Showing 6,041 - 6,060 results of 13,928 for search '(( whole algorithm ) OR ( while algorithm ))', query time: 0.20s Refine Results
  1. 6041

    INPUTS ACCESSIBILITY AND EFFECTIVENESS OF GROWTH ENHANCEMENT SUPPORT SCHEME (GESS) IN SOUTHWEST NIGERIA by Ibidun Olatohun IBITUNDE, Francis Oke ADERETI, Akinloye Jimoh FARINDE

    Published 2019-01-01
    “…In 2017, the equivalent of 56% of the value of the agricultural production generated was used for intermediary consumption, while the gross added value represented 44%. The present paper is looking at how a mathematical algorithm used to study the impact of the agricultural production on the GDP can represent a tool for analysing and assessing the evolution of the GDP..The conclusion of the article is that the current fluctuations of the agricultural production trigger variations of the GDP, which means that agriculture is maintaining its impact on the GDP.…”
    Get full text
    Article
  2. 6042

    PHOTOEMISSION METHOD OF TEMPERATURE MEASURING IN THE PROCESS OF SPARK PLASMA SINTERING POWDERS OF REFRACTORY METALS by D. V. Minko, O. O. Kuznechik

    Published 2015-04-01
    “…Construction and algorithm of the photoemission pyrometer based on a photomultiplier are outlined; the calibration procedure is set out. …”
    Get full text
    Article
  3. 6043

    Optimal Mobile Sensor Scheduling for a Guaranteed Coverage Ratio in Hybrid Wireless Sensor Networks by Zhixin Fu, Keyou You

    Published 2013-04-01
    “…This paper proposes an optimal mobile sensor-scheduling algorithm for recovering the failure sensors in hybrid wireless sensor networks (WSNs). …”
    Get full text
    Article
  4. 6044

    Research on system log anomaly detection based on deep learning by Yidong WANG, Peishun LIU, Gbin WAN

    Published 2019-10-01
    “…The system log reflects the running status of the system and records the activity information of specific events in the system.Therefore,the rapid and accurate detection of the system abnormal log is important to the security and stability of the system.A log anomaly detection algorithm based on GRU neural network is proposed.Log parsing is implemented based on log key technology.Log anomaly detection is realized by using anomaly detection model of execution path and anomaly detection model of parameter value.The system has the advantages of less parameters and faster training.It improves the running speed while achieving higher detection accuracy,and is suitable for log analysis of large information systems.…”
    Get full text
    Article
  5. 6045

    Searching for eclipsing binaries in the GSFC-Eleanor-Lite database. by Andy Teng

    Published 2023-08-01
    “…I also provide a catalog of the 66 new eclipsing binaries, including the properties measured by the two algorithms. In comparison with the majority of other papers, this pipeline is faster, consisting of per-light-curve runtimes of approximately one second, while still delivering accurate detections. …”
    Get full text
    Article
  6. 6046

    Extended Waltz Operators for Collinear Edges by Ben Mathew, Akram Alghanmi, Marius Silaghi

    Published 2025-05-01
    “…Keywords: Waltz Filtering Algorithm, Constraint Satisfaction Problem …”
    Get full text
    Article
  7. 6047

    AUTOMATIC DESIGNING OF POWER SUPPLY SYSTEMS by A. I. Kirspou, I. V. Kolosova

    Published 2005-08-01
    “…Methodology and software correspond to the requirements of the up-to-date designing, describe a general algorithm of program process and also reveals properties of automatic designing system objects. …”
    Get full text
    Article
  8. 6048

    An Improved Line Search Filter Method for the System of Nonlinear Equations by Zhong Jin, Yuqing Wang

    Published 2012-01-01
    “…An improved line search filter algorithm for the system of nonlinear equations is presented. …”
    Get full text
    Article
  9. 6049

    A Maximal Concurrency and Low Latency Distributed Scheduling Protocol for Wireless Sensor Networks by Xiaohui Liu, Yu Chen, Hongwei Zhang

    Published 2015-08-01
    “…Extensive measurements on two testbeds independently attest to ONAMA's superb performance compared to existing work: improving concurrency, throughput, and delay by a factor of 3.7, 3.0, and 5.3, respectively, while still maintaining reliability.…”
    Get full text
    Article
  10. 6050

    An Approach to Situational Data Integration Based on Data Service Hyperlink by Guiling Wang, Feng Zhang, Yanbo Han

    Published 2014-02-01
    “…Enlightened by web page hyperlink,a novel abstraction“data service hyperlink”for linking and integrating data was proposed.With the help of “data service hyperlink”,users can explicitly describe the relationship between data sources.Based on data service hyperlink,the approach to just-in-time data service construction was proposed to enable users integrate data while navigating data services.A data service hyperlink recommendation algorithm was also discussed to help users select proper data service hyperlink to deal with the temporary requirements.A case-study and some experiments how to build a situational data integration application based on data service hyperlink efficiently were presented.…”
    Get full text
    Article
  11. 6051

    Image colorization based on transformer by Min Xu

    Published 2025-07-01
    “…To ensure the generated image mimics a real-life image in terms of pixel accuracy and visual quality, the algorithm employs a variety of loss functions. Experimental results demonstrate significant performance improvements in black and white image colorization. …”
    Get full text
    Article
  12. 6052

    Identifying a Global Optimizer with Filled Function for Nonlinear Integer Programming by Wei-Xiang Wang, You-Lin Shang, Lian-Sheng Zhang

    Published 2011-01-01
    “…A corresponding filled function algorithm is established. Numerical experiments on several test problems are performed, and preliminary computational results are reported.…”
    Get full text
    Article
  13. 6053

    Numerical Generation of Trajectories Statistically Consistent with Stochastic Differential Equations by Mykhaylo Evstigneev

    Published 2025-07-01
    “…The high accuracy of the method as compared to the standard Milstein algorithm is demonstrated on the example of Büttiker’s ratchet. …”
    Get full text
    Article
  14. 6054

    Optimized Design of Relay Node Placement for Industrial Wireless Network by Heng Zhang, Zeyu Zhang, Fengxiang Zhang, Li Li, Ying Wang

    Published 2014-11-01
    “…In addition, an edge coloring algorithm is proposed to solve the conflict of TDMA communication, which improves paralleled and real-time communication performance. …”
    Get full text
    Article
  15. 6055

    Comparative analysis of Landsat TM, ETM+, OLI and EO-1 ALI satellite images at the Tisza-tó area, Hungary by Loránd Szabó, Márton Deák, Szilárd Szabó

    Published 2016-06-01
    “…We classified the study area using the Maximum Likelihood algorithm and used segmentation techniques for training area selection. …”
    Get full text
    Article
  16. 6056

    Using random subcarrier weighting for multi-carrier systems physical layer security by Zhou ZHONG, Liang JIN, Kai-zhi HUANG

    Published 2012-10-01
    “…An OFDM security model and a physical layer security transmission scheme were proposed for multi-carrier systems to achieve low probability of interception.In contrast to the resource allocation algorithm which would be disabled at the low SNR,this method designed the subcarrier transmission weighting vectors to randomize the eavesdropper’s signals but not the authorized receiver’s signals.The channel state information was the only character to distinguish authorized receivers and eavesdroppers,which was conducted to guide the weighting vectors design.Simulation results show that the proposed method guarantees that authorized receiver performs transmitted reference demodulation successfully,while the eavesdroppers can not detect the transmitted symbols.…”
    Get full text
    Article
  17. 6057

    DIAGNOSTICS AND TREATMENT OF OBSTRUCTIVE JAUNDICE AT CHRONIC OPISTHORCHIASIS by A. Ya. Il’Kanich, V. V. Darvin, N. V. Klimova, T. S. Vardanyan

    Published 2016-06-01
    “…A differentiated algorithm of treatment was developed and applied in relation to the obtained data.…”
    Get full text
    Article
  18. 6058

    Reliable transmission mechanism with differentiated protection in virtualized fiber-wireless access network by Ruyan WANG, Yishuang GAO, Xiao CHEN

    Published 2019-03-01
    “…In view of the different reliability requirements of network service,a reliable transmission mechanism with differentiated protection was proposed in virtualized fiber-wireless access network.The quality of protection required by users and the fees that can be paid were used as a prerequisite.The backup protection resources were flexibly allocated by quantifying the multi-level protection quality with the probability of recovery.Then,for reducing traffic congestion and the unprotected services,the level service differentiation algorithm was used to choose protection link which was satisfied with the level of protection quality.The results show the proposed mechanism has more advantages in terms of long-term benefit-to-cost ratio and underlying network resource overhead,and provides users with a more flexible virtual network transmission while satisfying users’ reliability requirements.…”
    Get full text
    Article
  19. 6059

    APPLICATION OF PHRASEOLOGICAL PATTERNS IN THE RECOGNITION OF CONTROLLER’S INSTRUCTIONS, FOR AIR TRAFFIC CONTROL TRAINING COMPLEXES

    Published 2016-11-01
    “…The paper proposes an algorithm for recognizing ATC controller’s messages using method of contextual analysis of phraseology elements based on the application of phraseological patterns. …”
    Get full text
    Article
  20. 6060

    Pengamanan Dokumen Digital Perusahaan Menggunakan Metode Least Significant Bit (LSB) Dan Algoritma RC4 Stream Chipher by Handa Gustiawan, Hesti Rian

    Published 2022-03-01
    “…Steganography is a technique to hide messages or secret data in a place called a carrier file. While cryptography is a science that studies how to keep data or messages safe when sent, from sender to recipient without interference from other parties. …”
    Get full text
    Article