-
3421
Using Time Clusters for Following Users’ Shifts in Rating Practices
Published 2017-12-01“…Users that enter ratings for items follow different rating practices, in the sense that, when rating items, some users are more lenient, while others are stricter. …”
Get full text
Article -
3422
Maximum Energy Absorbed from the Persian Gulf Waves Considering Uncertainty in Power Take off Parameters
Published 2022-06-01“…In this scheme, to consider high uncertainty in the parameters of the power take-off system in different atmospheric conditions and improve controller performance, a new improved black hole algorithm is introduced to tune fuzzy controller parameters. …”
Get full text
Article -
3423
Clustering OKU Timur Script Images using VGG Feature extraction and K-Means
Published 2025-01-01“…Features are extracted using the VGG16 model, which are then clustered with the K-Means algorithm. Clustering performance is evaluated based on the percentage of correctly grouped characters. …”
Get full text
Article -
3424
Automatic mouse ultrasound detector (A-MUD): A new tool for processing rodent vocalizations.
Published 2017-01-01“…., they are composed of several different types of syllables, uttered in succession over time to form a pattern of sequences). …”
Get full text
Article -
3425
Gas adsorption meets geometric deep learning: points, set and match
Published 2024-11-01“…Additionally, to evaluate the transferability of the proposed framework to different host-guest systems, $$\text {CH}_{4}$$ CH 4 uptake in COFs is examined. …”
Get full text
Article -
3426
The Accounting Procedure for Hedging Financial Schemes with Non-derivative Instruments in Accordance with IFRS
Published 2019-09-01“…These algorithms are based on the proposed mathematical methods of evaluation of financial instruments of different genesis: credit financial resources, currency financial instruments and derivatives of forward type. …”
Get full text
Article -
3427
Multiple solutions to the static forward free–boundary Grad–Shafranov problem on MAST-U
Published 2025-01-01“…In this work, we discover multiple solutions to the static forward free-boundary GS problem in the MAST-U tokamak geometry using the validated evolutive equilibrium solver FreeGSNKE and the deflated continuation algorithm. …”
Get full text
Article -
3428
The superiority of feasible solutions-moth flame optimizer using valve point loading
Published 2024-12-01“…The MFO, Grey Wolf Optimizer (GWO), Success-history-based Parameter Adaptation Technique of Differential Evolution - Superiority of Feasible Solutions (SHADE-SF), and Superiority of Feasible Solutions-Moth Flame Optimizer (SF-MFO) algorithms are applied to address the OPF problem with two objective functions: (1) reducing energy production costs and (2) minimizing power losses. …”
Get full text
Article -
3429
ABOUT THE GENERAL CONCEPT OF THE UNIVERSAL STORAGE SYSTEM AND PRACTICE-ORIENTED DATA PROCESSING
Published 2017-08-01“…An universal system based on describing concept will allow collection information of different subject domains, get analytical summaries, do data processing and apply appropriate Data Mining methods and algorithms.…”
Get full text
Article -
3430
Optimal distributed generation placement and sizing using modified grey wolf optimization and ETAP for power system performance enhancement and protection adaptation
Published 2025-04-01“…The effectiveness of the proposed approach is evaluated by simulations performed on the IEEE 33-bus test system and a large scale 114-bus distribution network to determine its reliability for different network sizes. …”
Get full text
Article -
3431
Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon
Published 2024-01-01“…The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. …”
Get full text
Article -
3432
Transverse cracking in glass fibre-reinforced composites monitored with synchrotron X-ray multi-projection imaging
Published 2025-02-01“…An extensive data set was gathered to make a 3D reconstruction of the crack evolution over time using XMPI and machine learning-based reconstruction algorithms. …”
Get full text
Article -
3433
Gene selection based on adaptive neighborhood-preserving multi-objective particle swarm optimization
Published 2025-05-01“…ANPMOPSO introduces four key innovations: (1) a weighted neighborhood-preserving ensemble embedding (WNPEE) technique for dimensionality reduction that retains local structure; (2) Sobol sequence (SS) initialization to enhance population diversity and convergence stability; (3) a differential evolution (DE)-based adaptive velocity update to dynamically balance exploration and exploitation; and (4) a novel ranking strategy that combines Pareto dominance with neighborhood preservation quality to prioritize biologically meaningful gene subsets. …”
Get full text
Article -
3434
Impact of Depressurizing Boreholes on Energy Dissipation in Deep Roadway
Published 2022-01-01“…The equations of elastic energy and dissipated energy of rock cell grid were derived based on the energy principle and finite-difference algorithm, which was implemented into FLAC3D software by the FISH language. …”
Get full text
Article -
3435
Regularized Fractional Power Parameters for Image Denoising Based on Convex Solution of Fractional Heat Equation
Published 2014-01-01“…The performances of the proposed algorithms were evaluated by computing the PSNR, using different types of images. …”
Get full text
Article -
3436
Victimization analysis model of user network behavior based on network traffic
Published 2021-02-01“…The analysis of network victimization is of great significance to the prevention and control of telecom fraud.By studying the network traffic generated by the interaction between users and websites, a victimization identification model of telecom fraud crime based on network behavior flow analysis was proposed, the association rules between different behavior characteristics were analyzed, the behavior sequence features were reconstructed, and the victimization of network behavior sequence with random forest algorithm was evaluated.Based on the network behavior data set of public security organs, the experiment proves that the model can effectively improve the recognition accuracy of network behavior victimization.…”
Get full text
Article -
3437
Phasic and periodic change of drought under greenhouse effect
Published 2024-10-01“…Subsequently, the Bernaola-Galvan segmentation algorithm was proposed to divide the periods of drought change and the newly developed extreme-point symmetric mode decomposition to analyze the periodic drought patterns. …”
Get full text
Article -
3438
Sensor system for acquisition of vegetation indexes
“…Under the evaluation conditions, the proposed sensor system could be used to determine all vegetation indexes evaluated.…”
Get full text
Article -
3439
On Introduction to q1,q2-Linear Diophantine Fuzzy Sets and Their Applications
Published 2025-01-01“…In the latter half of the paper, different ranking algorithms based on proposed aggregation operators are presented to address a realistic assessment of the patient’s high blood pressure conditions is conducted to demonstrate the viability and value of the suggested strategies.…”
Get full text
Article -
3440
Real time thermal environment monitoring and interior design of intelligent buildings based on the Internet of Things
Published 2025-09-01“…This article aims to explore the real-time monitoring and regulation methods of indoor thermal energy environment in intelligent buildings based on the Internet of Things, and clarify the understanding of thermal microclimate and corresponding evaluation methods. We adopted thermal energy environment evaluation technology, deeply explored the characteristics of indoor thermal energy environment, and evaluated the effectiveness of different evaluation methods. …”
Get full text
Article