Showing 2,521 - 2,540 results of 13,928 for search '(( whole algorithm ) OR ( while algorithm ))', query time: 0.20s Refine Results
  1. 2521

    NEONATOLOGIST'S TACTICS IN CASES OF NEWBORN CONGENITAL MALFORMATION by Y. I. Kucherov

    Published 2012-12-01
    “…Early detection and rational therapy whereupon a child is born to a large extent determine a favorable outcome of surgical treatment and prognosis in whole. The article gives a description of the most frequent congenital malformations and an algorithm of managing newborns with this pathology on the maternity hospital stage.…”
    Get full text
    Article
  2. 2522

    CLUSTER CREATING CONDITIONS by Yu. N. Lapygin, D. V. Tulinova

    Published 2020-09-01
    “…The dynamics of cluster formation in the context of the federal districts and Russia as a whole has been considered, trends in the development of cluster initiatives, as well as the basic principles for creating clusters have been analysed. …”
    Get full text
    Article
  3. 2523

    Estimating elastic properties of sediments by pseudo-wells generation utilizing simulated annealing optimization method by Nasser Keshavarz Faraj Khah, Bahare Salehi, Pooria Kianoush, Shahab Varkouhi

    Published 2024-12-01
    “…This information commonly results from pre-stack seismic inversion, while post-stack seismic information provides acoustic impedance as a layer-based property. …”
    Get full text
    Article
  4. 2524

    Survey on IPv6 address scanning technology based on seed sources by Guo LI, Lin HE, Guanglei SONG, Zhiliang WANG, Jiahai YANG, Zimu LI

    Published 2019-12-01
    “…Nowadays,the state-of-the-art technologies can spend a very short time to scan the whole IPv4 space,but these methods cannot be applied to the huge IPv6 space easily.Therefore,many researchers propose different heuristic algorithms for the sake of IPv6 scanning.The common way of these algorithms is to input collected IPv6 seed addresses and output new most likely active IPv6 addresses as candidates for later scanning.These methods greatly reduce the scanning range of the active address area.These technologies based on seed addresses were classified,analyzed and summarized,and detailed analysis of the advantages and disadvantages of each method was given.And the several challenges faced by the methods were discussed.73M seed addresses were collected in total from two sources,including published IPv6 datasets in papers and Beijing Node of China Education and Research Network.Through the proposed experiments,time performance and hit rate of four IPv6 address scanning technologies based on seed addresses was compared.Finally,the own thoughts on this field and some future research directions were proposed.…”
    Get full text
    Article
  5. 2525

    Application of Hybrid Finite Element-Boundary Integral Algorithm for Solving Electromagnetic Scattering from Multiple Objects over Rough Sea Surface by Run-Wen Xu, Li-Xin Guo

    Published 2014-01-01
    “…A hybrid algorithm of the finite element method (FEM) is presented to solve two-dimensional (2D) scattering from multiple dielectric objects above the rough sea surface. …”
    Get full text
    Article
  6. 2526
  7. 2527

    ARTIFICIAL NEURAL NETWORK FOR MODELS OF HUMAN OPERATOR by Martin Ruzek

    Published 2017-12-01
    “…The search for a compromise between the complexity of biological neural network and the practical feasibility of the artificial network led to a new learning algorithm. This algorithm is based on the classical multilayered neural network; however, the learning rule is different. …”
    Get full text
    Article
  8. 2528

    A Vehicle Path Planning Algorithm Based on Mixed Policy Gradient Actor-Critic Model with Random Escape Term and Filter Optimization by Wei Nai, Zan Yang, Daxuan Lin, Dan Li, Yidan Xing

    Published 2022-01-01
    “…Deep reinforcement learning (DRL), as a state-of-the-art solution method in vehicle path planning, can better balance the ability and complexity of the algorithm to reflect the real situation. However, DRL has its own disadvantages of higher search cost and earlier convergence to the local optimum, as vehicle path planning issues are usually in a complex environment, and their action set can be diverse. …”
    Get full text
    Article
  9. 2529

    KF-NIPT: K-mer and fetal fraction-based estimation of chromosomal anomaly from NIPT data by Dongin Kim, Ji Yeon Sohn, Jin Hee Cho, Ji-Hye Choi, Gwi-young Oh, Hyun Goo Woo

    Published 2025-05-01
    “…Results We developed a KF-NIPT, a new algorithm that estimate chromosomal anomaly by calculating K-mer-based sequence depth and fetal fraction from the whole genome sequencing (WGS) data. …”
    Get full text
    Article
  10. 2530
  11. 2531

    On the Convergence of Maximum Likelihood Expectation–maximization Algorithm for Iterative Tomographic Reconstruction and the Role of Spatial Frequency, Location, Pixel Intensity, C... by Mohsen Qutbi

    Published 2025-04-01
    “…Background: It is desirable to iterate the maximum likelihood expectation–maximization (MLEM) algorithm to the point of convergence to obtain the optimal result. …”
    Get full text
    Article
  12. 2532

    Comparative Evaluation of Reinforcement Learning Algorithms for Multi-Agent Unmanned Aerial Vehicle Path Planning in 2D and 3D Environments by Mirza Aqib Ali, Adnan Maqsood, Usama Athar, Hasan Raza Khanzada

    Published 2025-06-01
    “…Furthermore, our findings reveal how algorithms perform while transitioning from a simplistic 2D setup to a realistic 3D physics-based environment, which is essential for performing sim-to-real transfer. …”
    Get full text
    Article
  13. 2533

    Determination of future gully erosion risk and its spatially quantitative interpretability of driving factors in regional scale using machine learning algorithms by Xin Liu, Dichen Wang, Mingming Guo, Xingyi Zhang, Zhuoxin Chen, Zhaokai Wan, Jielin Liu

    Published 2025-07-01
    “…The GERM was realized by four machine learning algorithms including Random Forest (RF), XGBoost, K-Nearest Neighbor (KNN), and Multi-layer perceptron of artificial neural networks (ANN-MLP). …”
    Get full text
    Article
  14. 2534
  15. 2535
  16. 2536

    Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution by Nawal Shaltout, Ahmed A.Abd El-Latif, Waleed M. Al-Adrousy, Samir Elmougy

    Published 2023-01-01
    “…Hence, it is essential to investigate and develop new cryptographic algorithms to ensure the protection and privacy of multimedia data at rest and during transmission through the communication channel while attempting to overcome the limitations of traditional cryptographic methods. …”
    Get full text
    Article
  17. 2537

    Feasibility of knee magnetic resonance imaging protocol using artificial intelligence-assisted iterative algorithm protocols: comparison with standard MRI protocols by Hailong Liu, Yanxia Chen, Meng Zhang, Han Bu, Fenghuan Lin, Jun Chen, Mengqiang Xiao, Jie Chen

    Published 2024-10-01
    “…SD images were processed using standard reconstruction techniques, while accelerated images utilized AIIA reconstruction. …”
    Get full text
    Article
  18. 2538

    Multidimensional routing with the increased navigation accuracy with the maintenance of flight notifications of the flight vehicles by V. I. Goncharenko, G. N. Lebedev, V. B. Malygin

    Published 2021-08-01
    “…While planning the routes it is also necessary to consider the interests of different interested groups, which are often opposite to one another. …”
    Get full text
    Article
  19. 2539

    Implementation of the Advanced Encryption Standard (AES) Algorithm and Bit Plane Complexity Segmentation (BPCS) Steganography Technique for Enhancing Text File Security by Afthar Kautsar, Muhammad Ikhsan

    Published 2025-03-01
    “…The data embedded in the image can be extracted with a success rate of 100%, while the image quality remains intact without noticeable changes. …”
    Get full text
    Article
  20. 2540

    Advanced control and optimization techniques for DFIG wind energy systems: A case study using pelican algorithm and CTID-PID controller by P. V. S. S. A. Parimala, Narendra Babu P

    Published 2025-06-01
    “…The RSC is controlled using the pelican optimization technique, a nature-inspired algorithm that effectively tunes control parameters to achieve optimal dynamic response and minimize power losses, enabling maximum wind power capture while maintaining stability. …”
    Get full text
    Article