Showing 15,601 - 15,620 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 15601

    Klasifikasi Ulasan Palsu Menggunakan Borderline Over Sampling (BOS) dan Support Vector Machine (SVM) (Studi Kasus : Ulasan Tempat Makan) by Aisyah Awalina, Fitra Abdurrachman Bachtiar, Indriati Indriati

    Published 2022-02-01
    “…However, many of these spam review datasets are imbalanced and thus may affect classification results. In this study, BOS algorithm was used to overcome data imbalances, and SVM algorithm for the classification of spam reviews. …”
    Get full text
    Article
  2. 15602

    Investigation of the use of a sensor bracelet for the presymptomatic detection of changes in physiological parameters related to COVID-19: an interim analysis of a prospective coho... by Stefanie Aeschbacher, David Conen, Diederick E Grobbee, Raphael Twerenbold, Thomas Lung, Theo Rispens, Jakob Kjellberg, Lorenz Risch, Martin Risch, Marianna Mitratza, Harald Renz, Spiros Denaxas, Billy Franks, Diederick Grobbee, Martina Rothenbühler, Janneke Wijgert, Santiago Montes, Richard Dobson, Hans Reitsma, Christian Simon, Titia Leurink, Charisma Hehakaya, Patricia Bruijning, Kirsten Grossmann, Ornella C Weideli, Marc Kovac, Fiona Pereira, Nadia Wohlwend, Corina Risch, Dorothea Hillmann, Daniel Leibovitz, Vladimir Kovacevic, Andjela Markovic, Paul Klaver, Timo B Brakenhoff, George S Downward, Ariel Dowling, Maureen Cronin, Brianna M Goodale, Brianna Goodale, Ornella Weideli, Regien Stokman, Hans Van Dijk, Eric Houtman, Jon Bouwman, Kay Hage, Lotte Smets, Marcel van Willigen, Maui Chodura, Niki de Vink, Tessa Heikamp, Timo Brakenhoff, Wendy van Scherpenzeel, Wout Aarts, Alison Kuchta, Antonella Chiucchiuini, Steve Emby, Annemarijn Douwes, George Downward, Nathalie Vigot, Pieter Stolk, Duco Veen, Daniel Oberski, Amos Folarin, Pablo Fernandez Medina, Eskild Fredslund

    Published 2022-06-01
    “…Our proposed RNN algorithm identified 68% of COVID-19 positive participants 2 days prior to SO and will be further trained and validated in a randomised, single-blinded, two-period, two-sequence crossover trial.Trial registration numberISRCTN51255782; Pre-results.…”
    Get full text
    Article
  3. 15603

    Supply Capability Evaluation of Intelligent Manufacturing Enterprises Based on Improved BP Neural Network by Quan Quan, Zhongqiang Zhang

    Published 2022-01-01
    “…In this paper, based on the traditional backpropagation (BP) neural network, combined with the improved particle swarm optimization (PSO) algorithm, and on the basis of the supplier evaluation index system, the supplier efficiency evaluation model of intelligent manufacturing enterprises based on DPMPSO-BP neural network is constructed. …”
    Get full text
    Article
  4. 15604

    Hidden Markov model based P2P flow identification technique by Bo XU, Ming CHEN, Xiang-lin WEI

    Published 2012-06-01
    “…To identify various P2P flows accurately in real-time,a hidden Markov model(HMM)based P2P flow identification technique was proposed.This approach made use of packet size,inter-arrival time and arrival order to construct flow identification model,in which discrete random variable was used to depict the characteristics of HMM state.A framework called HMM-FIA was proposed,which could identify various P2P flows simultaneously.Meanwhile,the algorithm for selecting the number of HMM state was designed.In a controllable experimental circumstance in the campus network,HMM-FIA was utilized to identify P2P flows and was compared with other identification methods.The results show that discrete random variable can decrease the model constructing time and improve the time-cost and accuracy in identifying unknown flows,HMM-FIA can correctly identify the packet flows produced by various P2P protocols and it can be adaptive to different network circumstance.…”
    Get full text
    Article
  5. 15605

    Surrogate Assisted Design Optimization of an Air Turbine by Rameez Badhurshah, Abdus Samad

    Published 2014-01-01
    “…A Reynolds-averaged Navier Stokes solver was used to evaluate the objective function responses, and these responses along with the design variables were used to construct the Kriging variants and RSA functions. A hybrid genetic algorithm was used to find the optimal point in the design space. …”
    Get full text
    Article
  6. 15606

    Application of Fast P2P Traffic Recognition Technology Based on Decision Tree in the Detection of Network Traffic Data by Lin Zheng, Junjiao Li

    Published 2022-01-01
    “…Based on the research of traffic identification in recent years, a fast P2P network traffic anomaly identification algorithm based on decision tree model is proposed, which improves the efficiency and accuracy of network traffic application identification and network traffic anomaly data identification.…”
    Get full text
    Article
  7. 15607

    A New Spectral Local Linearization Method for Nonlinear Boundary Layer Flow Problems by S. S. Motsa

    Published 2013-01-01
    “…We propose a simple and efficient method for solving highly nonlinear systems of boundary layer flow problems with exponentially decaying profiles. The algorithm of the proposed method is based on an innovative idea of linearizing and decoupling the governing systems of equations and reducing them into a sequence of subsystems of differential equations which are solved using spectral collocation methods. …”
    Get full text
    Article
  8. 15608

    Trusted cloud platform management model based onTPMalliance by Jun-feng TIAN, Fang-shu CHANG

    Published 2016-02-01
    “…It usedTPMand authentication encryption technology to solve trusted transmission problem of data among nodes inTPMalliance, and a management strategy of time-based treeTPMalliance was proposed, including node configuration protocol, node registration protocol, node logout protocol, node state real-time monitor protocol, trusted nodes management network repair protocol, node update protoc explains the production algorithm of time-based tree, analyses the effectiveness of the time cost of building trusted node management network and monitoring of node state. …”
    Get full text
    Article
  9. 15609

    Influence of Parameter on Dynamic Load and Load Sharing Characteristic of Split Torque-combine Power Gear Transmission System by He Lin, Sanmin Wang

    Published 2019-05-01
    “…By applying the fourth order Runge-Kutta algorithm to solve the system dimensionless dynamical equations, dynamic load characteristic is analyzed under the excitations of backlash, general transmission error and time-varying mesh stiffness. …”
    Get full text
    Article
  10. 15610

    Beamforming and resource optimization in UAV integrated sensing and communication network with edge computing by Bin LI, Sicong PENG, Zesong FEI

    Published 2023-09-01
    “…To address the dependence of traditional integrated sensing and communication network mode on ground infrastructure, the unmanned aerial vehicle (UAV) with edge computing server and radar transceiver was proposed to solve the problems of high-power consumption, signal blocking, and coverage blind spots in complex scenarios.Firstly, under the conditions of satisfying the user’s transmission power, radar estimation information rate and task offloading proportion limit, the system energy consumption was minimized by jointly optimizing UAV radar beamforming, computing resource allocation, task offloading, user transmission power, and UAV flight trajectory.Secondly, the non-convex optimization problem was reformulated as a Markov decision process, and the proximal policy optimization method based deep reinforcement learning was used to achieve the optimal solution.Simulation results show that the proposed algorithm has a faster training speed and can reduce the system energy consumption effectively while satisfying the sensing and computing delay requirements.…”
    Get full text
    Article
  11. 15611

    ANN Approach to Predict the Flow Stress of CMn (Nb-Ti-V) Micro Alloyed Steel by Allaoui Abdelhalim, Guedri Abdelmoumene, Darsouni Lamia, Darsouni Abderrazek

    Published 2019-07-01
    “…The ANN model was trained with Levenberg-Marquardt (LM) algorithm. The optimal LM neural network model with two hidden layer network with ten neurons in the ?…”
    Get full text
    Article
  12. 15612

    Design of PI Controller for Voltage Controller of Four-Phase Interleaved Boost Converter Using Particle Swarm Optimization by Ittipon Laoprom, Satean Tunyasrirut

    Published 2020-01-01
    “…The metaheuristic optimizations, particle swarm optimization (PSO), genetic algorithm (GA), and Tabu search (TS) are applied to find the optimal gains for the proposed control system. …”
    Get full text
    Article
  13. 15613

    Gait Correlation Analysis Based Human Identification by Jinyan Chen

    Published 2014-01-01
    “…By background subtracting algorithm, the moving silhouette figure can be extracted from the walking images sequence. …”
    Get full text
    Article
  14. 15614

    AXIAL TENSILE STRENGTH ANALYSIS OF UNBONDED FLEXIBLE PIPE CONTAINING COMPOSITE TENSILE ARMORS by MA JinSheng, DU FaXi, LUO Dan

    Published 2020-01-01
    “…As offshore oil industry moves into ultra-deep water,replacing the steel tensile armors of unbonded flexible pipe with composite is becoming a scheme that can effectively reduce weight and provide better mechanical properties.The anisotropic parameters of composite are obtained by meso-mechanical method,then a model of axisymmetric structure response for composite flexible pipe with composite armored layer is established,which is based on both thick-wall cylinder theory and the differential equation of curved beam,and also the algorithm of cyclic iterative is combined.Failure models of different type of flexible pipes are obtained,and iso-strength method is used for composite armored pipe.A case study shows that composite armors can effectively enhance the tensile strength of unbonded flexible pipe while effectively reduce the overall weight.Results state that volume fraction,elastic modulus and strength of fiber are the important parameters which affect the axial stiffness and tensile strength of unbonded flexible pipe.…”
    Get full text
    Article
  15. 15615

    Multi-objective optimization placement strategy for SDN security controller considering Byzantine attributes by Tao WANG, Hongchang CHEN

    Published 2021-06-01
    “…By giving the software defined network distributed control plane Byzantine attributes, its security can be effectively improved.In the process of realizing Byzantine attributes, the number and location of controllers, and the connection relationship between switches and controllers can directly affect the key network performance.Therefore, a controller multi-objective optimization placement strategy for SDN security controllers considering Byzantine attributes was proposed.Firstly, a Byzantine controller placement problem (MOSBCPP) model that comprehensively considered interaction delay, synchronization delay, load difference and the number of controllers was constructed.Then, a solution algorithm based on NASG-II was designed for this model, which included the initialization function, the mutation function, the fast non-dominated sorting function and the elite strategy selection function.Simulation results show that this strategy can effectively reduce interaction delay, synchronization delay, load difference and the number of controllers, while improving control plane security.…”
    Get full text
    Article
  16. 15616

    Leading causes of fever in patients with liver function disorders by V. T. Ivashkin, M. A. Morozova, M. V. Mayevskaya

    Published 2010-02-01
    “…Article presents pathophysiological mechanisms of development of fever. The algorithm of assessment of patient with disorder of liver function and fever is submitted.Original positions. …”
    Get full text
    Article
  17. 15617

    FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining by K. R. Seeja, Masoumeh Zareapoor

    Published 2014-01-01
    “…The class imbalance problem is handled by finding legal as well as fraud transaction patterns for each customer by using frequent itemset mining. A matching algorithm is also proposed to find to which pattern (legal or fraud) the incoming transaction of a particular customer is closer and a decision is made accordingly. …”
    Get full text
    Article
  18. 15618

    A Stochastic and Optimized Energy Efficient Clustering Protocol for Wireless Sensor Networks by Kyung Tae Kim, Hee Yong Youn

    Published 2014-03-01
    “…The performance of the proposed scheme is compared with the clustering-based routing protocols, Low-Energy Adaptive Clustering Hierarchy (LEACH), LEACH-Centralized (LEACH-C), and Adaptive and Energy Efficient Clustering (AEEC) algorithm. Simulation results show that it significantly reduces energy consumption and improves network lifetime. …”
    Get full text
    Article
  19. 15619

    Strength Analysis for Cage of Planetary Wheel Needle Roller Bearing by Yubo Wang, Haisheng Yang, Manjun Xu, Yongcun Cui, Sier Deng

    Published 2021-12-01
    “…Aiming to solving the problem of cage failure under revolution-rotation,based on the dynamics theory of rolling bearing,the dynamics differential equations of needle roller bearing coupled with revolution-rotation working condition are established,and GSTIFF variable step length integral algorithm is adopted to solve the bearing. Cage stress is used to evaluate cage strength,and the influence of bearing working conditions on cage stress is studied to guide cage material selection. …”
    Get full text
    Article
  20. 15620

    Communication-efficient federated learning method via redundant data elimination by Kaiju LI, Qiang XU, Hao WANG

    Published 2023-05-01
    “…To address the influence of limited network bandwidth of edge devices on the communication efficiency of federated learning, and efficiently transmit local model update to complete model aggregation, a communication-efficient federated learning method via redundant data elimination was proposed.The essential reasons for generation of redundant update parameters and according to non-IID properties and model distributed training features of FL were analyzed, a novel sensitivity and loss function tolerance definitions for coreset was given, and a novel federated coreset construction algorithm was proposed.Furthermore, to fit the extracted coreset, a novel distributed adaptive sparse network model evolution mechanism was designed to dynamically adjust the structure and the training model size before each global training iteration, which reduced the number of communication bits between edge devices and the server while also guarantees the training model accuracy.Experimental results show that the proposed method achieves 17% reduction in communication bits transmission while only 0.5% degradation in model accuracy compared with state-of-the-art method.…”
    Get full text
    Article