Showing 14,581 - 14,600 results of 19,511 for search '"algorithms"', query time: 0.10s Refine Results
  1. 14581

    New design paradigm for federated edge learning towards 6G:task-oriented resource management strategies by Zhiqin WANG, Jiamo JIANG, Peixi LIU, Xiaowen CAO, Yang LI, Kaifeng HAN, Ying DU, Guangxu ZHU

    Published 2022-06-01
    “…In addition, the proposed single-device scheduling algorithm is also extended to multi-device scheduling scenarios. …”
    Get full text
    Article
  2. 14582

    Automated Internal Defect Identification and Localization Based on a Near-Field SAR Millimeter-Wave Imaging System by Quoc Cuong Bui, Weizhi Lin, Qiang Huang, Gyung-Su Byun

    Published 2025-01-01
    “…The compact design of the radar system enables seamless integration with larger scanning systems, while the automated detection algorithm can be readily implemented as a software module within existing sensing systems. …”
    Get full text
    Article
  3. 14583

    Implementasi Algoritma TOPSIS dan Metode EUCS untuk Pengujian Sistem Penilaian Kinerja Pegawai pada Laboran Fakultas Teknologi Informasi UKSW Salatiga by Andreas Arga Rinjani Saputro, Kristoko Dwi Hartomo

    Published 2020-12-01
    “…For counter the problem in laboratory employee and help in performance management, made information system based on website which contain implementation of the TOPSIS algorithm on performance rating of the laboratory employee. …”
    Get full text
    Article
  4. 14584

    Quantifying Spatiotemporal Changes in Supraglacial Debris Cover in Eastern Pamir from 1994 to 2024 Based on the Google Earth Engine by Hehe Liu, Zhen Zhang, Shiyin Liu, Fuming Xie, Jing Ding, Guolong Li, Haoran Su

    Published 2025-01-01
    “…The classification algorithm integrates spectral features from Landsat images and derived indices (NDVI, NDSI, NDWI, and BAND RATIO), supplemented by auxiliary factors such as slope and aspect. …”
    Get full text
    Article
  5. 14585
  6. 14586

    Penerapan Algoritme Nearest Centroid Neighbor Classifier Based on K Local Means Using Harmonic Mean Distance (LMKHNCN) Untuk Klasifikasi Hasil Kinerja Pegawai Negeri Sipil by Adam Syarif Hidayatullah, Fitra Abdurrachman Bachtiar, Imam Cholissodin

    Published 2021-11-01
    “…This method is proven to have better performance compared to it original algorithm KNN. The method in this study has produced good classification performance. …”
    Get full text
    Article
  7. 14587

    Energy-Saving Metro Train Timetable Optimization Method Based on a Dynamic Passenger Flow Distribution by Jingshuang Li, Fuquan Pan, Hailiang Tang, Sen Tong, Lixia Zhang, Xinguang Li, Xiaoxia Yang

    Published 2022-01-01
    “…A particle swarm optimization and genetic algorithm (PSO-GA) structure is designed to solve the model. …”
    Get full text
    Article
  8. 14588

    An Efficient K-Best MIMO Detector for Large Modulation Constellations by Yu-Xin Liu, Shih-Jie Jihang, Yeong-Luh Ueng

    Published 2024-01-01
    “…A bisection-based search algorithm is used to obtain the locations of the <inline-formula> <tex-math notation="LaTeX">$K$ </tex-math></inline-formula> surviving candidates. …”
    Get full text
    Article
  9. 14589

    Enhancing cotton irrigation with distributional actor–critic reinforcement learning by Yi Chen, Meiwei Lin, Zhuo Yu, Weihong Sun, Weiguo Fu, Liang He

    Published 2025-02-01
    “…This study introduces a novel intelligent irrigation approach based on distributional reinforcement learning, ensuring that the algorithm simultaneously considers weather, soil, and crop conditions to make optimal irrigation decisions for long-term benefits. …”
    Get full text
    Article
  10. 14590

    THE ROLE OF DISPOSITION OF CONNECTING TISSUE IN THE RISE OF NONTRAUMATIC SUBARACHNOIDAL HEMORRHAGE IN YOUNG AGE by E. V. Petrova, T. F. Popova, I. A. Gribacheva, G. K. Taitubayeva

    Published 2018-06-01
    “…The obtained data can become a basis for developing an algorithm for screening physical examination of patients with an increased risk of aneurysmal hemorrhage.…”
    Get full text
    Article
  11. 14591

    Cooperative Overbooking-Based Resource Allocation and Application Placement in UAV-Mounted Edge Computing for Internet of Forestry Things by Xiaoyu Li, Long Suo, Wanguo Jiao, Xiaoming Liu, Yunfei Liu

    Published 2024-12-01
    “…In 2CROB, an aggregated-resource-demand minimization problem is modeled, and a bisection search algorithm is designed to obtain the minimized aggregated resource demand. …”
    Get full text
    Article
  12. 14592

    Application of Image Denoising Method Based on Two-Way Coupling Diffusion Equation in Public Security Forensics by Yiqun Wang, Changpeng He, Zhenjiang Li

    Published 2021-01-01
    “…We combined the adaptive edge threshold and stop criterion to establish a new denoising algorithm model, which can get better denoising results. …”
    Get full text
    Article
  13. 14593
  14. 14594

    The accuracy of an Online Sequential Extreme Learning Machine in detecting voice pathology using the Malaysian Voice Pathology Database by Nur Ain Nabila Za’im, Fahad Taha AL-Dhief, Mawaddah Azman, Majid Razaq Mohamed Alsemawi, Nurul Mu′azzah Abdul Latiff, Marina Mat Baki

    Published 2023-09-01
    “…These voice samples were used to train and test the proposed OSELM algorithm. The performance of OSELM was evaluated and compared with other classifiers in terms of the accuracy, sensitivity, and specificity of detecting and differentiating dysphonic voices. …”
    Get full text
    Article
  15. 14595

    The Impact of Truck Proportion on Traffic Safety Using Surrogate Safety Measures in China by Shengdi Chen, Shiwen Zhang, Yingying Xing, Jian Lu, Yichuan Peng, H. Michael Zhang

    Published 2020-01-01
    “…In addition, the k-means algorithm and the support vector machine can well reveal the impact of truck proportion on traffic safety in different periods. …”
    Get full text
    Article
  16. 14596

    Effectiveness of implementation of sickle cell disease referral guidelines and other measures in paediatric department at a tertiary hospital in Saudi Arabia by Muhammad Matloob Alam, Abdulrhman Alathaibi, Hamdan Alghamdi, Jean Barrientos De Asis, Reynan Bautista, Mansour Aladwani, Mustafa Mohamed Selim

    Published 2025-01-01
    “…The PHO team developed a Clinical Pathway Guidelines (CPG), algorithm for early SCD detection and consultation form for suspected patients with SCD. …”
    Get full text
    Article
  17. 14597

    Simulation Analysis of the Influence of Tooth Surface Pit Morphology on the Dynamics Performance of Face Gear Mesh by He Guoqi, Deng Shujie, He Ying, Yan Hongzhi, Sun Neng, Wang Qilei

    Published 2016-01-01
    “…The three dimensional solid model of the face gear with different pit morphology and the simulation model of the face gear transmission system of the pit morphology are established,through the contact collision algorithm of multi- body dynamics,the change regularity of meshing force and output speed of the different pit morphology face gear transmission under certain condition is analyzed.The results show that the influence of the circular pit morphology on the transmission system meshing force is the smallest,the value of transmission error is the lowest,so the transmission stability is optimal.And the experimental conclusion is consistent with the simulation results,the correctness of the simulation is verified.A reasonable basis of oil- lack lubrication model of face gear with pit morphology in the future is provided by the results.…”
    Get full text
    Article
  18. 14598

    A Total Variation Model Based on the Strictly Convex Modification for Image Denoising by Boying Wu, Elisha Achieng Ogada, Jiebao Sun, Zhichang Guo

    Published 2014-01-01
    “…Additional distinction from the other methods is that the parameters, for manual manipulation, in the proposed algorithm are reduced to basically only one.…”
    Get full text
    Article
  19. 14599

    Host security threat analysis approach for network dynamic defense by Lixun LI, Bin ZHANG, Shuqin DONG

    Published 2018-04-01
    “…Calculating the host security threat in network dynamic defense (NDD) situation has to consider the vulnerabilities’ uncertainty because of dynamic mutation.Firstly,the vulnerabilities’ uncertainty caused by the mutation space and the mutation period was calculated by random sampling model,and combined with the CVSS,the attack success probability formula of single vulnerability was derived.Secondly,to avoid self-loop during the path searching process in multiple vulnerabilities situation,an improved recursive depth first algorithm which combined with node visited queue was proposed.Then,the host security threat was calculated based on attack success probability in the situation of multiple vulnerabilities and paths.Finally,approach’s availability and effectiveness were verified by an experiment conducted in a typical NDD situation.…”
    Get full text
    Article
  20. 14600

    Exploration and Analysis of Resource Scheduling and Management Mode in Future Space TT&C Network by Hong ZHANG, Jia XUE, Bo REN, Xiaojun DU, Meng XUE

    Published 2023-12-01
    “…The running mode and existing issues of current resource scheduling system operation model of TT&amp;C network were discussed firstly.Then the development trends of future resource scheduling and management models were summarized, included integration of data transmission, automation of system operation, intelligence of algorithm allocation, coexistence of random access and pre-allocation.In the end, accorded to the management demands of integration, automation and intelligentization, the operating framework of the future resource scheduling model was put forward.After that, the key technologies which need to be broken through of the framework were researched deeply.And the further construction object of resource scheduling research was proposed in order to provided a reference for subsequent engineering applications.…”
    Get full text
    Article