Showing 13,961 - 13,980 results of 19,511 for search '"algorithms"', query time: 0.11s Refine Results
  1. 13961

    Design scheme of linear dispersive space-time codes for downlink multiuser MIMO systems by ZHOU Meng1, ZHANG Can2

    Published 2010-01-01
    “…The combination optimization problem with respect to the design was deduced, and a suboptimal algorithm with low computational complexity was given. …”
    Get full text
    Article
  2. 13962

    A New Approach to the Approximation of Common Fixed Points of an Infinite Family of Relatively Quasinonexpansive Mappings with Applications by Wei-Qi Deng

    Published 2012-01-01
    “…By using a specific way of choosing the indexes, we propose an iteration algorithm generated by the monotone CQ method for approximating common fixed points of an infinite family of relatively quasinonexpansive mappings. …”
    Get full text
    Article
  3. 13963

    Nonlinear scale-space based boundary localization for nonideal iris by Hong-lin WAN, Bao-sheng LI, Min HAN, Deng-wang LI

    Published 2014-03-01
    “…A nonlinear scale-space based localization method of nonideal iris boundaries was proposed.The method eliminates small-scaled geometric structures while preserving large-scaled iris boundaries by nonlinear diffusions with the scale-evolution property.Moreover it combines such diffusions with the frame of multiresolution analysis,and achieves fast and effective iris boundary detection.Experimental results indicate that compared with the classical methods,the proposed algorithm extract nonideal iris boundaries accurately and efficiently with overcoming the disadvantageous influences of the nonideal factors.…”
    Get full text
    Article
  4. 13964

    Contrast Expansion Method for Elastic Incompressible Fibrous Composites by Piotr Drygaś, Vladimir Mityushev

    Published 2017-01-01
    “…A computationally efficient algorithm is described and implemented in symbolic form to compute the local fields in 2D elastic composites and the effective shear modulus for macroscopically isotropic composites. …”
    Get full text
    Article
  5. 13965

    Control of Hopf Bifurcation and Chaos in a Delayed Lotka-Volterra Predator-Prey System with Time-Delayed Feedbacks by Huitao Zhao, Yaowei Sun, Zhen Wang

    Published 2014-01-01
    “…By choosing appropriate control parameter, we investigate the existence of Hopf bifurcation. An explicit algorithm is given to determine the directions and stabilities of the bifurcating periodic solutions. …”
    Get full text
    Article
  6. 13966

    Product Antimagic Labeling of Caterpillars by Shengze Wang, Yuping Gao

    Published 2021-01-01
    “…In this paper, we will show that caterpillars with at least three edges are product antimagic by an Om  log  m algorithm.…”
    Get full text
    Article
  7. 13967

    Regulatory Bitcoin privacy-preserving mixing service by Zijian BAO, Qinghao WANG, Yongxin ZHANG, Bin WANG, Ning LU, Wenbo SHI

    Published 2019-08-01
    “…With the deepening of research on Bitcoin privacy protection,Bitcoin,a new type of digital currency,has become more difficult to regulate.A Bitcoin privacy protection confusion scheme with regulatory RBmix is proposed for this problem.The model of RBmix uses a fair blind signature algorithm and introduces trusted third parties with regulatory,anonymity,scalability,Bitcoin compatibility,and anti-DoS aggression.Experimental results show that the RBmix protocol has good scalability and execution efficiency.…”
    Get full text
    Article
  8. 13968

    Methodology for selecting installation sites for automatic power redundancy systems of DC traction substations by A. L. Kashtanov, Yu. V. Plotnikov

    Published 2021-09-01
    “…The analysis of the main criteria affecting the efficiency and reliability of the DC traction power supply system is carried out. The algorithm for selecting the installation locations of power reservation systems has been developed, which allows selecting traction substations that provide the greatest energy effect during the installation of systems.…”
    Get full text
    Article
  9. 13969

    Efficient identification protocol provably secure in standard model by LI Yan-ping1, WANG Yu-min1

    Published 2009-01-01
    “…Based on the hardness assumption of the collusion attack algorithm with k traitors (K-CAA) in a gap Diffie-Hellman (GDH) group, a new and efficient identification protocol is proposed. …”
    Get full text
    Article
  10. 13970

    Mergeable adaptive tile coding method by Meng-yu SHI, Quan LIU, Qi-ming FU

    Published 2015-02-01
    “…In order to solve many unnecessary division,mergence supported adaptive tile coding algorithm was presented which would eliminate the unnecessary division.Simulation is conducted on mountain car problem with discrete actions and continuous state space Results show that the proposed method can eliminate the influence of false division in the traditional tile coding method and achieve a more accurate adaptive partition of continuous state space.A higher convergence rate is achieved at the same time.…”
    Get full text
    Article
  11. 13971

    South African Rheumatism and Arthritis Association 2024 updated guidelines for the management of rheumatoid arthritis by G Tarr, N Govind, M Seboka, E Gardiner, B Hodkinson

    Published 2024-09-01
    “…These guidelines recommend a treat-to-target strategy using a composite disease activity score at each visit, with frequent follow-up and escalation or switching of disease-modifying antirheumatic drug (DMARD) therapy until the goal of low disease activity is achieved. A stepwise algorithm for DMARD therapy is provided. Screening for comorbidities and vaccination is advised. …”
    Get full text
    Article
  12. 13972

    Factors Influencing the Timing of the First HIV Virological Test for HIV Exposed Infants; A Cross Sectional Descriptive Study of HIV Positive Breastfeeding Mothers and their Infant... by Enos Mirembe, Masereka, Edson Musungu, Bwambale, Edson, Katsomyo, Clement, Munguiko

    Published 2020
    “…Introduction: Although Option-B plus has registered tremendous success in the Prevention of Mother to Child Transmission (PMTCT) of HIV, the failure to follow the HIV testing algorithm for HIV Exposed Infants (HEIs) after birth is likely to make achieving zero new HIV infections among children unrealistic. …”
    Get full text
    Article
  13. 13973
  14. 13974

    Extended integer tent maps and dynamic hash function by LIU Jian-dong

    Published 2010-01-01
    “…Based on the analysis of uniform distribution property of the extended integer tent maps,a novel dynamic hash function with the output length of 160bit was constructed.In addition,the MD structure was improved so that the capacity of collision resistance of the middle iteration process of the hash function was enhanced without extending intermediate states.Preliminary security testing indicates that,this hash function has a high degree of security,and it can be realized easily with great rapidity.The algorithm of hash function is an ideal subsititution for traditional hash function.…”
    Get full text
    Article
  15. 13975

    Retrieval of Atmospheric CO2 and CH4 Variations Using Ground-Based High Resolution Fourier Transform Infrared Spectra by Tian Yuan, Liu Cheng, Sun You Wen, Xie Pin Hua, Wang Wei, Liu Wen Qing, Liu Jian Guo, Li Ang, Hu Ren Zhi, Zeng Yi

    Published 2015-01-01
    “…Both a forward analysis and an inversion algorithm are included in the retrieval. The forward analysis uses the modeled atmospheric transmittance to line-by-line (LBL) convolute the instrument line shape function. …”
    Get full text
    Article
  16. 13976

    A comprehensive global mapping of offshore lighting by C. D. Elvidge, T. Ghosh, N. Chatterjee, N. Chatterjee, M. Zhizhin, M. Zhizhin, P. C. Sutton, M. Bazilian

    Published 2025-02-01
    “…The richness of the numbers and types of offshore lighting structures can be traced back to the DNB spike detector at the core of the VBD algorithm. The VNL algorithm uses outlier removal to filter out biomass burning, an essential process for mapping electric lighting onshore. …”
    Get full text
    Article
  17. 13977

    A Review on Face Mask Recognition by Jiaonan Zhang, Dong An, Yiwen Zhang, Xiaoyan Wang, Xinyue Wang, Qiang Wang, Zhongqi Pan, Yang Yue

    Published 2025-01-01
    “…A central focus is placed on the role of datasets in driving algorithmic performance, addressing key factors, including dataset diversity, scale, annotation granularity, and modality. …”
    Get full text
    Article
  18. 13978

    Itraconazole promotes melanoma cells apoptosis via inhibiting hedgehog signaling pathway-mediated autophagy by Shunqiao Jin, Shunqiao Jin, Xiaojiao Liu, Xiaojiao Liu, Lingqin Cai, Lingqin Cai, Jiayu Yan, Ling Li, Hongjun Dong, Yuxue Gao, Xicong Zhu, Cong Zhang, Xuezhu Xu

    Published 2025-01-01
    “…A melanoma cell xenograft mouse model was established to evaluate the inhibitory mechanisms of itraconazole on tumor cell proliferation.ResultUsing the PMF machine learning algorithm, SQSTM1 was identified as the primary target of itraconazole. …”
    Get full text
    Article
  19. 13979

    An effective vessel segmentation method using SLOA-HGC by Zerui Liu, Junliang Du, Weisi Dai, Wenke Zhu, Ziqing Ye, Lin Li, Zewei Liu, Linan Hu, Lin Chen, Lixiang Sun

    Published 2025-01-01
    “…Our retinal blood vessel segmentation algorithm enhances microfine vessel extraction, improves edge texture clarity, and normalizes vessel distribution. …”
    Get full text
    Article
  20. 13980

    Reconstruction of Extreme Geomagnetic Storms: Breaking the Data Paucity Curse by M. I. Sitnov, G. K. Stephens, N. A. Tsyganenko, H. Korth, E. C. Roelof, P. C. Brandt, V. G. Merkin, A. Y. Ukhorskiy

    Published 2020-10-01
    “…It is shown that in spite of the strong reduction of the dominant NN number in the new weighted NN algorithm to capture strong storm features, it is still possible to resolve the eastward current and to retrieve plasma pressure distributions. …”
    Get full text
    Article