Showing 6,481 - 6,500 results of 13,928 for search '(( whole algorithm ) OR ( while algorithm ))', query time: 0.24s Refine Results
  1. 6481

    Machine Learning G-Code Optimization by Héctor Lasluisa-Naranjo, David Rivas-Lalaleo, Joaquín Vaquero-López, Christian Cruz-Moposita

    Published 2024-11-01
    “…This research applies the K-means machine learning clustering algorithm to optimize G-code parameters such as extruder and heated bed temperature, deposition speed, and flow control. …”
    Get full text
    Article
  2. 6482

    Indoor positioning system for wireless sensor networks based on two-stage fuzzy inference by Chia-Hsin Cheng, Yi Yan

    Published 2018-05-01
    “…In this article, we present a two-stage indoor positioning scheme using a fuzzy-based algorithm aimed at minimizing uncertainty in received signal strength indicator measures from reference nodes in wireless sensor networks. …”
    Get full text
    Article
  3. 6483

    Differential Evolution for Optimizing Model Parameters in Simulation of Direct Dimethyl Carbonate Synthesis by Outi Ruusunen, Riitta Keiski, Mika Ruusunen

    Published 2025-07-01
    “…The Differential Evolution (DE) algorithm was applied to optimize parameters of the model. …”
    Get full text
    Article
  4. 6484

    Dual Hiding in Digital Image Files by Farah Mohammed

    Published 2011-07-01
    “…In this paper, a modified algorithm is suggested depending on two principles: double information hiding and multiple watermarking. …”
    Get full text
    Article
  5. 6485

    Inverse problems for discrete Hermite nabla difference equation by B. Shiri, Y. Guang, D. Baleanu

    Published 2025-12-01
    “…Furthermore, a simple and fast recursive algorithm is proposed for computing corresponding eigenvectors. …”
    Get full text
    Article
  6. 6486

    A hybrid unsupervised machine learning model with spectral clustering and semi-supervised support vector machine for credit risk assessment. by Tao Yu, Wei Huang, Xin Tang, Duosi Zheng

    Published 2025-01-01
    “…The effectiveness, efficiency, and robustness of the proposed TSC-SVM model are demonstrated through various real-world applications. The proposed algorithm is anticipated to expand the customer base for financial institutions while reducing economic losses.…”
    Get full text
    Article
  7. 6487

    A Hybrid Mobile Robot Path Planning Scheme Based on Modified Gray Wolf Optimization and Situation Assessment by Yilun Liu, Xiaoming Li

    Published 2022-01-01
    “…When combined with a situation assessment mechanism, it realizes dynamic obstacle avoidance while keeping the path length as short as possible.…”
    Get full text
    Article
  8. 6488

    TraIL: Pinpoint Trajectory for Indoor Localization by Shengnan Li, Zheng Qin, Chenshu Wu, Zheng Yang

    Published 2015-11-01
    “…Our basic idea is that WiFi-only localization can generate rough but absolute positions, while user motion is able to bring accurate but relative locations. …”
    Get full text
    Article
  9. 6489

    Robust Mainlobe Interference Suppression Based on Joint Oblique Projection for Dual Polarization Conformal Array by Chao Liu, Xiaoyuan Zhang, Junjie Qian, Lei Zhang

    Published 2023-01-01
    “…In this paper, a robust mainlobe interference suppression algorithm is proposed in a space-polarization joint domain based on a dual-polarized conformal array. …”
    Get full text
    Article
  10. 6490

    Multi-camera video collaborative analysis method based on edge computing by Zhibo QI, Lei DU, Ru HUO, Fan YANG, Tao HUANG

    Published 2023-08-01
    “…In order to reduce the processing volume of multi-camera real-time video data in smart city scenarios, a video collaborative analysis method based on machine learning algorithms at the edge was proposed.Firstly, for the important objects detected by each camera, different key windows were designed to filter the region of interest (RoI) in the video, reduce the video data volume and extract its features.Then, based on the extracted data features, the same objects in the videos from different cameras were annotated, and a strategy for calculating the association degree value between cameras was designed for further reducing the video data volume.Finally, the GC-ReID algorithm based on graph convolutional network (GCN) and re-identification (ReID) was proposed, aiming at achieving the collaborative analysis of multi-camera videos.The experimental results show that proposed method can effectively reduce the system latency and improve the video compression rate while ensuring the high accuracy, compared with the existing video analysis methods.…”
    Get full text
    Article
  11. 6491

    Numerical Simulation of Freckle Defects in Nickel based Superalloys by LIU Dong rong, REN Ying, GUO Er jun

    Published 2020-04-01
    “…In order to deeply understand the formation characteristics of freckle defects in the process of directional solidification of nickelbased superalloy, three major equations of fluid mechanics were used to simulate the formation of freckles during the directional solidification of CMSX2 superalloy based on the SIMPLE (SemiImplicit Method for Pressure Linked Equations) algorithm The simulations in the reference were used to validate the model The effects of geometric shape and alloy composition on the flow field, solid fraction field and solute segregation distribution during solidification of the casting were investigated The simulations show that freckles are easily formed in the casting with shrinkage section The Al element in the alloy composition promotes the formation of freckles, while the Ta element plays a very good role in suppressing the formation of freckles…”
    Get full text
    Article
  12. 6492

    A framework for detecting and predicting highway traffic anomalies via multimodal fusion and heterogeneous graph neural networks. by Shaowei Sun, Mingzhou Liu

    Published 2025-01-01
    “…For instance, the proposed MHGNN-CPLE model achieves superior accuracy and F1 score in static detection tasks while maintaining high accuracy under different noise levels in dynamic detection scenarios. …”
    Get full text
    Article
  13. 6493

    NeuralConstraints: integrating a neural generative model with constraint-based composition by Juan S. Vassallo, Örjan Sandred, Julien Vincenot

    Published 2025-04-01
    “…‘NeuralConstraints’ combines the predictive generative abilities of neural networks trained on symbolic musical data with an advanced backtracking constraint algorithm. It provides a user-friendly interface for exploring symbolic neural generation, while offering a higher level of creative control compared to conventional neural generative processes, leveraged by the constraint solver. …”
    Get full text
    Article
  14. 6494

    Computing mutual similarity of 3D human faces in nearly linear time. by Radek Ošlejšek, Petra Urbanová, Jiří Sochor

    Published 2025-01-01
    “…Using three-dimensional scans of human faces has become an emerging technique in studies of human variation, where the quantitative assessment of facial similarity complements the measurement of other somatic traits. While the algorithms for automated registration (geometrical alignment) and similarity measurement of two facial scans are well-known and used in practice, their direct application for batch processing is limited due to computational requirements. …”
    Get full text
    Article
  15. 6495

    Computer, Computer Science, and Computational Thinking: Relationship between the Three Concepts by Pinaki Chakraborty

    Published 2024-01-01
    “…The first school sees computational thinking as the use of computers to explore the world, while the other sees computational thinking as the application of concepts from computer science to solve real-world problems. …”
    Get full text
    Article
  16. 6496

    The Role of Misclassification and Carbon Tax Policies in Determining Payment Time and Replenishment Strategies for Imperfect Product Shipments by Chun-Tao Chang, Yao-Ting Tseng

    Published 2025-05-01
    “…Theoretical analysis showed that profit exhibited joint concavity with respect to both payment time and replenishment time. An algorithm was also formulated to derive optimal solutions. …”
    Get full text
    Article
  17. 6497

    Performance optimization of multilink laser powered UAV relay systems by Xuehui Zhao, Yuanchang Zhong, Zhongyuan Mao, Xunzhuo He

    Published 2025-04-01
    “…With the goal of maximizing the minimum system link throughput, we formulate a joint optimization problem for UAV trajectory and power control and propose an iterative algorithm to efficiently manage energy and mitigate co-channel interference while solving this non-convex problem. …”
    Get full text
    Article
  18. 6498

    Orchard-Wide Visual Perception and Autonomous Operation of Fruit Picking Robots: A Review by CHEN Mingyou, LUO Lufeng, LIU Wei, WEI Huiling, WANG Jinhai, LU Qinghua, LUO Shaoming

    Published 2024-09-01
    “…Moreover, it emphasizes the necessity of enhancing the robustness and stability of core algorithms governing perception, planning, and control, while ensuring their seamless coordination which is a central challenge that emerges. …”
    Get full text
    Article
  19. 6499

    Carreau fluid flow analysis with inclined magnetic field and melting heat transfer by Rasheed Khan, Salman Zeb, Zakir Ullah, Muhammad Yousaf, Inna Samuilik

    Published 2025-03-01
    “…The concentration profile enhances for magnetic parameter while diminishes for modified Dufour parameter, Schmidt and Soret numbers. …”
    Get full text
    Article
  20. 6500

    Nonpuerperal Uterine Inversion: What the Gynaecologists Need to Know? by R. P. Herath, M. Patabendige, M. Rashid, P. S. Wijesinghe

    Published 2020-01-01
    “…The majority (48.8%) had only abdominal access, while 27.1% had both abdominal and vaginal access. …”
    Get full text
    Article