Suggested Topics within your search.
Showing 14,481 - 14,500 results of 20,616 for search '((prediction OR reduction) OR education) algorithms', query time: 0.30s Refine Results
  1. 14481

    Grey Wolf Resampling-Based Rao-Blackwellized Particle Filter for Mobile Robot Simultaneous Localization and Mapping by Yong Dai, Ming Zhao

    Published 2021-01-01
    “…In addition, we propose an adaptive local data association (Range-SLAM) scheme to improve the computational efficiency for the algorithm of the nearest neighbor (NN) data association in the iteration of the RBPF prediction. …”
    Get full text
    Article
  2. 14482

    Efficient signcryption scheme based on Cocks’ identity cryptosystem by Changgen PENG, Xiaoyu ZHANG, Hongfa DING, Shanhui YANG

    Published 2020-12-01
    “…Most of the existing identity-based signcryption schemes are based on bilinear or multilinear pairing operations construction.To solve the problem of low efficiency caused by complex pair operation, a new efficient signcryption scheme based on the identity cryptosystem of Cocks was proposed.Firstly, the security model of the proposed scheme was formalized, and the definition of confidentiality and unforgeability was given.Secondly, the quadratic residue problem was used to realize the concrete construction of the proposed scheme, and the signature algorithm was designed in a logical step by combining Jacobi symbol operation.Finally, the security proofed that the scheme satisfied the confidentiality and unforgeability was given under the random prediction model.The efficiency analysis shows that compared with the existing identity-based signcryption scheme, the proposed scheme greatly improves the computing efficiency and has good characteristics of identity-based cryptosystem.…”
    Get full text
    Article
  3. 14483

    Complexity control method of random forest based HEVC by Peng WEN, Zongju PENG, Fen CHEN, Gangyi JIANG, Mei YU

    Published 2019-02-01
    “…High efficiency video coding (HEVC) has high computational complexity,and fast algorithm cannot perform video coding under restricted coding time.Therefore,a complexity control method of HEVC based on random forest was proposed.Firstly,three random forest classifiers with different prediction accuracy were trained to provide various coding configurations for coding tree unit (CTU).Then,an average depth-complexity model was built to allocate CTU complexity.Finally,the CTU coding configuration,determined by the smoothness,average depth,bit,and CTU-level accumulated coding error,was used to complete complexity control.The experimental results show that the proposed method has better complexity control precision,and outperforms the state-of-the-art method in terms of video quality.…”
    Get full text
    Article
  4. 14484

    基于改进Kriging模型的主动学习可靠性分析方法 by 陈哲, 杨旭锋, 程鑫

    Published 2021-01-01
    “…,the differential evolution algorithm is introduced to explore the optimal parameter of Kriging model and improve the accuracy of Kriging prediction information.As a result,the training point in each iteration is guaranteed to be the global optimal one and the efficiency of ALK model is largely improved.…”
    Get full text
    Article
  5. 14485

    Efficient signcryption scheme based on Cocks’ identity cryptosystem by Changgen PENG, Xiaoyu ZHANG, Hongfa DING, Shanhui YANG

    Published 2020-12-01
    “…Most of the existing identity-based signcryption schemes are based on bilinear or multilinear pairing operations construction.To solve the problem of low efficiency caused by complex pair operation, a new efficient signcryption scheme based on the identity cryptosystem of Cocks was proposed.Firstly, the security model of the proposed scheme was formalized, and the definition of confidentiality and unforgeability was given.Secondly, the quadratic residue problem was used to realize the concrete construction of the proposed scheme, and the signature algorithm was designed in a logical step by combining Jacobi symbol operation.Finally, the security proofed that the scheme satisfied the confidentiality and unforgeability was given under the random prediction model.The efficiency analysis shows that compared with the existing identity-based signcryption scheme, the proposed scheme greatly improves the computing efficiency and has good characteristics of identity-based cryptosystem.…”
    Get full text
    Article
  6. 14486
  7. 14487
  8. 14488

    Knowledge management system as a basis for smart learning by Natalia V. Dneprovskaya

    Published 2018-08-01
    “…However, the issues of the content of education become most relevant. Research in the field of knowledge management remain relevant because, the more perfect the technologies become, that notice the algorithmized work of specialists, the higher the value of creativity for society and the economy.Materials and methods of research include discourse analysis of domestic and foreign scientific sources devoted to the issues of smart education and knowledge management, the systematization of the material. …”
    Get full text
    Article
  9. 14489

    The Measurement of Vital Signs in Pediatric Patients by Lifelight Software in Comparison to the Standard of Care: Protocol for the VISION-Junior Observational Study by Gauri Misra, Simon Wegerif, Louise Fairlie, Melissa Kapoor, James Fok, Gemma Salt, Jay Halbert, Ian Maconochie, Niall Mullen

    Published 2025-03-01
    “…Early data will be used to refine the algorithms. A separate dataset will be retained to test the performance of the app against predefined targets. …”
    Get full text
    Article
  10. 14490

    HMS-PAU-IN: A heterogeneous multi-scale spatiotemporal interaction network model for population analysis units by Xiaorui Yang, Rui Li, Jing Xia, Junhao Wang, Hongyan Li, Nixiao Zou

    Published 2025-06-01
    “…To validate the model, we developed a population prediction model that integrates the multi-scale features of PAUs and introduced Leiden-IES-PMS, a community detection method based on the Leiden algorithm, which integrates internal and external environmental semantics and adopts a proximity merging strategy. …”
    Get full text
    Article
  11. 14491
  12. 14492
  13. 14493

    A Multi-Objective Optimization Method for Carbon–REC Trading in an Integrated Energy System of High-Speed Railways by Wei-Na Zhang, Zhe Xu, Ying-Yi Hong, Fang-Yu Liu, Zhong-Qin Bi

    Published 2025-07-01
    “…Benchmark analysis demonstrates superior economic–environmental synergy, achieving a 23.90% cost reduction (USD 923,152 annual savings) and 24.02% lower emissions (693,452.5 kg CO<sub>2</sub> reduction) versus conventional systems. …”
    Get full text
    Article
  14. 14494

    High-confidence assessment of functional impact of human mitochondrial non-synonymous genome variations by APOGEE. by Stefano Castellana, Caterina Fusilli, Gianluigi Mazzoccoli, Tommaso Biagini, Daniele Capocefalo, Massimo Carella, Angelo Luigi Vescovi, Tommaso Mazza

    Published 2017-06-01
    “…Since these tools proved to be rather incongruent, we have designed and implemented APOGEE, a machine-learning algorithm that outperforms all existing prediction methods in estimating the harmfulness of mitochondrial non-synonymous genome variations. …”
    Get full text
    Article
  15. 14495

    A Synergistic CNN-DF Method for Landslide Susceptibility Assessment by Jiangang Lu, Yi He, Lifeng Zhang, Qing Zhang, Jiapeng Tang, Tianbao Huo, Yunhao Zhang

    Published 2025-01-01
    “…In addition, the SHAP algorithm was used to quantify the contribution of features to the prediction results both globally and locally, further explaining the model. …”
    Get full text
    Article
  16. 14496

    Transfer Learning of High-Dimensional Stochastic Frontier Model via Elastic Net by Jiahao Chen, Wenjun Chen, Yunquan Song

    Published 2025-06-01
    “…When the target data is limited, transfer learning improves the accuracy of model estimation and prediction by transferring the source data. When the transferable source is known, a transfer learning algorithm for a high-dimensional stochastic frontier model is proposed based on Elastic Net. …”
    Get full text
    Article
  17. 14497

    Analysis method of software failure modes in command information system based on complex networks by WANG Bo, JIANG Xuping, JING Huiqian

    Published 2025-06-01
    “…Based on a weighted undirected connected graph, this paper constructs a static model of the complex network for the command information system software, proposes a hierarchical centrality algorithm for the multi-layer neighbor influence of nodes, realizes the prediction of software network fault sources, and mines the fault propagation path based on the ant colony system algorithm. …”
    Get full text
    Article
  18. 14498

    Optimizing Spatial Complexity of the Hard Decision Decoder Based on Hash and Syndrome Decoding (HSDec) by Seddiq El Kasmi Alaoui, Tarik Chanyour, Hamza Faham, Said Nouh

    Published 2024-12-01
    “…The results demonstrated significant memory reduction rates and coding gains ranging from 0.8 dB to 2.8 dB over the AWGN channel and from 14 dB to 32 dB over the Rayleigh channel, confirming the robustness of the algorithm under different channel conditions. …”
    Get full text
    Article
  19. 14499

    A Novel Green Logistics Vehicle Scheduling Method Against Road Congestion Utilizing Vehicle–Road–Cloud Collaborative Technology by Rui Zheng, Zhiwei Zhu, Xiaolu Ma, Ruiyang Shi, Zibao Lu

    Published 2025-01-01
    “…To solve this model, an initial solution is constructed using an energy-saving algorithm, while exploring a Cauchy variational strategy and a parallel local search to propose an improved adaptive large neighborhood search (ALNS) algorithm. …”
    Get full text
    Article
  20. 14500