Showing 18,521 - 18,540 results of 19,511 for search '"algorithms"', query time: 0.10s Refine Results
  1. 18521

    Remote Minimally Invasive Surgery – Haptic Feedback and Selective Automation in Medical Robotics by Christoph Staub, Keita Ono, Hermann Mayer, Alois Knoll, Heinz Ulbrich, Robert Bauernschmitt

    Published 2011-01-01
    “…We propose a XFEM-based incision force prediction algorithm that simulates the incision contact-forces in real-time and compensates the delayed force sensor readings. …”
    Get full text
    Article
  2. 18522

    Advanced retinal disease detection from OCT images using a hybrid squeeze and excitation enhanced model. by Gülcan Gencer, Kerem Gencer

    Published 2025-01-01
    “…<h4>Results</h4>The combined features from EfficientNetB0 and Xception are processed via fully connected layers and categorized using the Softmax algorithm. The methodology was tested on UCSD and Duke's OCT datasets and produced excellent results. …”
    Get full text
    Article
  3. 18523

    Design of an Incremental Music Teaching and Assisted Therapy System Based on Artificial Intelligence Attention Mechanism by Dapeng Li, Xiaoguang Liu

    Published 2022-01-01
    “…In this paper, from algorithm design to experimental validation, both in terms of accuracy, the operational difficulty of the experiment, consumption of arithmetic power, and time cost, the unique superiority of the artificial intelligence attention-based combined with incremental music teaching adjunctive therapy system proposed in this paper can be seen in the MS lesion segmentation task.…”
    Get full text
    Article
  4. 18524

    Fleet Management for HDVs and CAVs on Highway in Dense Fog Environment by Bowen Gong, Ruixin Wei, Dayong Wu, Ciyun Lin

    Published 2020-01-01
    “…As to improve the traffic flow throughput and driving safety in dense fog weather condition on highway, this paper uses a mathematical modeling method to study and control the fleet mixed with human-driven vehicles (HDVs) and connected automatic vehicles (CAVs) in dense fog environment on highway based on distributed model predictive control algorithm (DMPC), along with considering the car-following behavior of HDVs driver based on cellular automatic (CA) model. …”
    Get full text
    Article
  5. 18525

    FEATURES OF FORMING MARKETING OF AN ECO-ORIENTED ENTERPRISE by Nataliia Butko

    Published 2023-12-01
    “…The formation of environmental marketing at the enterprise is based on the algorithm of individual consecutive steps. It helps ensure the satisfaction of consumer needs maintaining environmental balance and public health. …”
    Get full text
    Article
  6. 18526

    Numerical and Analytical Calculations for Modeling and Designing Drilling Wicks or Rotary Cutters Based of Functionally Graded Materials by Luc Leroy Mambou Ngueyep, Joseph Ndop, Elise Rose Atangana Nkene, Jean-Marie Bienvenu Ndjaka

    Published 2018-01-01
    “…The calculations performed have allowed finding an analytical solution which was compared with numerical solutions obtained by using the shooting method and the fourth-order Runge-Kutta algorithm. These analytical and numerical results have shown that the values of tangential stresses are greater than the radial stresses. …”
    Get full text
    Article
  7. 18527

    The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key by Ilham Firman Ashari, Eko Dwi Nugroho, Dodi Devrian Andrianto, M. Asyroful Nur Maulana Yusuf, Makruf Alkarkhi

    Published 2024-03-01
    “…This study proposes the utilization of LSB (Least Significant Bit) steganography on image files employing the 3DES (Triple Data Encryption Standard) algorithm. The aim is to facilitate secure transmission and reception of data, including confidential messages, within digital information media. …”
    Get full text
    Article
  8. 18528

    Fast Detection of Deceptive Reviews by Combining the Time Series and Machine Learning by Minjuan Zhong, Zhenjin Li, Shengzong Liu, Bo Yang, Rui Tan, Xilong Qu

    Published 2021-01-01
    “…Secondly, a co-training two-view semisupervised learning algorithm was performed in each captured interval, in which linguistic cues, metadata, and user purchase behaviors were synthetically employed to classify the reviews and check whether they are spam ones or not. …”
    Get full text
    Article
  9. 18529

    ANALYSIS OF THE PRESSURE DISTRIBUTION ON RAIL SEAT OF CONCRETE SLEEPERS UNDER 40- TONNE AXLE LOAD by AN BoYang, YANG JiZhong, LIU Chao, ZHAO Xin, WEN ZeFeng, JIN XueSong

    Published 2016-01-01
    “…The FE model is first validated by comparing the calculated results with those of a traditional simplified algorithm. More results have shown that( 1) the typical heavy haul track structure in China can meet the requirements of 40- tonne axle load,but the stress on the top of subgrade exceeds the bearing capacity considered in normal design;( 2) with the increase of the lateral wheel-rail contact force,the width( along the lateral) of the contact patch between the railpad and the sleeper decreases and the length keeps almost unchanged,thereby the maximum pressure increases and its location moves towards the field side in the lateral;( 3) Under the typical wheel-rail contact forces,the pressure distribution on the rail seat changes significantly when the stiffness of the railpad increases from 80 MN / m to 200 MN / m,while un-affected as the stiffness further increases to 1300 MN / m;( 4) Assuming a constant dynamic amplification factor,the pressure on the rail seat decreases as the rail fastening system fails,and correspondingly,the shape of contact patch between the rail pad and the sleeper becomes more irregular due to less constraints.…”
    Get full text
    Article
  10. 18530

    ESX: A Self-Generated Control Policy for Remote Access With SSH Based on eBPF by Yuan Zhong, Pengfei Chen, Huxing Zhang

    Published 2025-01-01
    “…Our results show that ESX&#x2019;s rule-mining algorithm achieves over 99% accuracy in generating access control policies, using only 40% of the log entries for mining. …”
    Get full text
    Article
  11. 18531

    Recent Progress about Flight Delay under Complex Network by Tang Zhixing, Huang Shan, Han Songchen

    Published 2021-01-01
    “…This may be achieved by analyzing flight delay in frequency domain instead of time domain. (4) Summation of most critical nodes/edges may not be the most crucial group to network resilience or flight delay propagations. Effective algorithm for most influential sequence is to be developed.…”
    Get full text
    Article
  12. 18532

    Assessing Hydropower Potential in Nepal’s Sunkoshi River Basin: An Integrated GIS and SWAT Hydrological Modeling Approach by Rinki Bhattarai, Binaya Kumar Mishra, Deepa Bhattarai, Dipendra Khatiwada, Pankaj Kumar, Gowhar Meraj

    Published 2024-01-01
    “…The Sequential Uncertainty Fitting Version 2 (SUFI-2) algorithm, integrated within the SWAT Calibration and Uncertainty Program (SWAT-CUP), was employed to calibrate and validate the model. …”
    Get full text
    Article
  13. 18533

    Defense mechanism of SDN application layer against DDoS attack based on API call management by Yang WANG, Guangming TANG, Shuo WANG, Jiang CHU

    Published 2022-04-01
    “…Due to thelack of strict access control, identity authentication and abnormal call detection, attackers may develop malicious applications easily and then it leads to theabuse of the northbound interface API (application programming interface) accordingly.There are mainly two patterns of DDoS (distributed denial-of-service) attacks against application layer.1) malicious App bypass the security review of the northbound interface and make a large number of calls to some API in a short time, thus causing the controller to crash and paralyzing the whole network; 2) attackers take a legitimate SDN (software defined network) application as the target and make a large number of short-time calls to the specific API needed by the application, which makes the legitimate App unable to call the API normally.Compared with the first pattern, the second one is more subtle.Therefore, it’s necessary to distinguish whether the App is malicious or not, effectively clean the App running on the attacked controller, and redistribute the controller to the legitimate App.Based on the in-depth analysis of the development trend of the current northbound interface, the possible DDoS attack patterns were simulated and practiced.Then a DDoS defense mechanism for SDN application layer was proposed.This mechanism added an App management layer between SDN application layer and control layer.Through reputation management, initial review, mapping allocation, anomaly detection and identification migration of the App, the malicious App attack on SDN can be predicted and resisted.The proposal focused on pre-examination of malicious App before attacks occur, so as to avoid attacks.If the attack has already happened, the operation of cleaning and separating the legitimate App from the malicious App is triggered.Theoretical and experimental results show that the proposed mechanism can effectively avoid DDoS attacks in SDN application layer, and the algorithm runs efficiently.…”
    Get full text
    Article
  14. 18534

    Testing convolutional neural network based deep learning systems: a statistical metamorphic approach by Faqeer ur Rehman, Clemente Izurieta

    Published 2025-01-01
    “…Furthermore, we also propose an MRs minimization algorithm for the CUT, thus saving computational costs and organizational testing resources.…”
    Get full text
    Article
  15. 18535

    Using the clustering method to find the final environmental parameters coefficients in road construction projects by Eshagh Rasouli Sarabi, Ramin Vafaei Poursorkhabi, Mehdi Ravanshadnia

    Published 2025-02-01
    “…In the first phase, the Genetic Optimization Algorithm was implemented to determine convenient coefficients for the relevant parameters. …”
    Get full text
    Article
  16. 18536

    Effects of Regional Trade Agreement to Local and Global Trade Purity Relationships by Siyu Huang, Wensha Gou, Hongbo Cai, Xiaomeng Li, Qinghua Chen

    Published 2020-01-01
    “…Here, we separate the influence of geographical distance, economic volume, and overall increase in transportation and labor costs and use the expectation maximization algorithm to optimize the parameters and quantify the trade purity indicator, which describes the true global trade environment and relationships among countries. …”
    Get full text
    Article
  17. 18537

    Deep learning models for detection of explosive ordnance using autonomous robotic systems: trade-off between accuracy and real-time processing speed by Vadym Mishchuk, Herman Fesenko, Vyacheslav Kharchenko

    Published 2024-11-01
    “…The main contribution of this study is the results of a detailed evaluation of the YOLOv8 and RT-DETR models for real-time EO detection, helping to find trade-offs between the speed and accuracy of each model and emphasizing the need for special datasets and algorithm optimization to improve the reliability of EO detection in autonomous systems.…”
    Get full text
    Article
  18. 18538

    Extreme‐Event Magnetic Storm Probabilities Derived From Rank Statistics of Historical Dst Intensities for Solar Cycles 14–24 by Jeffrey J. Love

    Published 2021-04-01
    “…Three different models are fitted to the cycle‐ranked −Dst1 and −Dst2 values using a maximum‐likelihood algorithm: A Gumbel model, an unconstrained Generalized‐Extreme‐Value model, and a Weibull model constrained to have a physically justified maximum storm intensity of −Dstm = 2500 nT. …”
    Get full text
    Article
  19. 18539

    Global foot-and-mouth disease risk assessment based on multiple spatial analysis and ecological niche model by Qi An, Yiyang Lv, Yuepeng Li, Zhuo Sun, Xiang Gao, Hongbin Wang

    Published 2025-12-01
    “…This study utilized multi-distance spatial cluster analysis, kernel density analysis, directional distribution analysis to investigate the spatial distribution patterns of historical FMD epidemics. A multi-algorithm ensemble model considering climatic, geographic, and social factors was developed to predict the suitability area for FMDV, and then risk maps of FMD for each species of livestock were generated in combination with the distribution of livestock. …”
    Get full text
    Article
  20. 18540

    An improved Fully Homomorphic Encryption model based on N-Primes by Mohammed Anwar Mohammed, Fadhil Salman Abed

    Published 2019-10-01
    “…The security of the presumptive algorithm to be more efficient in front of the security challenges facing cloud computing. …”
    Get full text
    Article