Showing 14,321 - 14,340 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 14321

    Fuzzy Logic Recommender Model for Housing by Emanuel G. Munoz, Jaime Meza, Sebastian Ventura

    Published 2025-01-01
    “…This algorithm selects the properties displayed to the user on the basis of natural features extracted from real estate platforms by means of web scraping techniques. …”
    Get full text
    Article
  2. 14322

    Deteksi Gulma Berdasarkan Warna HSV dan Fitur Bentuk Menggunakan Jaringan Syaraf Tiruan by Hurriyatul Fitriyah, Rizal Maulana

    Published 2021-10-01
    “…Here in this research, we develop an algorithm that detects weeds among the plants based on the shape of their leaves. …”
    Get full text
    Article
  3. 14323

    An Optimization Coverage Strategy for Wireless Sensor Network Nodes Based on Path Loss and False Alarm Probability by Jianing Guo, Yunshan Sun, Ting Liu, Yanqin Li, Teng Fei

    Published 2025-01-01
    “…Based on this perception model, the optimization objective function of the WSN node optimization coverage problem is established, and then the intelligent optimization algorithm is used to solve the objective function and finally achieve the optimization coverage of sensor nodes. …”
    Get full text
    Article
  4. 14324

    Green Apple Detection Method Based on Multidimensional Feature Extraction Network Model and Transformer Module by Wei Ji, Kelong Zhai, Bo Xu, Jiawen Wu

    Published 2025-01-01
    “…The test results show that the algorithm proposed in this article exhibits great potential in the task of detecting pollution-free near-color fruits by the picking robot. …”
    Get full text
    Article
  5. 14325

    Application of Video Processing Technology Based on Diffusion Equation Model in Basketball Analysis by Yafeng Feng, Xianguo Liu

    Published 2021-01-01
    “…In the study of basketball segmentation of close-up shots, we propose an improved Hough transform method based on a variable direction filter, which can effectively extract the center and radius of the basketball. The algorithm has good robustness to basketball partial occlusion and motion blur. …”
    Get full text
    Article
  6. 14326

    Joint Research on Clock Synchronization and Localization in Wireless Sensor Network with Stochastic Exponentially Distributed Noise by Xiang Zhao, Jiming Lin

    Published 2014-10-01
    “…The result is derived via simulation: JMLE and JBLUE are always superior to the latest joint algorithm, with the highest estimation accuracy.…”
    Get full text
    Article
  7. 14327

    Optical Measurement of Cable and String Vibration by Y. Achkire, A. Preumont

    Published 1998-01-01
    “…On the other hand, the optical sensor is used to evaluate the performance of an active tendon control algorithm with guaranteed stability properties. It is demonstrated experimentally, that a force feedback control law based on a collocated force sensor measuring the tension in the cable is feasible and provides active damping in the cable.…”
    Get full text
    Article
  8. 14328

    Deep packet inspection oriented high speed packet parsing architecture by Yong-ji DONG, Yun-fei GUO, Wan-wei HUANG, Hui-qun HUANG

    Published 2013-06-01
    “…Thirdly, a node mapping algorithm was used to balance the number of nodes on all pipeline stages to optimize the storage space. …”
    Get full text
    Article
  9. 14329

    Design and application of electrocardiograph diagnosis system based on multifractal theory by Chun-kai ZHANG, Ao,ZHANGJing-wang YIN, Pan-bo TIAN, Ying ZHOU, Chang-qing QI

    Published 2017-10-01
    “…An automatic segmentation algorithm for ECG data using differential threshold method was designed,which could identify the various ECG cycles of continuous ECG data.And it could obtain the multifractal features of multiple fractal and generalize hurst index feature of ECG data,these features were used to train artificial neural network in order to classify ECG data,the accuracy of the classifier could reach 97%.An ECG diagnosis system was implemented,which can automatically identify ECG sequences that contain multiple ECG cycles,and can automatically ignore the incomplete ECG cycle data,and could annotate every cycle of ECG data.…”
    Get full text
    Article
  10. 14330

    Precision Compensation Method of Tooth Profile in Form Grinding of Modified Helical Gears by Zhang Hao, Su Jianxin, Deng Xiaozhong, Han Zhengyang

    Published 2024-02-01
    “…The coordinate equation of helical gear tooth profile modification and geometric algorithm of form grinding wheel dressing are established, and the section profile of grinding wheel after tooth profile modification is optimized. …”
    Get full text
    Article
  11. 14331

    Geostatistical Analysis Methods for Estimation of Environmental Data Homogeneity by Aleksandr Danilov, Inna Pivovarova, Svetlana Krotova

    Published 2018-01-01
    “…As a result, the greatest environmental stress zones were isolated and correct zoning using geostatistical analysis techniques was proved. Mathematical algorithm computing system was implemented in an object-oriented programming C #. …”
    Get full text
    Article
  12. 14332

    Risk-adaptive access control model for big data in healthcare by Zhen HUI, Hao LI, Min ZHANG, Deng-guo FENG

    Published 2015-12-01
    “…While dealing with the big data in healthcare,it was difficult for a policy maker to foresee what information a doctor may need,even to make an accurate access control policy.To deal with it,a risk-based access control model that regulates doctors’ access rights adaptively was proposed to protect patient privacy.This model analyzed the history of access,applies the EM algorithm and the information entropy technique to quantify the risk of privacy violation.Using the quantified risk,the model can detect and control the over-accessing and exceptional accessing of patients’ data.Experimental results show that this model is effective and more accurate than other models.…”
    Get full text
    Article
  13. 14333

    Privacy preserving approach based on proximity privacy for numerical sensitive attributes by Jing XIE, Jian-pei ZHANG, Jing YANG, Bing ZHANG

    Published 2015-04-01
    “…A model based on proximity breach for numerical sensitive attributes is proposed.At first,it divides numerical sensitive value into several intervals on the premise of protecting the internal relations between quasi-identifier attributes and numerical sensitive attributes.Secondly,it proposes a (k,ε)-proximity privacy preserving principle to defense proximity privacy.In the end,a maximal neighborhood first algorithm (MNF) is designed to realize the (k,ε)-proximity.The experiment results show that the proposed model can preserve privacy of sensitive data well meanwhile it can also keep a high data utility and protect the internal relations.…”
    Get full text
    Article
  14. 14334

    Single X-ray Projection Material Decomposition using a Mesh Projector by Fleur Linsen, Domenico Iuso, Jan Sijbers

    Published 2025-02-01
    “…A stochastic gradient descent algorithm is used to iteratively minimize the error between a scanned radiograph and a simulated polychromatic radiograph, enabling the estimation of mass fractions. …”
    Get full text
    Article
  15. 14335

    A Vision-Based Method for Autonomous Landing of a Rotor-Craft Unmanned Aerial Vehicle by Z. Yuan, Z. Gong, J. Chen, J. Wu

    Published 2006-01-01
    “…In the process of designing the pattern of landing target, we have fully considered how to make this easier for simplified identification and calibration. A linear algorithm was also applied using a three-dimensional structure estimation in real time. …”
    Get full text
    Article
  16. 14336

    Research on trust sensing based secure routing mechanism for wireless sensor network by Dan-yang QIN, Shuang JIA, Song-xiang YANG, Jing-ya MA, Yan ZHANG, Qun DING

    Published 2017-10-01
    “…Aiming at the serious impact of the typical network attacks caused by the limited energy and the poor deployment environment of wireless sensor network (WSN) on data transmission,a trust sensing based secure routing mechanism (TSSRM) with the lightweight characteristics and the ability to resist many common attacks simultaneously was proposed.Based on the analysis of the characteristics of network attack,the trust degree calculation model was constructed by combining node’s behavior with energy,at the same time the security route selection algorithm was also optimized by taking trust degree and QoS metrics into account.Performance analysis and simulation results show that TSSRM can improve the security and effectiveness of WSN.…”
    Get full text
    Article
  17. 14337

    STUDY AND APPLICATIONS OF DETECTION METHOD FOR MACHINING QUALITY OF HELICAL SURFACE by DONG ZongZheng, KUANG YuChun, ZHANG Cong, YU JiangHai

    Published 2017-01-01
    “…To ensure the accuracy and efficiency,the model algorithm and data input and visualization is completed. …”
    Get full text
    Article
  18. 14338

    Stochastic modeling of structural fatigue damage in High Strength Steel structures by Jiri Brozovsky, Martin Krejsa, Petr Lehner, Premysl Parenica, Stanislav Seitl

    Published 2025-01-01
    “…Description of the parallel algorithm is provided, and the functionality of the method is shown in an example case. …”
    Get full text
    Article
  19. 14339

    Application of finite-difference methods to parameter identification of agroecological models by Natalija Juščenko, Vitalijus Denisov

    Published 2001-12-01
    “…The derived recurrent formulas allow the accumulation of values of gradient and Hessian matrices while solving the direct problem. The software algorithm is described and some numerical results are given for the particular soil heat transfer parameter estimation exercise using the field treatment data collected at the Lithuanian Institute of Agriculture. …”
    Get full text
    Article
  20. 14340

    Solutions of the Force-Free Duffing-van der Pol Oscillator Equation by Najeeb Alam Khan, Muhammad Jamil, Syed Anwar Ali, Nadeem Alam Khan

    Published 2011-01-01
    “…The proposed method introduces an alternative framework designed to overcome the difficulty of capturing the behavior of the solution and give a good approximation to the solution for a large time. The Runge-Kutta algorithm was used to solve the governing equation via numerical solution. …”
    Get full text
    Article