-
1961
Dynamic identification method for flow patterns of liquid-solid two-phase flow in horizontal pipelines
Published 2025-01-01“…An experimental platform is built to verify the results, and the reconstruction effect is evaluated using relative error. The research results indicate that although there is some differences between the reconstructed flow pattern obtained by the DMD based identification method for liquid-solid two-phase flow patterns and the true flow pattern, the differences is within an acceptable range and can objectively reflect the evolution process of liquid-solid two-phase flow patterns. …”
Get full text
Article -
1962
SLPDBO-BP: an efficient valuation model for data asset value
Published 2025-04-01“…Secondly, in an attempt to comprehensively evaluate the optimization performance of SLPDBO, a series of numerical optimization experiments are carried out with 20 test functions and with popular optimization algorithms and dung beetle optimizer (DBO) algorithms with different improvement strategies. …”
Get full text
Article -
1963
Well-log lithofacies classification based on machine learning for Chang-7 member in Longdong area of Ordos Basin
Published 2023-08-01“…After comparing the application effects of different unbalanced data classification algorithm in the region, it’s found that bagging algorithm of ensemble learning notably improved the classification performance of all lithofacies by combining multiple classifiers. …”
Get full text
Article -
1964
University proceedings. Volga region. Technical sciences
Published 2025-05-01“…Materials and methodsThe research provided for the development of a calculation methodology and algorithm implemented in the MatchCAD mathematical package in the form of a computer model for comparative evaluation and optimization of calculating the number of parts processed by machines of different types based on the limitations available in production. …”
Article -
1965
Optimization of Traffic Congestion Management in Smart Cities under Bidirectional Long and Short-Term Memory Model
Published 2022-01-01“…Then, the experimental simulation verification and prediction performance evaluation are performed. Finally, the data predicted by the BiLSTM algorithm model are compared with the actual data and the data predicted by the long short-term memory (LSTM) algorithm model. …”
Get full text
Article -
1966
Semi-supervised dynamic community detection based on non-negative matrix factorization
Published 2016-02-01“…How to effectively combine the network structures on different time points was the key and difficulty to affect the performance of detection algorithms. …”
Get full text
Article -
1967
Improved Convolutional Neural Networks for Course Teaching Quality Assessment
Published 2022-01-01“…In this paper, a separate long-term recursive convolutional network (SLRCN) microexpression recognition algorithm is proposed using deep learning technology for building a course teaching effectiveness evaluation model. …”
Get full text
Article -
1968
Detection and Analysis of Malicious Software Using Machine Learning Models
Published 2024-08-01“…Utilizing a real-world dataset of prevalent malware types such as spyware, ransomware, and trojan horses, our study addresses the evolving challenges of cybersecurity. In this study, we evaluate the performance of ML algorithms for obfuscated malware detection using the CIC-MalMem-2022 dataset. …”
Get full text
Article -
1969
Parametric Model for Coaxial Cavity Filter with Combined KCCA and MLSSVR
Published 2023-01-01“…First, the low-dimensional tuning data is mapped to the high-dimensional feature space by kernel canonical correlation analysis, and the nonlinear feature vectors are fused by the kernel function; second, the multioutput least squares support vector regression algorithm is used for parametric modeling to solve the problems of low accuracy and poor prediction performance; third, the support vector of the parameter model is optimized by the differential evolution whale algorithm (DWA) to improve the convergence and generalization ability of the model in actual tuning. …”
Get full text
Article -
1970
Generating Dark Matter Subhalo Populations Using Normalizing Flows
Published 2025-07-01“…We present a comparative analysis of strong gravitational lensing signatures generated by dark matter subhalo populations using two different approaches. The first approach models subhalos using an empirical model, while the second employs the Galacticus semi-analytic model of subhalo evolution. …”
Get full text
Article -
1971
Machine learning and multi-omics analysis reveal key regulators of proneural–mesenchymal transition in glioblastoma
Published 2025-06-01“…Functional and pathway analyses showed that PMTRGs were highly expressed in the C1 subcluster, which was associated with GBM mesenchymal isoforms, pathways, and poor prognosis, and showed stronger immune responses. Four immune evaluation algorithms and TIDE analysis showed that the C1 cluster had high levels of immune cell infiltration and immune molecule scores. …”
Get full text
Article -
1972
Multiobjective Optimization Design of a Fractional Order PID Controller for a Gun Control System
Published 2013-01-01“…To enhance the robustness of the algorithm for different problems, an adapting scheme of the mutation operation is further employed. …”
Get full text
Article -
1973
Phase Space Similarity as a Signature for Rolling Bearing Fault Diagnosis and Remaining Useful Life Estimation
Published 2016-01-01“…Secondly, the normalized cross-correlation (NCC) is employed to calculate the PSS between bearing data with different states. Based on the PSS, a fault pattern recognition algorithm, a bearing fault size prediction algorithm, and a RUL estimation algorithm are introduced to analyze the experimental signal. …”
Get full text
Article -
1974
A routing-benefited deployment approach combining static and dynamic layouts for underwater optical wireless networks
Published 2021-02-01“…A routing-benefited deployment algorithm combining static and dynamic layouts is proposed, and its comprehensive performance evaluation is given in this article. …”
Get full text
Article -
1975
A Time-Frequency Research for Ultrasonic Guided Wave Generated from the Debonding Based on a Novel Time-Frequency Analysis Technique
Published 2017-01-01“…In the algorithm, a masking step is proposed, which can guarantee that the peak-track algorithm can automatically exact the instantaneous frequency and the instantaneous amplitude of different modes on the Smoothed Pseudo Wigner-Ville distribution. …”
Get full text
Article -
1976
Shadow hamiltonian simulation
Published 2025-03-01“…Applications of this approach to quantum simulation problems include simulating the dynamics of exponentially large systems of free fermions or free bosons, the latter example recovering a recent algorithm for simulating exponentially many classical harmonic oscillators. …”
Get full text
Article -
1977
Task offloading and resource allocation in vehicle heterogeneous networks with MEC
Published 2018-09-01“…Based on the advantages of high-bandwidth and low-latency brought by mobile edge computing (MEC),which could provide IT service environment and cloud computing capability,combined with the long-term evolution unlicensed (LTE-U) technology,the task offloading decision and resource allocation issues in vehicle heterogeneous network were studied.Considering the link differentiation requirements,which were the high capacity of vehicle-to-roadside unit (V2I) links and the super reliability of vehicle-to-vehicle (V2V) links,quality of service (QoS) was modeled as the combination of capacity and latency.Firstly,the improved K-means algorithm was used to cluster the request vehicles according to different QoS to determine the communication mode.Secondly,the LTE-U technology based on non-competition period (CFP) which was combined with carrier aggregation (CA) technology,and the distribution Q-Learning algorithm were adopted to allocate the channel and power.The simulation results show that the proposed mechanism can maximize the V2I link traversal capacity while ensuring the reliability of the V2I link.…”
Get full text
Article -
1978
Electrowetting display of multiscale Gamma based on dynamic histogram equilibrium
Published 2025-07-01“…The experimental results demonstrate that the images processed by this algorithm after brightness enhancement show certain improvements in objective evaluation indicators. …”
Get full text
Article -
1979
From attributes to communities: a novel approach in social network generation
Published 2024-11-01“…Our method is compared against other node-attributed social network generators in the area with using both different evaluation metrics and a real-world dataset. …”
Get full text
Article -
1980
Rolling Bearing Fault Diagnosis Method Based on Improved Variational Mode Decomposition and Information Entropy
Published 2022-02-01“…A new fitness function combining differential evolution (DE) algorithm with gray wolf optimization (GWO) algorithm is proposed to form a new hybrid optimization algorithm, named DEGWO. …”
Get full text
Article