Showing 14,001 - 14,020 results of 19,511 for search '"algorithms"', query time: 0.10s Refine Results
  1. 14001

    POS Tagging Bahasa Madura dengan Menggunakan Algoritma Brill Tagger by Nindian Puspa Dewi, Ubaidi Ubaidi

    Published 2020-12-01
    “…POS Tagging with Brill Tagger Algorithm can provide the appropriate word class to word using lexical and contextual rule. …”
    Get full text
    Article
  2. 14002

    Uridine-cytidine kinase 2 is correlated with immune, DNA damage repair and promotion of cancer stemness in pan-cancer by Jinlong Tian, Yanlei Li, Yu Tong, Yuan Zhang, Tingxiao Zhao, Yao Kang, Qing Bi

    Published 2025-01-01
    “…We also discover an association between UCK2 expression and immune cells by CIBERSORT algorithm, ESTIMATE algorithm and ssGSEA algorithm, especially, related to T cell, monocytes, mast cells, and macrophages. …”
    Get full text
    Article
  3. 14003

    Analisis Asosiasi Untuk Menemukan Pola Pada Terapi Obat Pasien Dengan Menggunakan Metode Apriori by Evi Dewi Sri Mulyani, Teuku Mufizar, Sarmidi Sarmidi, Cepi Rahmat Hidayat, Dede Syahrul Anwar, Rofi Chaeruddin

    Published 2023-04-01
    “…Based on this, an analysis was carried out using the Association method in finding relationships in drug therapy data using the Apriori algorithm, this algorithm works by studying association rules, namely by looking for relationships between one or more in an itemset. …”
    Get full text
    Article
  4. 14004

    Penerapan Metode Association Rule Mining untuk Asosiasi Ulasan Terhadap Aspek Tempat Wisata Jawa Timur Park 3 by Aisyatul Maulidah, Fitra A. Bachtiar

    Published 2021-10-01
    “…This technique is most popular for finding hidden relationships between variables. The algorithm used in this study is apriori algorithm because it is the most efficient. …”
    Get full text
    Article
  5. 14005

    Health-Related Quality of Life in Long COVID: Mapping the Condition-Specific C19-YRSm Measure Onto the EQ-5D-5L by Smith AB, Greenwood DC, Williams P, Kwon J, Petrou S, Horton M, Osborne T, Milne R, Sivan M

    Published 2025-01-01
    “…The aim of this study was to derive a mapping algorithm for the C19-YRSm to enable health utilities to be generated from this PROM.Methods: Data were collected from a large study evaluating LC services in the UK. …”
    Get full text
    Article
  6. 14006

    Range matching method based on TCAM:C-TCAM by Guo-sheng ZHU, Shao-hua YU

    Published 2012-01-01
    “…A new TCAM range matching method called C-TCAM(compressed TCAM) was proposed.Firstly C-TCAM could compress two expanded TCAM entries into one and the expansion factor of w-1 and w-2 respectively in the worst case.Secondly,a new TCAM matching algorithm to lower down the power dissipation was designed by avoiding matching of unnessary TCAM entries.Analysis and simul ion showed that C-TCAM gets advantages over other schemes in TCAM space efficiency and power dissipation.…”
    Get full text
    Article
  7. 14007

    Analysis of methods for ischemic stroke region recognition on CT slices by Aleksandras Krylovas, Andrius Ušinskas, Virginija Gaigalaitė

    Published 2005-12-01
    “…Presented evaluation is completed by using an algorithm of fuzzy sets. Performed analysis of 20 methods with modifications showed, that gray level co-occurrence matrix method and hybrid method give highest rates. …”
    Get full text
    Article
  8. 14008

    Survey on approaches of stream cipher cryptanalysis by Zhaocun ZHOU, Dengguo FENG

    Published 2022-11-01
    “…Cryptanalysis plays an essential role in the design of ciphers algorithm.Based on this, the common approaches were reviewed and investigated to clarify their relations.These approaches were categorized into four classes according to their main techniques, i.e., the correlation-based approaches, the differentials-based approaches, the algebraic-equations-based approaches and the time-memory data trade-off (TMDTO) approaches.And their principles, basic technical ideas and developments were presented, and their main features were summarized.Moreover, the future of stream cipher cryptanalysis approach was prospected at last.…”
    Get full text
    Article
  9. 14009

    A real time approach to user interest classification using DPI by Kang CHEN, Huazheng FU, Chong CHEN, Yuyi ZHANG, Yu WEI

    Published 2016-12-01
    “…A DPI data classification method was presented, which combined the URL classification model based on mixed n-gram features and the Doc2Vec based text classification algorithm. The DPI data classification speed and classification accuracy were greatly improved, and good support for precise marketing was provided.…”
    Get full text
    Article
  10. 14010

    Interval Continuous Plant Identification from Value Sets by R. Hernández, J. A. García, C. Mañoso

    Published 2012-01-01
    “…Moreover, it is proven that given a value set, all the assigned polynomials of the vertices can be determined if and only if there is a complete edge or a complete arc lying on a quadrant. This algorithm is nonconservative in the sense that if the value-set boundary of an interval plant is exactly known, and particularly its vertices, then the Kharitonov rectangles are exactly those used to obtain these value sets.…”
    Get full text
    Article
  11. 14011

    Implementation of a Three-Dimensional Pedometer Automatic Accumulating Walking or Jogging Motions in Arbitrary Placement by Jia-Shing Sheu, Wei-Cian Jheng, Chih-Hung Hsiao

    Published 2014-01-01
    “…The user’s motion state is calculated using a walk/run mode switching algorithm.…”
    Get full text
    Article
  12. 14012

    Optimization of Gain, Impedance, and Bandwidth of Yagi-Uda Array Using Particle Swarm Optimization by Munish Rattan, Manjeet Singh Patterh, B. S. Sohi

    Published 2008-01-01
    “…It is a global optimization technique-like genetic algorithm (GA) but has less computational cost compared to GA. …”
    Get full text
    Article
  13. 14013

    The use of technical vision in flexible production systems to determine coordinates of randomly located objects by K. V. Averkov, D. S. Makashin

    Published 2023-06-01
    “…The article is devoted to the development of an object recognition algorithm using technical vision using Python and the OpenCV computer vision library. …”
    Get full text
    Article
  14. 14014

    Construction of Fusion Frame Systems in Finite Dimensional Hilbert Spaces by Jinsong Leng, Tingzhu Huang

    Published 2014-01-01
    “…We first investigate the construction of a fusion frame system in a finite-dimensional Hilbert space 𝔽n when its fusion frame operator matrix is given and provides a corresponding algorithm. The matrix representations of its local frame operators and inverse frame operators are naturally obtained. …”
    Get full text
    Article
  15. 14015

    Fractional Integration via Picard Method for Solving Fractional Differential-Algebraic Systems by Susan H. Mohammad, Abdulghafor Mohammed Al-Rozbayani

    Published 2024-01-01
    “…By comparing the results with the exact solution, it was found that this method is highly efficient for finding solutions. Also, a genetic algorithm (GA) was used to speed up the approximate solutions when choosing the best values for the fractional derivative, which increased the efficiency of Picard’s fractional integral method in finding the best solutions. …”
    Get full text
    Article
  16. 14016

    3D Printing Errors Detection During the Process by Florin-Bogdan MARIN, Mihaela MARIN

    Published 2024-06-01
    “…In this paper, a computer vision algorithm able to detect specific errors is proposed.…”
    Get full text
    Article
  17. 14017

    Effective cooperative scheme based on relay selection by YU Fei1, YANG Lv-xi1

    Published 2010-01-01
    “…Based on the capacity of multi-access channel,a relay selection algorithm was proposed.It was proposed that: relays were selected according to the eigenvalue decomposition of the equivalent relay-destination channel,and the beamforming vectors were designed in a distributed manner.It could be seen that joint processing and information trans-mission between multiple relays were avoided,which could reduce system complexity.Simulation results show that the system proposed can achieve better bit error rate(BER) comparing to the one with multi-relay parallel transmission.…”
    Get full text
    Article
  18. 14018

    Simulation Analysis of RES System Optimization Strategy of Range-extended Electric Vehicle by Xing Zhongyi

    Published 2015-01-01
    “…Based on the working modes of the transmission system of range-extended electric vehicle,the map of internal combustion engine and battery system characters are obtained through calculation,the main components of transmission are set up in Matlab on the basis of dynamics equation,and the model is analyzed,the genetic algorithm is combined into control strategy in order to optimize the start-close area of range extended system.The simulation results show that the optimized strategy can not only improve the fluctuation range of SOC,but also improve the fuel consumption of transmission system.…”
    Get full text
    Article
  19. 14019

    An improvement on the efficiency bounds and efficiency classifications in DEA with imprecise data by Bohlool Ebrahimi, Duško Tešić

    Published 2024-12-01
    “…To overcome the problems, we propose a simple, practical algorithm to estimate the expected value of efficiencies, which is inspired by considering the DEA axioms to the imprecise data.…”
    Get full text
    Article
  20. 14020

    An Improved Backward/Forward Sweep Power Flow Method Based on a New Network Information Organization for Radial Distribution Systems by Saad Ouali, Abdeljabbar Cherkaoui

    Published 2020-01-01
    “…This paper presents a load flow algorithm based on the backward/forward sweep principle, flexible with network topology changes, with an improvement in ensuring a minimum number of searching for connections between nodes in the calculation sequence in the forward and the backward sweep, by organizing the radial distribution system information into a main line and its derivations. …”
    Get full text
    Article