Showing 17,881 - 17,900 results of 19,511 for search '"algorithms"', query time: 0.10s Refine Results
  1. 17881

    A Brain-Computer Interface for Teleoperation of a Semiautonomous Mobile Robotic Assistive System Using SLAM by Vidya Nandikolla, Bryan Ghoslin, Kevin Matsuno, Daniel A. Medina Portilla

    Published 2022-01-01
    “…The mobile base’s SLAM algorithm has obstacle avoidance capability and path planning to assist the robot maneuver safely. …”
    Get full text
    Article
  2. 17882

    Human Evolution: the Limits of Technocentrism by M. I. Boichenko

    Published 2021-06-01
    “…Technology is a technique that has gained recognition and has been mastered by those who did not invent it but used the algorithm proposed by the inventor, a detailed and functionally sound explanation, a method of constructing this technique. …”
    Get full text
    Article
  3. 17883

    Accelerating Multiple Compound Comparison Using LINGO-Based Load-Balancing Strategies on Multi-GPUs by Chun-Yuan Lin, Chung-Hung Wang, Che-Lun Hung, Yu-Shiang Lin

    Published 2015-01-01
    “…In this paper, we propose a GPU-based algorithm for MCC problem, called CUDA-MCC, on single- and multi-GPUs. …”
    Get full text
    Article
  4. 17884

    A Novel Approach of Label Construction for Predicting Remaining Useful Life of Machinery by Hailong Lin, Zihao Lei, Guangrui Wen, Xiaojun Tian, Xin Huang, Jinsong Liu, Haoxuan Zhou, Xuefeng Chen

    Published 2021-01-01
    “…Furthermore, the fuzzy C-means (FCM) algorithm is innovatively used to divide the degradation data into several stages to obtain the turning point of degradation. …”
    Get full text
    Article
  5. 17885

    Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments by Doaa Mohsin Abd Ali Afraji, Jaime Lloret, Lourdes Peñalver

    Published 2025-12-01
    “…The future work is proposed to build superior datasets and use accurate algorithm to improve the security models. This paper focuses on explainability as a way of making the AI model creation process and any consequent decisions explainable and transparent. …”
    Get full text
    Article
  6. 17886

    Development and Implementation of an FPGA-Embedded Multimedia Remote Monitoring System for Information Technology Server Room Management by Yongqin Zhu, Kaiwen Hou

    Published 2024-01-01
    “…Additionally, the system employs the fast Fourier transform algorithm and butterfly operations to derive voltage and current AC quantities, while utilizing relative temperature differences to identify equipment faults within the server room. …”
    Get full text
    Article
  7. 17887

    Functional genomic imaging (FGI), a virtual tool for visualization of functional gene expression modules in heterogeneous tumor samples by Xinlei Chen, Youbing Guo, Xiaorong Gu, Danyi Wen

    Published 2025-01-01
    “…FGI uses weighted gene co-expression network analysis (WGCNA), followed by a modified Phenograph clustering algorithm to identify co-expression gene clusters. …”
    Get full text
    Article
  8. 17888

    Parametric Yield-Driven Resource Binding in High-Level Synthesis with Multi-Vth/Vdd Library and Device Sizing by Yibo Chen, Yu Wang, Yuan Xie, Andres Takach

    Published 2012-01-01
    “…A parametric yield-driven resource binding algorithm is then proposed, which uses the characterized power and delay distributions and efficiently maximizes power yield under a timing yield constraint. …”
    Get full text
    Article
  9. 17889

    Predicting and synthesizing terahertz spoof surface plasmon polariton devices with a convolutional neural network model by Vahid Najafy, Bijan Abbasi-Arand, Maryam Hesari-Shermeh

    Published 2025-01-01
    “…Three examples are provided for inversely designing several sensor devices and absorbers in the terahertz band using the proposed CNN and the genetic optimization algorithm.…”
    Get full text
    Article
  10. 17890

    Non-Stationary Extreme Runoff Prediction Model of Snowmelt Flood in Flood Season Based on VMD-NGO-LSTM and Its Application by ZHOU Xia, ZHOU Feng

    Published 2024-06-01
    “…In order to eliminate the influence of the non-stationarity of extreme runoff in the flood season on the prediction results in the basin, the variational mode decomposition (VMD) algorithm was introduced, and a combined prediction model (VMD-NGO-LSTM) based on northern goshawk optimization (NGO) and long short-term memory neural network (LSTM) was proposed. …”
    Get full text
    Article
  11. 17891

    A Novel Ferroptosis-Related Gene Signature for Prognosis Prediction in Ewing Sarcoma by Runhan Zhao, Zefang Li, Yanran Huang, Chuang Xiong, Chao Zhang, Hao Liang, Jingtao Xu, Xiaoji Luo

    Published 2022-01-01
    “…Based on the train cohort, AURKA, RGS4, and RIPK1 were identified as key genes through the univariate Cox regression analysis, the random survival forest algorithm, and the multivariate Cox regression analysis and utilized to establish a prognostic FRG signature. …”
    Get full text
    Article
  12. 17892

    A review of state-of-the-art resolution improvement techniques in SPECT imaging by Zhibiao Cheng, Ping Chen, Jianhua Yan

    Published 2025-01-01
    “…It delves into advancements in detector design and modifications, projection sampling techniques, traditional reconstruction algorithm development and optimization, and the emerging role of deep learning. …”
    Get full text
    Article
  13. 17893

    A Unified Bayesian Model for Generalized Community Detection in Attribute Networks by Qiang Tian, Wenjun Wang, Yingjie Xie, Huaming Wu, Pengfei Jiao, Lin Pan

    Published 2020-01-01
    “…To optimize the objective function of the model, we use an effective Gibbs sampling algorithm. Experiments on a number of synthetic and real networks show that our model has superior performance compared with some baselines on community detection.…”
    Get full text
    Article
  14. 17894

    A Deep Learning Based Traffic State Estimation Method for Mixed Traffic Flow Environment by Fan Ding, Yongyi Zhang, Rui Chen, Zhanwen Liu, Huachun Tan

    Published 2022-01-01
    “…This article presents a traffic state estimation method based on a deep learning algorithm under a low and dynamic CVs penetration rate environment. …”
    Get full text
    Article
  15. 17895

    C-BERT: A Mongolian reverse dictionary based on fused lexical semantic clustering and BERT by Amuguleng Wang, Yilagui Qi, Dahu Baiyila

    Published 2025-01-01
    “…Initially, the K-means algorithm was used to cluster preprocessed entries from well-known Mongolian dictionaries into 5000 clusters, forming a comprehensive training set. …”
    Get full text
    Article
  16. 17896

    MARKETING RESEARCH IN THE FIELD OF PUBLIC ADMINISTRATION by Viktor Sychenko, Olha Kudyrko

    Published 2024-12-01
    “…The data collection algorithm was summarized and the analysis of the main elements of the marketing research process for the field of public administration was carried out, in particular, the question of qualitative research methods, which can be used when collecting primary information from respondents, was investigated in detail. …”
    Get full text
    Article
  17. 17897

    Machine vision model for drip leakage detection of pipeline. by Cong Xiao, Yiyuan Zhou, Yanwen Wu, Guodong Zhang

    Published 2025-01-01
    “…The droplet boundary extraction algorithm is proposed, and the three-dimensional model of the target droplet is established, so the volume calculation problem of the droplet is solved, which provides a way of thinking for drip leakage detection of the pipeline.…”
    Get full text
    Article
  18. 17898

    Automated speech therapy through personalized pronunciation correction using reinforcement learning and large language models by Ritika Lakshminarayanan, Ayesha Shaik, Ananthakrishnan Balasundaram

    Published 2025-03-01
    “…The system employs a custom Proximal Policy Optimization (PPO) algorithm for precise pronunciation evaluation and an Large Language Models to deliver detailed, encouraging, and user-specific feedback. …”
    Get full text
    Article
  19. 17899

    Information Security Risk Management Model for Big Data by Min Yang

    Published 2022-01-01
    “…On the other hand, this research also optimizes and improves the fuzzy mathematical analysis method and proposes a fuzzy comprehensive assessment method as the core algorithm for the risk assessment layer in the model. …”
    Get full text
    Article
  20. 17900

    Cost-efficient behavioral modeling of antennas by means of global sensitivity analysis and dimensionality reduction by Slawomir Koziel, Anna Pietrenko-Dabrowska

    Published 2025-01-01
    “…Our methodology involves a rapid global sensitivity analysis (GSA) algorithm developed to determine a set of parameter space directions that maximize antenna response variability. …”
    Get full text
    Article