, the proposed scheme uses the first 128-bits for the confidentiality of the data, while the remaining 128-bits are for authentication. In the encryption algorithm, the confusion module is achieved by affine power affine transformation. …”
Get full text
Article -
13680
Power Transformer Health Index Using Cost-Sensitive Learning to Consider the Impact of Misclassification
Published 2024-01-01“…The effectiveness of the proposed health index calculation algorithm is validated using in-service power transformer inspection data, demonstrating a reduction in the risk of specific misclassification scenarios.…”
Get full text
Article