-
501
Calculating place-based transit accessibility: Methods, tools and algorithmic dependence
Published 2022-02-01“…To capture the complex relationships between transportation and land use, researchers and practitioners are increasingly using place-based measures of transportation accessibility to support a broad range of planning goals. …”
Get full text
Article -
502
Homogenization of the Probability Distribution of Climatic Time Series: A Novel Algorithm
Published 2025-05-01Get full text
Article -
503
Application of the spectral bisection algorithm for the analysis of criminal communities in social networks
Published 2024-07-01“…The methods of scientific research used in the work include: analysis of social networks, methods based on graph decomposition algorithms, methods of data analysis from open sources, methods of linear algebra and algorithmization.Result. …”
Get full text
Article -
504
Smart System Resource Coordination Algorithm Based on 6G Technology
Published 2022-01-01“…Therefore, 6G technology will surely replace the current technology as the main means of future communication technology. This paper combines 6G technology to study the smart system resource coordination algorithm and analyzes the calculation process and actual effect of the algorithm. …”
Get full text
Article -
505
Presenting a Text Mining Algorithm to Identify Emotion in Persian Corpus
Published 2018-06-01“…The literature regarding Persian text mining indicates that most studies are conducted to detect polarity of opinions on social websites. The aim of this research is presenting an algorithm to identify emotion implemented in the text based on the following six main emotions of happiness, sadness, fear, anger, surprise and disgust. …”
Get full text
Article -
506
-
507
Structural Damage Identification Using Novel Objective Functions and Metaheuristic Algorithms
Published 2025-10-01Get full text
Article -
508
Traffic identification of network business based on multi-layer cascade algorithm
Published 2015-12-01“…The contradiction between traffic demand and network bandwidth is the main problem of the current network.Traffic management is one of the effective solutions,at the same time it can improve the quality of service of the network,and network traffic identification is the basis of fine traffic management.The traffic identification method of network business based on multi-layer cascade algorithm was proposed,after the research of network traffic identification and machine learning techniques.This method can adapt to the situation of the complex network traffic flow,and can balance the contradiction between the time performance and the accuracy of the machine learning algorithm.Furthermore the cascade algorithm of this method takes the cost imbalance into account,and takes more attention to the identification of important business,so it can help enhance user experience.…”
Get full text
Article -
509
An Algorithm of Decomposing the Trend and Cyclical Components of FDI Inflows: the Case of Ukraine
Published 2020-10-01Get full text
Article -
510
Regional Photovoltaic Consumption Control Strategy Based on Non-MPPT Algorithm
Published 2019-11-01Get full text
Article -
511
Electric Vehicle Routing Problem: A Review of Recent Approaches and Algorithms
Published 2025-03-01“…Finally, based on the current state of development in this field, the main challenges faced by EVRP and future research directions are discussed. …”
Get full text
Article -
512
An encryption by using DNA algorithm for hiding a compressed message in Image
Published 2022-02-01Get full text
Article -
513
Study on Lightweight Bridge Crack Detection Algorithm Based on YOLO11
Published 2025-05-01“…This algorithm uses an efficient multiscale conv all (EMSCA) module to enhance channel and spatial attention, thereby strengthening its ability to extract crack features. …”
Get full text
Article -
514
Evaluation System of Blind Spot Warning Algorithm Based on Vehicle to Everything
Published 2025-01-01“…Utilizing simulation software named Virtual Test Drive, this research constructs detailed collision scenarios and performs exhaustive Hardware-in-the-Loop testing. …”
Get full text
Article -
515
Design of digital low-carbon system for smart buildings based on PPO algorithm
Published 2025-02-01“…A smart building digital low-carbon new system based on proximal policy optimization algorithm is proposed in the research. The new system uses a near-end strategy optimization algorithm to control the energy changes of buildings, and adds an actor-critic algorithm to enhance the evaluation and analysis ability of system strategies. …”
Get full text
Article -
516
Analysis of Algorithms for Detecting Users’ Behavioral Models based on Sessions Data
Published 2024-12-01“…An unknown number and quality of potential behavioral models, non-efficient utilization of memory and processing units, and a large amount of data are the main difficulties developers could meet. Besides, the suitability of clustering algorithms for the task highly depends on the characteristics of datasets and still requires additional research. …”
Get full text
Article -
517
Systematic Review of Phase Aberration Correction Algorithms for Transcranial Focused Ultrasound
Published 2025-02-01“…The phase correction algorithms involved two main steps: acoustic field estimation and transmitted pulse adjustment. …”
Get full text
Article -
518
-
519
Stability Conditions for the Leaky LMS Algorithm Based on Control Theory Analysis
Published 2016-09-01Get full text
Article -
520
Early Warning of Financial Risk Based on K-Means Clustering Algorithm
Published 2021-01-01“…The fragility of financial system and the destructiveness of financial crisis make it extremely important to build a good financial risk early-warning mechanism. The main idea of the K-means clustering algorithm is to gradually optimize clustering results and constantly redistribute target dataset to each clustering center to obtain optimal solution; its biggest advantage lies in its simplicity, speed, and objectivity, being widely used in many research fields such as data processing, image recognition, market analysis, and risk evaluation. …”
Get full text
Article