Showing 18,481 - 18,500 results of 19,511 for search '"algorithms"', query time: 0.10s Refine Results
  1. 18481

    Two-dimensional Green’s function for an isotropic equal-thickness double-layer structure by Jie Tong, Juan Li, Jiang Su, Ying-jie Liu

    Published 2025-01-01
    “…Finally, numerical examples were used to compare the interface calculation results of this study with the finite element method numerical results, demonstrating the validity of the algorithm. This method is computationally simple and converges quickly. …”
    Get full text
    Article
  2. 18482

    Intelligent rockburst level prediction model based on swarm intelligence optimization and multi-strategy learner soft voting hybrid ensemble by Qinghong Wang, Tianxing Ma, Shengqi Yang, Fei Yan, Jiang Zhao

    Published 2025-01-01
    “…The data preprocessing method proposed in this study, based on an improved version of the Student t-SNE algorithm, effectively reduced the negative impact of data noise on model performance, enhancing the reliability of predictions. …”
    Get full text
    Article
  3. 18483

    Novel fingerprint key generation method based on the trimmed mean of feature distance by Zhongtian JIA, Qinglong QIN, Li MA, Lizhi PENG

    Published 2023-10-01
    “…In recent years, biometrics has become widely adopted in access control systems, effectively resolving the challenges associated with password management in identity authentication.However, traditional biometric-based authentication methods often lead to the loss or leakage of users’ biometric data, compromising the reliability of biometric authentication.In the literature, two primary technical approaches have been proposed to address these issues.The first approach involves processing the extracted biometric data in a way that the authentication information used in the final stage or stored in the database does not contain the original biometric data.The second approach entails writing the biometric data onto a smart card and utilizing the smart card to generate the private key for public key cryptography.To address the challenge of constructing the private key of a public key cryptosystem based on fingerprint data without relying on a smart card, a detailed study was conducted on the stable feature points and stable feature distances of fingerprints.This study involved the extraction and analysis of fingerprint minutiae.Calculation methods were presented for sets of stable feature points, sets of equidistant stable feature points, sets of key feature points, and sets of truncated means.Based on the feature distance truncated mean, an original fingerprint key generation algorithm and key update strategy were proposed.This scheme enables the reconstruction of the fingerprint key through re-collecting fingerprints, without the need for direct storage of the key.The revocation and update of the fingerprint key were achieved through a salted hash function, which solved the problem of converting ambiguous fingerprint data into precise key data.Experiments prove that the probability of successfully reconstructing the fingerprint key by re-collecting fingerprints ten times is 0.7354, and the probability of reconstructing the fingerprint key by re-collecting fingerprints sixty times is 98.06%.…”
    Get full text
    Article
  4. 18484

    A METHODOLOGICAL FRAMEWORK FOR IDENTIFYING EMPLOYMENT GROWTH DRIVERS IN THE ARCTIC ECONOMY by Vladimir Nikolaevich Myakshin

    Published 2024-12-01
    “…The study’s primary contribution lies in developing an algorithm for identifying key employment growth drivers through structural change analysis and specialization analysis. …”
    Article
  5. 18485

    Numerical analysis of mathematical model of nanofluid flow through stagnation point involving thermal radiation, activation energy, and living organisms by Munaza Chaudhry, Muhammad Abdul Basit, Muhammad Imran, Madeeha Tahir, Aiedh Mrisi Alharthi, Jihad Younis

    Published 2025-01-01
    “…Convergent implications of nonlinear systems are produced by MATLAB software’s built-in bvp4c algorithm. To indicate the physical importance, a thorough examination of relevant characteristics, such as heat sink/source, porosity, and magnetic parameter is conducted. …”
    Get full text
    Article
  6. 18486

    Machine Learning-Integrated Usability Evaluation and Monitoring of Human Activities for Individuals With Special Needs During Hajj and Umrah by Ghadah Naif Alwakid

    Published 2025-01-01
    “…Using clustering, anomaly detection, and predictive modeling, it was intended to enhance the safety and security of sensitive participants. Using the K-Means algorithm and the Elbow Method as the initial indicators to classify the clusters, we reveal four clusters that relate to different human activities that are further visualized through principal component analysis (PCA). …”
    Get full text
    Article
  7. 18487

    Dynamic Response Simulation of Lining Structure for Tunnel Portal Section under Seismic Load by Guoqing Liu, Juntao Chen, Ming Xiao, Yang Yang

    Published 2018-01-01
    “…According to the characteristics of dynamic interaction between the lining and rock, and based on the dynamic contact force algorithm, an analytical model for joint loading between the lining and rock was built. …”
    Get full text
    Article
  8. 18488

    Model Selection from Multiple Model Families in Species Distribution Modeling Using Minimum Message Length by Zihao Wen, David L. Dowe

    Published 2024-12-01
    “…To find the relevant features efficiently, we further develop a novel search algorithm that does not require calculating the message length for all possible subsets of features. …”
    Get full text
    Article
  9. 18489

    INNOVATIVE STRATEGIES FOR ENTERPRISES’ DEVELOPMENT IN THE CONDITIONS OF MODERN CHALLENGES by Roman Sherstiuk, Artem Kozlovskyy

    Published 2024-06-01
    “…The conditions for successful implementation of the enterprise innovation strategy are determined: defining the mission, goals and objectives of the enterprise innovation activity; breaking the process into stages and determin­ing the expected results; applying flexible models of the innovation process; developing indicators for objective evaluation of the innovation activity results; improving the innovation culture; identi­fying and developing creative talents; introducing and implementing innovative initiatives; main­taining customer feedback; inter-organizational cooperation. An algorithm for building inter-organ­izational cooperation in the innovation activities of enterprises is designed. …”
    Get full text
    Article
  10. 18490

    Model of a Photovoltaic Module for the MatLab/Simulink SimPowerSystems Library by D. I. Zalizny

    Published 2020-12-01
    “…The model solved the problems of the algorithm stability for calculating algebraic cycles by introducing constraint the current and the voltage parameters. …”
    Get full text
    Article
  11. 18491

    Fluid flow characteristics estimation of a new integrated bifluid/airbased photovoltaic thermal system utilizing a hybrid optimization method by Ghassan A. Bilal, Abdullateef A. Jadallah, Omayma M. Abdulmajeed, Müslüm Arıcı

    Published 2025-01-01
    “…For the reliability of the proposed algorithm, the mean absolute percentage error was used for error estimation detection. …”
    Get full text
    Article
  12. 18492

    Evolutionary analysis of slope direction deformation in the Gaojiawan landslide based on time-series InSAR and Kalman filtering. by Jingchuan Yao, Runqing Zhan, Jiliang Guo, Wei Wang, Muce Yuan, Guangyu Li, Bo Zhang, Rui Zhang

    Published 2024-01-01
    “…To verify the feasibility of the algorithm, this paper selects the Gaojiawan landslide as a typical study area. …”
    Get full text
    Article
  13. 18493

    Analysis of the Energy Complex Member of the EАEU Countries and the Formation of Groups-Technologies of its Digitalization by M. I. Rusetskaya, T. F. Mancerova, E. P. Korsak

    Published 2023-04-01
    “…The purpose of this work is to analyze the electric power complexes of the EAEU member states and to consider groups of digitalization technologies of industries in the context of the electric power industry, to form an algorithm for creating a classification of digitalization technologies of the electric power industry and on the basis of the latter to create the classification itself. …”
    Get full text
    Article
  14. 18494

    RETRACTED ARTICLE: Confidence level based complex polytopic fuzzy Einstein aggregation operators and their application to decision-making process by Khaista Rahman, Mohammad Khishe

    Published 2024-07-01
    “…With these operators, we create an algorithm designed to solve multiattribute decision-making problems in a Polytopic fuzzy environment. …”
    Get full text
    Article
  15. 18495

    Lane and Traffic Sign Detection for Autonomous Vehicles: Addressing Challenges on Indian Road Conditions by H. S. Gowri Yaamini, Swathi K J, Manohar N, Ajay Kumar G

    Published 2025-06-01
    “…To address these issues, the models need to be trained with a wide variety of Indian data samples for the autonomous vehicles to perform better in India. YOLOv8 algorithm has its challenges but gives better precision results and YOLOv8 nano variant is widely used as it is computationally less complex comparatively. …”
    Get full text
    Article
  16. 18496

    The Impact of Assimilating Ionosphere and Thermosphere Observations on Neutral Temperature Improvement: Observing System Simulation Experiments Using EnKF by Jianhui He, Xinan Yue, Zhipeng Ren

    Published 2021-10-01
    “…Such observations are ingested into the coupled ionosphere and thermosphere model based on our developed ensemble Kalman Filter data assimilation systems on the basis of the ensemble Kalman filter algorithm and the National Center for Atmospheric Research Thermosphere Ionosphere Electrodynamics General Circulation Model. …”
    Get full text
    Article
  17. 18497

    Decision Analysis Approach Based on 2-Tuple Linguistic m-Polar Fuzzy Hamacher Aggregation Operators by Muhammad Akram, Uzma Noreen, Mohammed M. Ali Al-Shamiri

    Published 2022-01-01
    “…We investigate their properties, including the standard cases of monotonicity, boundedness, and idempotency. Then we develop an algorithm to solve multicriteria decision-making problems formulated with 2 TL m F information. …”
    Get full text
    Article
  18. 18498

    Embedded Rough-Neck Helmholtz Resonator Low-Frequency Acoustic Attenuator by Xianming Sun, Tao Yu, Lipeng Wang, Yunshu Lu, Changzheng Chen

    Published 2024-12-01
    “…Moreover, by coupling the BP network with the Golden Jackal Optimization (GJO) algorithm, a BP-GJO optimization model is developed to refine the structural parameters. …”
    Get full text
    Article
  19. 18499

    Prediction of Grade Classification of Rock Burst Based on PCA-SSA-PNN Architecture by Zhenyi Wang, Yalei Wang, Xiaoliang Jin

    Published 2023-01-01
    “…In order to estimate the risk grades of rock burst, an integrated method combining principal component analysis (PCA) and sparrow search algorithm (SSA) with probabilistic neural network (PNN) was proposed. …”
    Get full text
    Article
  20. 18500

    Event-Based Visual/Inertial Odometry for UAV Indoor Navigation by Ahmed Elamin, Ahmed El-Rabbany, Sunil Jacob

    Published 2024-12-01
    “…Compared with the state-of-the-art U-SLAM algorithm, our approach achieves a substantial reduction in the mean positional error and RMSE in simulated environments, showing up to 50% and 47% reductions along the <i>x</i>- and <i>y</i>-axes, respectively. …”
    Get full text
    Article