Showing 14,541 - 14,560 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 14541

    Research on Diameter Protocol Monitoring Scheme of S6a Interface in LTE Network Tester by Chaoyang Wang, Longhan Cao, Zhizhong Zhang

    Published 2014-05-01
    “…Previous networks monitoring technology for CDR synthetic has the problem of insufficient timeliness, so a new CDR synthetic scheme with caching index algorithm and overtime management mechanism was proposed. …”
    Get full text
    Article
  2. 14542

    A characterisation of higher torsion classes by Jenny August, Johanne Haugland, Karin M. Jacobsen, Sondre Kvamme, Yann Palu, Hipolito Treffinger

    Published 2025-01-01
    “…Moreover, we use the characterisation to classify the d-torsion classes associated to higher Auslander algebras of type $\mathbb {A}$ , and give an algorithm to compute them explicitly. The classification is furthermore extended to the setup of higher Nakayama algebras.…”
    Get full text
    Article
  3. 14543

    A Study on Coastline Extraction and Its Trend Based on Remote Sensing Image Data Mining by Yun Zhang, Xueming Li, Jianli Zhang, Derui Song

    Published 2013-01-01
    “…These results show that it is an effective method for carrying out the pretreatment of low-precision remote sensing images by multisource image matching algorithm with SIFT operator, geometric correction on satellite images at scarce control points, and other techniques; the result of the coastline extracted by the edge detection method based on a chromatic aberration Canny operator has a height coincident with the actual measured result; we found that the coastline length of China is predicted to increase in the future by using the grey prediction method, with the total length reaching up to 19,471,983 m by 2015.…”
    Get full text
    Article
  4. 14544

    RESEARCH ON DYNAMIC SYSTEM RELIABILITY MODEL OF HIGH DIMENSIONAL COPULA FUNCTION by FENG Jun, LIU Wei, TAN Long, LI Yi

    Published 2022-01-01
    “…The optimal R-Vine structure is selected by using MST algorithm. The time-varying parameters in the model are described by nonparametric kernel density estimation(KDE). …”
    Get full text
    Article
  5. 14545

    Analysis of Distributed Wireless Sensor Systems with a Switched Quantizer by Hui Sun, Xianyu Wang, Kaixin Yang, Tongrui Peng

    Published 2021-01-01
    “…The proposed estimator based on switched quantitative event-triggered Kalman consensus filtering (KCF) algorithm is used to monitor the aircraft cabin environmental parameters when suffering packet loss and path loss issues during the communication process for WSN. …”
    Get full text
    Article
  6. 14546

    A Comparative Study on TIBA Imputation Methods in FCMdd-Based Linear Clustering with Relational Data by Takeshi Yamamoto, Katsuhiro Honda, Akira Notsu, Hidetomo Ichihashi

    Published 2011-01-01
    “…Relational fuzzy clustering has been developed for extracting intrinsic cluster structures of relational data and was extended to a linear fuzzy clustering model based on Fuzzy c-Medoids (FCMdd) concept, in which Fuzzy c-Means-(FCM-) like iterative algorithm was performed by defining linear cluster prototypes using two representative medoids for each line prototype. …”
    Get full text
    Article
  7. 14547

    Generalized Mixed Equilibrium Problems and Fixed Point Problem for a Countable Family of Total Quasi-ϕ-Asymptotically Nonexpansive Mappings in Banach Spaces by Jinhua Zhu, Shih-Sen Chang, Min Liu

    Published 2012-01-01
    “…The purpose of this paper is first to introduce the concept of total quasi-ϕ-asymptotically nonexpansive mapping which contains many kinds of mappings as its special cases and then to use a hybrid algorithm to introduce a new iterative scheme for finding a common element of the set of solutions for a system of generalized mixed equilibrium problems and the set of common fixed points for a countable family of total quasi-ϕ-asymptotically nonexpansive mappings. …”
    Get full text
    Article
  8. 14548

    Improvement of the Nonparametric Estimation of Functional Stationary Time Series Using Yeo-Johnson Transformation with Application to Temperature Curves by Sameera Abdulsalam Othman, Haithem Taha Mohammed Ali

    Published 2021-01-01
    “…In this article, Box-Cox and Yeo-Johnson transformation models are applied to two time series datasets of monthly temperature averages to improve the forecast ability. An application algorithm was proposed to transform the positive original responses using the first model and the stationary responses using the second model to improve the nonparametric estimation of the functional time series. …”
    Get full text
    Article
  9. 14549

    A four-primary-color micro-LED display with wide color gamut, low blue light hazard, and promise to improve working efficiency in the working conditions by Peiyu Sun, Min Min, Qingfeng Wu, Weijun Huang, Qing Xiao, Wei Xiao, Chaodan Zheng

    Published 2025-01-01
    “…In this study, we use genetic algorithm to search the displays satisfying the demands of health, wide color gamut, and promise to improve working efficiency in the working conditions, when the correlated color temperature is around 6500 K. …”
    Get full text
    Article
  10. 14550

    H∞ Estimation for a Class of Lipschitz Nonlinear Discrete-Time Systems with Time Delay by Huihong Zhao, Chenghui Zhang, Guangchen Wang, Guojing Xing

    Published 2011-01-01
    “…Finally, through guaranteeing the positivity of the minimum, a sufficient condition for the existence of the H∞ estimator is proposed and the estimator is derived in terms of Riccati-like difference equations. The proposed algorithm is proved to be effective by a numerical example.…”
    Get full text
    Article
  11. 14551

    Mobile visual searching method based on ascending extreme learning machine by Haiyang HU, Jun XU, Hua HU

    Published 2016-04-01
    “…Extreme learning machine has emerged as a new technology which overcomes the problems in traditional intelligent field and it has attracted more and more researchers. The algorithm performance of ELM was analyzed firstly,extending the method to image classification field. …”
    Get full text
    Article
  12. 14552

    Limited Incisional Drainage and Negative-Pressure Wound Therapy in an Acute Morel-Lavallée Lesion by Eui-Sung Choi, Jae-Young Yang, Byung-Hyun Ahn

    Published 2021-03-01
    “…However, there is no clearly established treatment algorithm. In the acute stage, it is mainly treated with aspiration, simple compression, and incisional drainage. …”
    Get full text
    Article
  13. 14553

    The Hermitian -Conjugate Generalized Procrustes Problem by Hai-Xia Chang, Xue-Feng Duan, Qing-Wen Wang

    Published 2013-01-01
    “…The representation of the corresponding optimal approximation problem is presented. Finally, an algorithm for solving two problems above is proposed, and the numerical examples show its feasibility.…”
    Get full text
    Article
  14. 14554

    Groebner Bases Based Verification Solution for SystemVerilog Concurrent Assertions by Ning Zhou, Xinyan Gao, Jinzhao Wu, Jianchao Wei, Dakui Li

    Published 2014-01-01
    “…We define a constrained subset of SVAs so that an efficient polynomial modeling mechanism for both circuit descriptions and assertions can be applied. We present an algorithm framework based on the algebraic representations using Groebner bases for concurrent SVAs checking. …”
    Get full text
    Article
  15. 14555

    Exact Interior Reconstruction with Cone-Beam CT by Yangbo Ye, Hengyong Yu, Ge Wang

    Published 2007-01-01
    “…The available projection onto convex set (POCS) algorithm and singular value decomposition (SVD) method can be applied to perform the exact interior reconstruction. …”
    Get full text
    Article
  16. 14556

    Mission Planning Issues of Imaging Satellites: Summary, Discussion, and Prospects by Guohui Zhang, Xinhong Li, Gangxuan Hu, Zhibin Zhang, Jiping An, Wanxin Man

    Published 2021-01-01
    “…By analyzing the existing research results, we can know that the research on task planning mainly focuses on three aspects: research objects, established model, and solution algorithm. Starting from these three aspects vertically and then horizontally, this paper comprehensively discusses the theoretical basis, application, and advantages and disadvantages of related technologies in the research literature in recent years. …”
    Get full text
    Article
  17. 14557

    Research and implementation on college students internet addiction disorder and anti-addict system by Hai-zhuo LIN, Ji-long WANG, Yi-zhe ZHANG, Jing ZHU

    Published 2014-10-01
    “…Based on the traffic analysis on Cernet2,a new discovery mechanism of games service provider IP address is proposed,including Boilerpipe text extraction algorithm and Stanford Chinese NLP,realize this new general method and computing architecture of college student internet addiction.Three kinds of Internet addiction behaviors-online games,video viewing and social networking sites visit,including the total hours spend,length of continuous addiction,frequency,selected time of addiction are analyzed.Concept of Internet addiction disorder index is proposed with quantization on the internet addiction disorder made through AHP.Finally,Internet addiction prevention system is designed and implemented.…”
    Get full text
    Article
  18. 14558

    A study of the stored energy in titanium under deformation and failure using infrared data by A.Yu. Fedorova, M.V. Bannikov, O.A. Plekhov

    Published 2013-04-01
    “…The original mathematical algorithm for experimental data processing has been applied to obtain the rate of heat dissipation generated by plastic deformation and stored energy. …”
    Get full text
    Article
  19. 14559

    DISTRIBUTION OF ADDITIONAL COST AND PROFIT AS THE DECISION-MAKING FACTOR FOR THE INVESTMENT PROJECT by A. Kuznetsov

    Published 2017-10-01
    “…The research presents the scheme and algorithm for pricing structure analysis, which can be performed on the stage of investment project development as well as on any of the execution stages.…”
    Get full text
    Article
  20. 14560

    Smart Approach for Botnet Detection Based on Network Traffic Analysis by Alaa Obeidat, Rola Yaqbeh

    Published 2022-01-01
    “…In this article, we suggest a method for identifying the behavior of data traffic using machine learning classifiers including genetic algorithm to detect botnet activities. By categorizing behavior based on time slots, we investigate the viability of detecting botnet behavior without seeing a whole network data flow. …”
    Get full text
    Article