-
6041
INPUTS ACCESSIBILITY AND EFFECTIVENESS OF GROWTH ENHANCEMENT SUPPORT SCHEME (GESS) IN SOUTHWEST NIGERIA
Published 2019-01-01“…In 2017, the equivalent of 56% of the value of the agricultural production generated was used for intermediary consumption, while the gross added value represented 44%. The present paper is looking at how a mathematical algorithm used to study the impact of the agricultural production on the GDP can represent a tool for analysing and assessing the evolution of the GDP..The conclusion of the article is that the current fluctuations of the agricultural production trigger variations of the GDP, which means that agriculture is maintaining its impact on the GDP.…”
Get full text
Article -
6042
PHOTOEMISSION METHOD OF TEMPERATURE MEASURING IN THE PROCESS OF SPARK PLASMA SINTERING POWDERS OF REFRACTORY METALS
Published 2015-04-01“…Construction and algorithm of the photoemission pyrometer based on a photomultiplier are outlined; the calibration procedure is set out. …”
Get full text
Article -
6043
Optimal Mobile Sensor Scheduling for a Guaranteed Coverage Ratio in Hybrid Wireless Sensor Networks
Published 2013-04-01“…This paper proposes an optimal mobile sensor-scheduling algorithm for recovering the failure sensors in hybrid wireless sensor networks (WSNs). …”
Get full text
Article -
6044
Research on system log anomaly detection based on deep learning
Published 2019-10-01“…The system log reflects the running status of the system and records the activity information of specific events in the system.Therefore,the rapid and accurate detection of the system abnormal log is important to the security and stability of the system.A log anomaly detection algorithm based on GRU neural network is proposed.Log parsing is implemented based on log key technology.Log anomaly detection is realized by using anomaly detection model of execution path and anomaly detection model of parameter value.The system has the advantages of less parameters and faster training.It improves the running speed while achieving higher detection accuracy,and is suitable for log analysis of large information systems.…”
Get full text
Article -
6045
Searching for eclipsing binaries in the GSFC-Eleanor-Lite database.
Published 2023-08-01“…I also provide a catalog of the 66 new eclipsing binaries, including the properties measured by the two algorithms. In comparison with the majority of other papers, this pipeline is faster, consisting of per-light-curve runtimes of approximately one second, while still delivering accurate detections. …”
Get full text
Article -
6046
Extended Waltz Operators for Collinear Edges
Published 2025-05-01“…Keywords: Waltz Filtering Algorithm, Constraint Satisfaction Problem …”
Get full text
Article -
6047
AUTOMATIC DESIGNING OF POWER SUPPLY SYSTEMS
Published 2005-08-01“…Methodology and software correspond to the requirements of the up-to-date designing, describe a general algorithm of program process and also reveals properties of automatic designing system objects. …”
Get full text
Article -
6048
An Improved Line Search Filter Method for the System of Nonlinear Equations
Published 2012-01-01“…An improved line search filter algorithm for the system of nonlinear equations is presented. …”
Get full text
Article -
6049
A Maximal Concurrency and Low Latency Distributed Scheduling Protocol for Wireless Sensor Networks
Published 2015-08-01“…Extensive measurements on two testbeds independently attest to ONAMA's superb performance compared to existing work: improving concurrency, throughput, and delay by a factor of 3.7, 3.0, and 5.3, respectively, while still maintaining reliability.…”
Get full text
Article -
6050
An Approach to Situational Data Integration Based on Data Service Hyperlink
Published 2014-02-01“…Enlightened by web page hyperlink,a novel abstraction“data service hyperlink”for linking and integrating data was proposed.With the help of “data service hyperlink”,users can explicitly describe the relationship between data sources.Based on data service hyperlink,the approach to just-in-time data service construction was proposed to enable users integrate data while navigating data services.A data service hyperlink recommendation algorithm was also discussed to help users select proper data service hyperlink to deal with the temporary requirements.A case-study and some experiments how to build a situational data integration application based on data service hyperlink efficiently were presented.…”
Get full text
Article -
6051
Image colorization based on transformer
Published 2025-07-01“…To ensure the generated image mimics a real-life image in terms of pixel accuracy and visual quality, the algorithm employs a variety of loss functions. Experimental results demonstrate significant performance improvements in black and white image colorization. …”
Get full text
Article -
6052
Identifying a Global Optimizer with Filled Function for Nonlinear Integer Programming
Published 2011-01-01“…A corresponding filled function algorithm is established. Numerical experiments on several test problems are performed, and preliminary computational results are reported.…”
Get full text
Article -
6053
Numerical Generation of Trajectories Statistically Consistent with Stochastic Differential Equations
Published 2025-07-01“…The high accuracy of the method as compared to the standard Milstein algorithm is demonstrated on the example of Büttiker’s ratchet. …”
Get full text
Article -
6054
Optimized Design of Relay Node Placement for Industrial Wireless Network
Published 2014-11-01“…In addition, an edge coloring algorithm is proposed to solve the conflict of TDMA communication, which improves paralleled and real-time communication performance. …”
Get full text
Article -
6055
Comparative analysis of Landsat TM, ETM+, OLI and EO-1 ALI satellite images at the Tisza-tó area, Hungary
Published 2016-06-01“…We classified the study area using the Maximum Likelihood algorithm and used segmentation techniques for training area selection. …”
Get full text
Article -
6056
Using random subcarrier weighting for multi-carrier systems physical layer security
Published 2012-10-01“…An OFDM security model and a physical layer security transmission scheme were proposed for multi-carrier systems to achieve low probability of interception.In contrast to the resource allocation algorithm which would be disabled at the low SNR,this method designed the subcarrier transmission weighting vectors to randomize the eavesdropper’s signals but not the authorized receiver’s signals.The channel state information was the only character to distinguish authorized receivers and eavesdroppers,which was conducted to guide the weighting vectors design.Simulation results show that the proposed method guarantees that authorized receiver performs transmitted reference demodulation successfully,while the eavesdroppers can not detect the transmitted symbols.…”
Get full text
Article -
6057
DIAGNOSTICS AND TREATMENT OF OBSTRUCTIVE JAUNDICE AT CHRONIC OPISTHORCHIASIS
Published 2016-06-01“…A differentiated algorithm of treatment was developed and applied in relation to the obtained data.…”
Get full text
Article -
6058
Reliable transmission mechanism with differentiated protection in virtualized fiber-wireless access network
Published 2019-03-01“…In view of the different reliability requirements of network service,a reliable transmission mechanism with differentiated protection was proposed in virtualized fiber-wireless access network.The quality of protection required by users and the fees that can be paid were used as a prerequisite.The backup protection resources were flexibly allocated by quantifying the multi-level protection quality with the probability of recovery.Then,for reducing traffic congestion and the unprotected services,the level service differentiation algorithm was used to choose protection link which was satisfied with the level of protection quality.The results show the proposed mechanism has more advantages in terms of long-term benefit-to-cost ratio and underlying network resource overhead,and provides users with a more flexible virtual network transmission while satisfying users’ reliability requirements.…”
Get full text
Article -
6059
APPLICATION OF PHRASEOLOGICAL PATTERNS IN THE RECOGNITION OF CONTROLLER’S INSTRUCTIONS, FOR AIR TRAFFIC CONTROL TRAINING COMPLEXES
Published 2016-11-01“…The paper proposes an algorithm for recognizing ATC controller’s messages using method of contextual analysis of phraseology elements based on the application of phraseological patterns. …”
Get full text
Article -
6060
Pengamanan Dokumen Digital Perusahaan Menggunakan Metode Least Significant Bit (LSB) Dan Algoritma RC4 Stream Chipher
Published 2022-03-01“…Steganography is a technique to hide messages or secret data in a place called a carrier file. While cryptography is a science that studies how to keep data or messages safe when sent, from sender to recipient without interference from other parties. …”
Get full text
Article