Showing 14,281 - 14,300 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 14281

    Smart home service perception degradation positioning scheme based on the network resource tree and information entropy by Meng MING, Yu SHI, Runhan ZHENG, Yunxi FENG

    Published 2022-05-01
    “…With the accelerating pace of development of the science and technology and informatization, the smart home market is developing rapidly.It brings great convenience to people’s lives, also brings new operation and maintenance tests to operators.A scheme based on big data and AI algorithm, combined with the network resource tree and information entropy was proposed for perceptual real-time monitoring of smart home services, delimiting, segmenting and locating perceptual degradation class faults, aiming to solve the problems of more end-to-end links of smart home services and difficulties in manual location of group faults and single user faults.…”
    Get full text
    Article
  2. 14282

    Adaptive Semidiscrete Finite Element Methods for Semilinear Parabolic Integrodifferential Optimal Control Problem with Control Constraint by Zuliang Lu

    Published 2013-01-01
    “…Furthermore, we introduce an adaptive algorithm to guide the mesh refinement. Finally, a numerical example is given to demonstrate the theoretical results.…”
    Get full text
    Article
  3. 14283

    Region-of-interest based fast transcoding for mobile video terminals by HE Qiang1, YANG Gao-bo1, ZHANG Zhao-yang3

    Published 2009-01-01
    “…A fast transcoding scheme based on region of interest(ROI) was proposed for mobile video terminals.According to the target displaying size,the ROIs were automatically detected from the input H.264 video stream based on visual attention model in the video server.The video stream was automatically generated at the proxy server by video transcoding for mobile terminals.Moreover,a fast mode decision algorithm was proposed for video transcoding.Experimental results demonstrate that the proposed approach can not only reduce the bandwidth occupation,but also obtain excellent video quality with a low computational complexity.…”
    Get full text
    Article
  4. 14284

    A Fisco-Bcos platform based accurate performance analysis model of blockchain system by Mingrui XU, Yucai YAO, Xiaorong ZHU

    Published 2023-01-01
    “…In order to solve the problems such as difficult to estimate the performance of blockchain system and determine the requirement of hardware facilities, an accurate model of blockchain TPS based on model and data was established under different network structures.Considering the network architecture, the consensus algorithm, the communication of nodes and other elements, the precise model of TPS was established based on the blockchain transaction model of Fisco-Bcos platform and a large amount of actual data fitting.Through the TPS test of the actual blockchain system, the results show that the prediction TPS model established can maintain high prediction accuracy under different network architecture.…”
    Get full text
    Article
  5. 14285

    SSMCI:verification mechanism for security protocols centered on the attacker by Wen GU, Ji-hong HAN, Lin YUAN

    Published 2017-10-01
    “…A automatic verification mechanism for security protocols analysis was proposed.The attacker model was proposed and the concept of ‘need’ was defined,a knowledge set which was necessary for the attacker to compose a target message term but unknown to the attacker.The attacker model was established as needed.The mechanism centered on the attacker was designed,in which whether add a protocol session was determined by the attacker.This might cause contradiction in time sequence,so some back-track algorithm was adopted to solve this contradiction.Experiments show that the system can verify the security of the protocol,and the number of state space is slightly better than the Scyther tool.…”
    Get full text
    Article
  6. 14286

    Boerhaave's Syndrome: Still a Diagnostic and Therapeutic Challenge in the 21st Century by J. Spapen, J. De Regt, K. Nieboer, G. Verfaillie, P. M. Honoré, H. Spapen

    Published 2013-01-01
    “…Based on time of presentation and eventual presence of sepsis, a therapeutic algorithm is proposed.…”
    Get full text
    Article
  7. 14287

    Scheme of node identify authentication in distributed file interaction system by Wen-cai HE, Min DU, Zhi-wei CHEN, Pei-he LIU, Yan-yan HAN

    Published 2013-08-01
    “…Under the mutual identity authentication, a scheme based on distributed cloud storage system was proposed, using symmetric encryption algorithm and hash function to realize bidirectional authentication process. …”
    Get full text
    Article
  8. 14288

    Local relief approximation with deterministic methods for optimizing production facilities layout on rough terrain by V. G. Khomchenko, I. M. Zuga, A. N. Kuzhel, A. O. Stroyev

    Published 2018-09-01
    “…Localization of the relief vicinity is performed algorithmically depending on the current values of the geometric image center coordinates of the certain facility foundation. …”
    Get full text
    Article
  9. 14289

    Modification of Nonlinear Conjugate Gradient Method with Weak Wolfe-Powell Line Search by Ahmad Alhawarat, Zabidin Salleh

    Published 2017-01-01
    “…Based on its simple algorithm, low memory requirement, and the speed of obtaining the solution, this method is widely used in many fields, such as engineering, computer science, and medical science. …”
    Get full text
    Article
  10. 14290

    Submassive Pulmonary Thromboembolism in a Patient with Thrombocytopenia: Therapeutic Challenge by Ronni Andrea Muñoz Tovar, Luis Carlos Alvarez Perdomo, Sandra Milena Rojas Molina, Silvana Jimenez Salazar

    Published 2019-01-01
    “…The case establishes a therapeutic challenge for the treating group, leading us to carry out an extensive search of the literature and propose a management algorithm in this complex situation.…”
    Get full text
    Article
  11. 14291

    Adaptive modulation technology in LTE-Advanced system by Hongguang DUAN, Li HU, Mei TIAN

    Published 2017-07-01
    “…Adaptive modulation technology is an important research content of AMC technology in LTE-Advanced system.The β value of new MCS levels were studied,in which the higher order modulation 256QAM was used,then the general β value of new MCS levels by the iterative algorithm in several different channel models were obtained,according to the convexity of the mean square error function,and compared with the traditional MCS levels.The simulation results show that the new MCS levels provide higher system performance when SNR is high,and the optimized β value makes CQI calculation more accurately.…”
    Get full text
    Article
  12. 14292

    Delving into biomarkers and predictive modeling for CVD mortality: a 20-year cohort study by Zhen Wu, Abdullahi Mohamud Hilowle, Ying Zhou, Changlin Zhao, Shuo Yang

    Published 2025-02-01
    “…This study aims to develop a predictive model for CVD-related mortality using a machine learning-based feature selection algorithm and assess its performance compared to existing models. …”
    Get full text
    Article
  13. 14293

    Design and performance analysis of wireless body area networks in complex indoor e-Health hospital environments for patient remote monitoring by Erik Aguirre, Peio Lopez-Iturri, Leyre Azpilicueta, Carmen Rivarés, José Javier Astrain, Jesús Villadangos, Francisco Falcone

    Published 2016-09-01
    “…Ensuring good performance of the deployed wireless networks in this kind of environment is mandatory and obtaining accurate radio propagation estimations by means of a computationally efficient algorithm is a key issue. For that purpose, an in-house three-dimensional ray launching algorithm is employed, which provides radio frequency power distribution values, power delay profiles, and delay spread values for the complete volume of complex indoor scenarios. …”
    Get full text
    Article
  14. 14294

    EDUCATIONAL TRAINING SIMULATOR FOR MONITORING READING TECHNIQUE AND SPEED BASED ON SPEECH-TO-TEXT (STT) METHODS by Olesia Barkovska, Heorhii Ivashchenko, Dmytro Rosinskiy, Daniil Zakharov

    Published 2024-10-01
    “…The results of testing children with dyslalia, meaning the rearrangement of sounds in words when reading, also showed that the Jaro algorithm has a shorter line comparison time for large text arrays (by 7%). …”
    Get full text
    Article
  15. 14295

    A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks by Umesh Kumar Lilhore, Osamah Ibrahim Khalaf, Sarita Simaiya, Carlos Andrés Tavera Romero, Ghaida Muttashar Abdulsahib, Poongodi M, Dinesh Kumar

    Published 2022-09-01
    “…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”
    Get full text
    Article
  16. 14296

    Organ Donation Conversations on X and Development of the OrgReach Social Media Marketing Strategy: Social Network Analysis by Wasim Ahmed, Mariann Hardey, Josep Vidal-Alaball

    Published 2025-02-01
    “…NodeXL Pro was used to retrieve and analyze the data, and a network visualization was created by drawing upon the Clauset-Newman-Moore cluster algorithm and the Harel-Koren Fast Multiscale layout algorithm. …”
    Get full text
    Article
  17. 14297

    An Object-Oriented Systems Engineering Point of View to Develop Controllers of Quadrotor Unmanned Aerial Vehicles by Ngo Van Hien, Van-Thuan Truong, Ngoc-Tam Bui

    Published 2020-01-01
    “…The Q-UAV dynamics and control architecture are combined with the MDA/MBSE specialization as follows: the Computation Independent Model (CIM) is defined by specifying the use-case model together with the UKF algorithm and hybrid automata to intensively gather the control requirements. …”
    Get full text
    Article
  18. 14298

    Pembangunan Aplikasi Latihan Soal IPA SD dengan Gamifikasi dan Mersenne Twister by Naufal Irfan Hayanto, Seng Hansun

    Published 2020-02-01
    “…The questions generated by this application will be randomly given with the use of Mersenne Twister algorithm so that the chance of getting the same question will be minimize. …”
    Get full text
    Article
  19. 14299

    Displacement of hydrocarbon liquids by water using the models of zonally heterogeneous deformable formations by Marat Ya. Khabibullin, Rustem I. Suleymanov, Razifa R. Stepanova, Alina Az. Gizzatullina, Arsen M. Khabibullin

    Published 2025-01-01
    “…To predict the well flow rate, an algorithm it is necessary to determine the noted reservoir parameters at any time. …”
    Get full text
    Article
  20. 14300

    Automated Analysis of Service Life of Air-Lines of the Electricity Transmission of Electric Power Systems by E. M. Farhadzadeh, A. Z. Muradaliyev, S. A. Abdullayeva, A. A. Nazarov

    Published 2021-10-01
    “…The methodology and algorithm of methodological support of the management of electric power systems and grid enterprises in the organization of operation, maintenance and repair have been developed.…”
    Get full text
    Article