Showing 6,441 - 6,460 results of 13,928 for search '(( whole algorithm ) OR ( while algorithm ))', query time: 0.20s Refine Results
  1. 6441

    Convolutional neural network for gesture recognition human-computer interaction system design. by Peixin Niu

    Published 2025-01-01
    “…Empirical findings demonstrate that our approach surpasses the accuracy achieved by most lightweight network models on publicly available datasets, all while maintaining real-time gesture interaction capabilities. …”
    Get full text
    Article
  2. 6442

    Intelligent Cyber-Attack Detection in IoT Networks Using IDAOA-Based Wrapper Feature Selection by Mohammed Abdullah, Ryna Svyd

    Published 2025-06-01
    “…The IDAOA serves as a wrapper-based feature selection method, optimizing the identification of the most impactful features while balancing local exploration and global exploitation. …”
    Get full text
    Article
  3. 6443

    Design approach for optimization of a piston ring profile considering mixed lubrication by Zhinan Zhang, Jun Liu, Youbai Xie

    Published 2016-12-01
    “…Abstract To reduce the friction of a piston ring while maintaining a large oil film load-carrying capacity, an approach comprising of the inverse method and the sequential quadratic programming algorithm was proposed. …”
    Get full text
    Article
  4. 6444

    Design of Asymmetrical Relay Resonators for Maximum Efficiency of Wireless Power Transfer by Bo-Hee Choi, Jeong-Hae Lee

    Published 2016-01-01
    “…The capacitance of the second resonator to nth resonator and the load resistance should be determined for maximum efficiency while the capacitance of the first resonator and the source resistance are obtained for the impedance matching. …”
    Get full text
    Article
  5. 6445

    Non-singular terminal super-twitsing control of servo systems with backlash by Taoyu Wang, Shiyan Sun, Qijie Chen

    Published 2025-02-01
    “…Finally, the effectiveness of the proposed control algorithm is verified by simulation.…”
    Get full text
    Article
  6. 6446

    Vision transformer-enhanced thermal anomaly detection in building facades through fusion of thermal and visible imagery by Siyu Zheng, Jiaxin Zhang, Rui Zu, Yunqin Li

    Published 2025-07-01
    “…The thermal anomaly detection of building facades is critically important for the evaluation and upkeep of structures. While conventional methods are effective in numerous instances, their capability to discern flaws in complex environments is constrained. …”
    Get full text
    Article
  7. 6447

    Comparison of Probabilistic Chain Graphical Model-Based and Gaussian Process-Based Observation Selections for Wireless Sensor Scheduling by Qi Qi, Yi Shang

    Published 2011-10-01
    “…It leads to a tradeoff between making a fewer number of observations for saving energy while obtaining sufficient and more valuable sensing information. …”
    Get full text
    Article
  8. 6448

    Design of nodes importance assessment method for complex network based on neighborhood information by Xing LI, Jie ZHAN, Baoquan REN, Siqi ZHU

    Published 2024-03-01
    “…Accurate identification of influential nodes in complex networks is crucial for network management and network security.The local centrality method is concise and easy to use, but ignores the topological relationship between neighboring nodes and cannot provide globally optimal results.A node importance assessment method was proposed to correlate the node edge relationship and topology, which firstly applied the H-index and information entropy to assess the nodes, then combined the structural holes of the nodes with the structural characteristics of the nodes, and took into account the attribute of “bridging” while focusing on the node’s own quality and the amount of information about the neighboring nodes.The algorithm was validated by simulating the propagation process using the SIR model, and the Kendall correlation coefficient, complementary cumulative distribution function and propagation influence were applied to validate the validity and applicability of the method.Comparison of the experimental results on six real network datasets shows that the proposed method is more accurate than the traditional centrality methods in identifying and ordering the key nodes in the network.…”
    Get full text
    Article
  9. 6449

    Automatisierte Identifikation und Lemmatisierung historischer Berufsbezeichnungen in deutschsprachigen Datenbestände... by Jan Michael Goldberg, Katrin Moeller

    Published 2022-03-01
    “…In order to reduce manual effort, an algorithm for the automated lemmatization of historical, German-language occupational data is developed. …”
    Get full text
    Article
  10. 6450

    Unveiling connectivity patterns of railway timetables through complex network theory and Infomap clustering. by Fabio Lamanna, Michele Prisma, Giorgio Medeossi

    Published 2025-01-01
    “…This study introduces a novel framework for analysing railway timetable connectivity through complex network theory and the Infomap clustering algorithm. By transforming timetable data into network representations, we systematically assess the connectivity and efficiency of the Norwegian railway system for the 2024 and projected 2033 scenarios. …”
    Get full text
    Article
  11. 6451

    Adaptive rumor propagation and activity contagion in higher-order networks by Yafang Dong, Liang’an Huo, Matjaž Perc, Stefano Boccaletti

    Published 2025-06-01
    “…Abstract Rumors in social systems are omnipresent. While traditional models focus on pairwise interactions, the collective effects of group interactions are insufficiently explored. …”
    Get full text
    Article
  12. 6452

    Event-based Controller Design for Networked Control Systems with Time-varying Random Delays by Beheshte Sadeghi Sabzevari, Mohammad Haddad Zarif, Seyed Kamal Hosseini Sani

    Published 2024-02-01
    “…The validity of the proposed algorithm is confirmed via simulation results and the results are well compared with results from exerting event-triggered and self-triggered control individually.…”
    Get full text
    Article
  13. 6453

    DCOOL: Dynamic computation offloading and resource allocation for LEO satellite-assisted edge computing in a ground-space integrated framework by Jeonghwan Kim, Jeongho Kwak

    Published 2024-12-01
    “…Using Lyapunov optimization, we propose an efficient DCOOL algorithm to minimize average power consumption and propagation delay constrained by queue stability. …”
    Get full text
    Article
  14. 6454

    Detecting unsafe behavior in neural network imitation policies for caregiving robotics by Andrii Tytarenko

    Published 2024-12-01
    “…This paper explores the application of imitation learning in caregiving robotics, aiming at addressing the increasing demand for automated assistance in caring for the elderly and disabled. While leveraging advancements in deep learning and control algorithms, the study focuses on training neural network policies using offline demonstrations. …”
    Get full text
    Article
  15. 6455

    THE STRATEGY OF FORMATION OF THE CONTENT OF TEACHING A FOREIGN LANGUAGE AS A REFLECTION OF SOCIO-CULTURAL DETERMINANTS OF MODERN SOCIETY by Telman Garikovich Grigoryan

    Published 2022-03-01
    “…This includes the study of such aspects of the problem as allocation of the main algorithm of realization of strategy. Under cosideration are the main components of content of teaching and the competences developed on their basis in the Russian system. …”
    Get full text
    Article
  16. 6456

    RIS-assisted terahertz frequency band vehicle network capacity optimization by Fatang CHEN, Xiaoling LIU, Dan WANG, Ruofan ZHANG

    Published 2023-10-01
    “…In order to alleviate the spectrum scarcity and capacity limitation of the current wireless system, the terahertz frequency band was introduced and the reconfigurable intelligent surface (RIS) was used for auxiliary communication to construct a downlink vehicle network.Considering the constraints of limited total system power, QoS constraints of cellular mobile users, and randomness constraints of vehicle and user locations, a hybrid optimization model was established for optimal power allocation and optimal deployment of RIS with the aim of maximizing the total rate of vehicle users.Based on the balance method, linear transformation method, and element elimination method, the original NP-hard problem was transformed into a convex optimization problem with complex correlation constraints and multivariate coupling.The inner layer iteration was based on the Lagrange multiplier method to solve the optimal power allocation, and the outer layer iteratively solved the optimal deployment of RIS based on a improved genetic algorithm.The simulation results show that rationally deploying the number and distribution density of RIS nodes based on optimal power allocation can save costs while achieving a higher target total capacity.…”
    Get full text
    Article
  17. 6457

    An efficient homogenization method using the trigonometric interpolation and the fast fourier transform by Ngoc-Trung Nguyen, Christian Licht, Jin-Hwe Kweon

    Published 2011-12-01
    “… This study focuses on formulation of the Augmented Lagrangian and application of the Uzawa's algorithm to solve the homogenization problem of microscopic periodic media as in composites. …”
    Get full text
    Article
  18. 6458

    An optimization approach for blood supply chain management integrating drone delivery method by Mayuri K. N, Gowsalya M.

    Published 2025-08-01
    “…We proposed an optimization model that uses mixed integer non-linear programming (MINLP) with Dijkstra’s algorithm. This model considers drone capabilities such as payload capacity, travel speed, and range. …”
    Get full text
    Article
  19. 6459

    Impulsive Sound Detection Directly in Sigma-Delta Domain by Igor Dantas dos Santos MIRANDA, Antonio C. de C. LIMA

    Published 2017-03-01
    “…Recent implementations of Sigma-delta converters have achieved low cost, low power consumption and high integration while maintaining resolution as high as in Nyquist-rate converters. …”
    Get full text
    Article
  20. 6460

    The Effect of Real-time Headbox Adjustments on Data Quality by Pieter Blignaut

    Published 2018-03-01
    “…Eye trackers can be expected to present data at a high speed, with good accuracy and precision, small latency and with minimal loss of data while allowing participants to behave as normally as possible. …”
    Get full text
    Article