Showing 17,921 - 17,940 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 17921

    An Improved Pearson’s Correlation Proximity-Based Hierarchical Clustering for Mining Biological Association between Genes by P. M. Booma, S. Prabhakaran, R. Dhanalakshmi

    Published 2014-01-01
    “…Additionally, the Seed Augment algorithm adopts average linkage methods on rows and columns in order to expand a seed PCPHC model into a maximal global PCPHC (GL-PCPHC) model and to identify association between the clusters. …”
    Get full text
    Article
  2. 17922

    Contrast-Invariant Edge Detection: A Methodological Advance in Medical Image Analysis by Dang Li, Patrick Cheong-Iao Pang, Chi-Kin Lam

    Published 2025-01-01
    “…Each bit plane is used to detect edges in 3 × 3 blocks by the proposed algorithm, and then the edge information from each plane is fused to obtain an edge image. …”
    Get full text
    Article
  3. 17923

    DMRIntTk: Integrating different DMR sets based on density peak clustering. by Wenjin Zhang, Wenlong Jie, Wanxin Cui, Guihua Duan, You Zou, Xiaoqing Peng

    Published 2024-01-01
    “…Then, the bins are weighted based on the covered DMR sets and integrated into final DMRs using a density peak clustering algorithm. To demonstrate the practicality of DMRIntTk, it was applied to different scenarios, including tissues with relatively large methylation differences, cancer tissues versus normal tissues with medium methylation differences, and disease tissues versus normal tissues with subtle methylation differences. …”
    Get full text
    Article
  4. 17924

    METHOD OF QUALIFICATION ESTIMATION AND OPTIMIZATION OF PROFESSIONAL TEAMS OF PROGRAMMERS by A. A. Prihozhy, A. M. Zhdanouski

    Published 2018-08-01
    “…The proposed method is a basis for a genetic algorithm that performs the search for the number, size and staff of groups of programmers which yield a maximum of total qualification. …”
    Get full text
    Article
  5. 17925

    Features of interrogation of minors who are victims of violence by N. E. Miloradova, N. A. Pashko

    Published 2020-06-01
    “…The author has analyzed the algorithm of interrogation of a child based on the use of the following formula: “safe place + safe adult = safe child”; has provided recommendations to take into account the psychological and organizational features of different phases of the child’s interviewing; formulation of questions for minors who are victims of violence according to age and their psycho-emotional state. …”
    Get full text
    Article
  6. 17926

    Optimal Design of Bus Stop Locations Integrating Continuum Approximation and Discrete Models by Xiaoling Luo, Wenbo Fan, Yangsheng Jiang, Jun Zhang

    Published 2020-01-01
    “…Then, the stop location problem is formulated into a multivariable nonlinear minimization problem with a given number of stop location variables and location constraint. The interior-point algorithm is presented to find the optimal design that is ready for implementation. …”
    Get full text
    Article
  7. 17927

    Block level cloud data deduplication scheme based on attribute encryption by Wenting GE, Weihai LI, Nenghai YU

    Published 2023-10-01
    “…Due to the existing cloud data deduplication schemes mainly focus on file-level deduplication.A scheme was proposed, based on attribute encryption, to support data block-level weight removal.Double granularity weight removal was performed for both file-level and data block-level, and data sharing was achieved through attribute encryption.The algorithm was designed on the hybrid cloud architecture Repeatability detection and consistency detection were conducted by the private cloud based on file labels and data block labels.A Merkle tree was established based on block-level labels to support user ownership proof.When a user uploaded the cipher text, the private cloud utilized linear secret sharing technology to add access structures and auxiliary information to the cipher text.It also updated the overall cipher text information for new users with permissions.The private cloud served as a proxy for re-encryption and proxy decryption, undertaking most of the calculation when the plaintext cannot be obtained, thereby reducing the computing overhead for users.The processed cipher text and labels were stored in the public cloud and accessed by the private cloud.Security analysis shows that the proposed scheme can achieve PRV-CDA (Privacy Choose-distribution attacks) security in the private cloud.In the simulation experiment, four types of elliptic curve encryption were used to test the calculation time for key generation, encryption, and decryption respectively, for different attribute numbers with a fixed block size, and different block sizes with a fixed attribute number.The results align with the characteristics of linear secret sharing.Simulation experiments and cost analysis demonstrate that the proposed scheme can enhance the efficiency of weight removal and save time costs.…”
    Get full text
    Article
  8. 17928
  9. 17929

    Real-Time On-Orbit Estimation Method for Microthruster Thrust Based on High-Precision Orbit Determination by Qinglin Yang, Weijing Zhou, Hao Chang

    Published 2021-01-01
    “…By establishing a high-precision orbit dynamic model, the microthrust generated by a microthruster is modeled as a first-order Markov model, combined with a high-precision GNSS measuring device, and the satellite position is obtained through the cubature Kalman filter algorithm, velocity, and thrust real-time on-orbit estimates. …”
    Get full text
    Article
  10. 17930

    Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range by Zhe SUN, Hong NING, Lihua YIN, Binxing FANG

    Published 2023-02-01
    “…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
    Get full text
    Article
  11. 17931

    Combined Heat and Mass Transfer of Fluid Flowing through Horizontal Channel by Turbulent Forced Convection by Jamal Eddine Salhi, Kamal Amghar, Hicham Bouali, Najim Salhi

    Published 2020-01-01
    “…A specifically developed numerical model was based on the finite-volume method to solve the coupled governing equations and the SIMPLE (Semi Implicit Method for Pressure Linked Equation) algorithm for the treatment of velocity-pressure coupling. …”
    Get full text
    Article
  12. 17932

    Resilience-Oriented Scheduling of Shared Autonomous Electric Vehicles: A Cooperation Framework for Electrical Distribution Networks and Transportation Sector by Mohammad Hassan Amirioun, Saeid Jafarpour, Ali Abdali, Josep M. Guerrero, Baseem Khan

    Published 2023-01-01
    “…Afterward, SA runs a targeted algorithm to schedule trip assignments and charging cycles of SAEVs so that the required constraints of DSO are satisfied. …”
    Get full text
    Article
  13. 17933

    Prediction and Evaluation of Coal Mine Coal Bump Based on Improved Deep Neural Network by Shuang Gong, Yi Tan, Wen Wang

    Published 2021-01-01
    “…To predict coal bump disaster accurately and reliably, we propose a depth neural network (DNN) prediction model based on the dropout method and improved Adam algorithm. The coal bump accident examples were counted in order to analyze the influencing factors, characteristics, and causes of this type of accidents. …”
    Get full text
    Article
  14. 17934

    Compressive Sensing Based Bayesian Sparse Channel Estimation for OFDM Communication Systems: High Performance and Low Complexity by Guan Gui, Li Xu, Lin Shan, Fumiyuki Adachi

    Published 2014-01-01
    “…Broadband channel model is often described by very few dominant channel taps and they can be probed by compressive sensing based sparse channel estimation (SCE) methods, for example, orthogonal matching pursuit algorithm, which can take the advantage of sparse structure effectively in the channel as for prior information. …”
    Get full text
    Article
  15. 17935

    Super-Twisting Sliding Mode Control for Gearless PMSG-Based Wind Turbine by Mojtaba Nasiri, Saleh Mobayen, Quan Min Zhu

    Published 2019-01-01
    “…Accordingly, this paper presents a new control algorithm based on super-twisting sliding mode for a gearless wind turbine by a permanent magnet synchronous generator (PMSG). …”
    Get full text
    Article
  16. 17936

    Travel Matrix Enabled Delta-Based Roadside Units Deployment for Vehicular Ad Hoc Networks: A Case of Kigali City by Evariste Twahirwa, Moyukh Laha, James Rwigema, Raja Datta

    Published 2022-01-01
    “…Four (4) vehicular communication modes are studied, namely, (a) travel matrix based on delta RSUs deployment communication, (b) road intersection-based RSUs deployment communication, (c) road segmentation, and (d) free vehicle-to-vehicle communication. A baseline algorithm is suggested to determine the optimal locations of RSUs in terms of their geographical positions. …”
    Get full text
    Article
  17. 17937

    An Improved Control Strategy for Managing Reactive Power and Reducing Capacity of Interlinking Converters by Participating of Electric Vehicles in Hybrid AC/DC Microgrids by Abbas Safari, Hesam Rahbarimagham

    Published 2025-01-01
    “…Moreover, a reactive power control algorithm is presented which can compensate the reactive power of the AC subgrid based on the interface converter’s maximum rated capacity. …”
    Get full text
    Article
  18. 17938

    Methodology for Using Multi-Temporal Landsat Images to Monitor Urban Growth of Kirkuk Governorate by Tabark Y. Gehad, Nejat Q. Omer, Nada S. Abdulmajeed

    Published 2024-06-01
    “…The Supervised Maximum Likelihood algorithm was utilized to categorize images into urban and non-urban areas, with accuracy rates ranging from 91.25% to 96.66% between 1990 and 2020. …”
    Get full text
    Article
  19. 17939

    Towards a New Taxonomy of Pattern-Making in the Visuo-Spatial Domain in Early Childhood Based on Zygonic Theory and the Sounds of Intent Framework of Musical Development by Adam Ockelford, Sarah McCarthy, Sue Gifford, Helen Thouless, Sharon Kirk, Michael Thorpe

    Published 2025-01-01
    “…Drawing on the principles set out in zygonic theory and using the structure laid out in the Sounds of Intent framework, the researchers propose how to map the development of pattern understanding from the auditory domain onto the visuo-spatial domain. An algorithm is used to demonstrate the structural processing load for different pattern types, which allows the putative developmental stages of pattern-processing capacity to be plotted sequentially. …”
    Get full text
    Article
  20. 17940

    Neural Network-Based Lower Limb Prostheses Control Using Super Twisting Sliding Mode Control by Adisu Tadese Demora, Chala Merga Abdissa

    Published 2025-01-01
    “…The neural network structure is built using Feed-forward Neural Network (FFNN) architecture and Levenberg-Marquardt (LM) back-propagation training algorithm for accuracy, fast convergence, and reliable optimization of nonlinear relationships. …”
    Get full text
    Article