Suggested Topics within your search.
Showing 15,181 - 15,200 results of 20,616 for search '(((predictive OR prediction) OR reduction) OR education) algorithms', query time: 0.43s Refine Results
  1. 15181

    Cluster-based route convergence method based on network state graph model by PAN Chengsheng, LU Huangjie, SHI Huaifeng, WANG Yingzhi

    Published 2024-12-01
    “…Simulation results show that, in eight different network topologies and under different link damage conditions, OSPF-CSG achieves an average reduction of 82% in the total number of route convergences, a reduction in routing overhead by 70% on average, and an improvement in packet delivery rate by 60% on average compared to the traditional OSPF protocol’s route convergence algorithm.…”
    Get full text
    Article
  2. 15182

    Burning rate research of NEPE propellant containing CL-20 on the base of improved Canny edge detection and PSO-BP by Cai Wenxiang, Yu Xintong, Wang Zhixiang

    Published 2025-09-01
    “…Furthermore, the Particle Swarm Optimization algorithm -Back Propagation neural network model (PSO-BP) is developed for predicting the burning rate, which is compared with the traditional BP algorithm. …”
    Get full text
    Article
  3. 15183

    Double Panel Structure for Active Control of Noise Transmission by Leszek MORZYŃSKI, Grzegorz SZCZEPAŃSKI

    Published 2018-10-01
    “…A multichannel FxLMS algorithm with virtual error microphone technique is used as a control algorithm. …”
    Get full text
    Article
  4. 15184

    Preventing Stillbirth: A Review of Screening and Prevention Strategies by Laure Noël, Conrado Milani Coutinho, Basky Thilaganathan, Yiyuan Jiang, Dandan Shi

    Published 2022-07-01
    “…There is currently no equivalent to predict and prevent late-onset placental dysfunction, although algorithms combining an ultrasound-based estimation of fetal weight, assessment of maternal and fetal Doppler indices, and maternal serum biomarkers show promise as emerging new screening tools to optimize pregnancy monitoring and timing of delivery to prevent stillbirth. …”
    Get full text
    Article
  5. 15185

    An Enterprise-Naming Inspiration in the United States by Michael D. Sublett

    Published 2025-06-01
    “…Data collection tools involved standard online searches; Google’s predictive searching algorithm; business and nonprofit searching tools on the websites of the states’ secretaries of state; and several subscription databases, including Newspapers.com. …”
    Get full text
    Article
  6. 15186

    Applications of AI Technology in Radiation Safety and Protection by Xiaowa WANG

    Published 2025-07-01
    “…Through real-time monitoring and predictive analysis, AI technology has significantly improved the accuracy and efficiency of radiation monitoring, optimized the selection and configuration of shielding materials, and effectively reduced radiation exposure. …”
    Get full text
    Article
  7. 15187

    Remote Sensing Applications in Ocean Observation (Second Edition) by Chung-Ru Ho

    Published 2025-03-01
    “…This information is valuable for developing predictive models and informing policy decisions related to climate change mitigation and adaptation.…”
    Get full text
    Article
  8. 15188

    Mapping Data to Concepts: Enhancing Quantum Neural Network Transparency with Concept-Driven Quantum Neural Networks by Jinkai Tian, Wenjing Yang

    Published 2024-10-01
    “…Experimental results demonstrate that CD-QNN maintains high predictive accuracy while offering clear and meaningful explanations of its decision-making process. …”
    Get full text
    Article
  9. 15189

    How to crack a SMILES: automatic crosschecked chemical structure resolution across multiple services using MoleculeResolver by Simon Müller

    Published 2025-08-01
    “…MoleculeResolver systematically crosschecks structures retrieved from multiple reputable chemical databases, implements rigorous identifier plausibility checks, standardizes molecular structures, and intelligently selects the most accurate representation based on a unique resolution algorithm. Scientific contribution Benchmarks across diverse datasets confirm that MoleculeResolver significantly enhances precision, recall, and overall reliability compared to traditional single-source methods, proving its utility as a valuable resource for chemists, data scientists, and researchers engaged in high-quality molecular data analysis and predictive model development. …”
    Get full text
    Article
  10. 15190

    Three-Dimensional Impact Time and Angle Control Guidance Based on MPSP by Yang Li, Hao Zhou, Wanchun Chen

    Published 2019-01-01
    “…The guidance law is devised using the model predictive static programming (MPSP) method, and the control saturation constraint is incorporated in the MPSP algorithm. …”
    Get full text
    Article
  11. 15191

    HMS-PAU-IN: A heterogeneous multi-scale spatiotemporal interaction network model for population analysis units by Xiaorui Yang, Rui Li, Jing Xia, Junhao Wang, Hongyan Li, Nixiao Zou

    Published 2025-06-01
    “…To validate the model, we developed a population prediction model that integrates the multi-scale features of PAUs and introduced Leiden-IES-PMS, a community detection method based on the Leiden algorithm, which integrates internal and external environmental semantics and adopts a proximity merging strategy. …”
    Get full text
    Article
  12. 15192

    Collaborative optimization of signals and ecological driving speed guidance for buses without dedicated bus lanes in the connected environment by Hui Li, Yunfei Ge, Yuzhou Duan, Xu Zhang

    Published 2024-12-01
    “…Initially, an Extended Kalman Filter is employed to predict the arrival time of buses at intersections and the signal status. …”
    Get full text
    Article
  13. 15193

    Computer Vision-Based Robotic System Framework for the Real-Time Identification and Grasping of Oysters by Hao-Ran Qu, Jue Wang, Lang-Rui Lei, Wen-Hao Su

    Published 2025-04-01
    “…In order to capture oyster motion dynamically on a conveyor belt, a Kalman filter (KF) combined with a Low-Pass filter algorithm was employed to predict oyster trajectories, thereby improving noise reduction and motion stability. …”
    Get full text
    Article
  14. 15194

    Tumor associated neutrophils promote prostate cancer progression by mediating neutrophil trap secretion through PSMA1- NF-κB-HIF-1α signaling axis by Qian Dai, Qian Dai, Hua Wang, Hua Wang, Fang Li, Fang Li, Runchun Huang, Runchun Huang, Chenjun Jiang, Chenjun Jiang, Liuya Yuan, Liuya Yuan, Yayun Wang, Yayun Wang, Xun Li, Xun Li

    Published 2025-08-01
    “…Prostate cancer (PCa) is a common and deadly cancer in men, and despite its low specificity, PSA testing is the main method that is used to predict prognosis. Effective methods for predicting prognosis in clinical practice are lacking. …”
    Get full text
    Article
  15. 15195

    Grey Wolf Resampling-Based Rao-Blackwellized Particle Filter for Mobile Robot Simultaneous Localization and Mapping by Yong Dai, Ming Zhao

    Published 2021-01-01
    “…In addition, we propose an adaptive local data association (Range-SLAM) scheme to improve the computational efficiency for the algorithm of the nearest neighbor (NN) data association in the iteration of the RBPF prediction. …”
    Get full text
    Article
  16. 15196

    Efficient signcryption scheme based on Cocks’ identity cryptosystem by Changgen PENG, Xiaoyu ZHANG, Hongfa DING, Shanhui YANG

    Published 2020-12-01
    “…Most of the existing identity-based signcryption schemes are based on bilinear or multilinear pairing operations construction.To solve the problem of low efficiency caused by complex pair operation, a new efficient signcryption scheme based on the identity cryptosystem of Cocks was proposed.Firstly, the security model of the proposed scheme was formalized, and the definition of confidentiality and unforgeability was given.Secondly, the quadratic residue problem was used to realize the concrete construction of the proposed scheme, and the signature algorithm was designed in a logical step by combining Jacobi symbol operation.Finally, the security proofed that the scheme satisfied the confidentiality and unforgeability was given under the random prediction model.The efficiency analysis shows that compared with the existing identity-based signcryption scheme, the proposed scheme greatly improves the computing efficiency and has good characteristics of identity-based cryptosystem.…”
    Get full text
    Article
  17. 15197

    Complexity control method of random forest based HEVC by Peng WEN, Zongju PENG, Fen CHEN, Gangyi JIANG, Mei YU

    Published 2019-02-01
    “…High efficiency video coding (HEVC) has high computational complexity,and fast algorithm cannot perform video coding under restricted coding time.Therefore,a complexity control method of HEVC based on random forest was proposed.Firstly,three random forest classifiers with different prediction accuracy were trained to provide various coding configurations for coding tree unit (CTU).Then,an average depth-complexity model was built to allocate CTU complexity.Finally,the CTU coding configuration,determined by the smoothness,average depth,bit,and CTU-level accumulated coding error,was used to complete complexity control.The experimental results show that the proposed method has better complexity control precision,and outperforms the state-of-the-art method in terms of video quality.…”
    Get full text
    Article
  18. 15198

    基于改进Kriging模型的主动学习可靠性分析方法 by 陈哲, 杨旭锋, 程鑫

    Published 2021-01-01
    “…,the differential evolution algorithm is introduced to explore the optimal parameter of Kriging model and improve the accuracy of Kriging prediction information.As a result,the training point in each iteration is guaranteed to be the global optimal one and the efficiency of ALK model is largely improved.…”
    Get full text
    Article
  19. 15199

    Efficient signcryption scheme based on Cocks’ identity cryptosystem by Changgen PENG, Xiaoyu ZHANG, Hongfa DING, Shanhui YANG

    Published 2020-12-01
    “…Most of the existing identity-based signcryption schemes are based on bilinear or multilinear pairing operations construction.To solve the problem of low efficiency caused by complex pair operation, a new efficient signcryption scheme based on the identity cryptosystem of Cocks was proposed.Firstly, the security model of the proposed scheme was formalized, and the definition of confidentiality and unforgeability was given.Secondly, the quadratic residue problem was used to realize the concrete construction of the proposed scheme, and the signature algorithm was designed in a logical step by combining Jacobi symbol operation.Finally, the security proofed that the scheme satisfied the confidentiality and unforgeability was given under the random prediction model.The efficiency analysis shows that compared with the existing identity-based signcryption scheme, the proposed scheme greatly improves the computing efficiency and has good characteristics of identity-based cryptosystem.…”
    Get full text
    Article
  20. 15200

    Echo state networks for modeling turbulent convection by Mohammad Sharifi Ghazijahani, Christian Cierpka

    Published 2024-12-01
    “…Even for this highly turbulent flow, it is challenging to distinguish predictions from the ground truth. The statistical convergence of the ESN goes beyond the velocity values and is represented in secondary aspects of the flow dynamics, such as spatial and temporal derivatives and vortices. …”
    Get full text
    Article