-
641
Iteration of Differentiable Functions under m-Modal Maps with Aperiodic Kneading Sequences
Published 2012-01-01“…We consider the dynamical system (𝒜, 𝑇), where 𝒜 is a class of differentiable functions defined on some interval and 𝑇 : 𝒜 → 𝒜 is the operator 𝑇𝜙∶=𝑓∘𝜙, where 𝑓 is a differentiable m-modal map. …”
Get full text
Article -
642
Influence of Water-Resisting Layer Thickness on Fracture Evolution in Karst Tunnel and Control Measures
Published 2022-01-01Get full text
Article -
643
Joint recommendation algorithm based on tensor completion and user preference
Published 2019-12-01“…Aiming at the problem that existing recommendation algorithms have little regard for user preference,and the recommendation result is not satisfactory,a joint recommendation algorithm based on tensor completion and user preference was proposed.First,a user-item-category 3-dimensional tensor was built based on user-item scoring matrix and item-category matrix.Then,the Frank-Wolfe algorithm was used for iterative calculation to fill in the missing data of the tensor.At the same time,a user category preference matrix and a scoring preference matrix were built based on the 3-dimensional tensor.Finally,a joint recommendation algorithm was designed based on the completed tensor and the two preference matrices,and the differential evolution algorithm was used for parameter tuning.The experimental results show that compared with some typical and newly proposed recommendation algorithms,the proposed algorithm is superior to the compare algorithms,the precision is improved by 1.96% ~ 3.44% on average,and the recall rate is improved by 1.35%~2.40% on average.…”
Get full text
Article -
644
A Review of Stochastic Optimization Algorithms Applied in Food Engineering
Published 2024-01-01“…It was observed that evolutionary methods are the most applied in solving food engineering optimization problems where the genetic algorithm and differential evolution stand out. Finally, remarks on the limitations and current challenges to improving the numerical performance of stochastic optimization methods for food engineering applications are also discussed.…”
Get full text
Article -
645
Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher
Published 2022-09-01“…The result shows that the designers’ security evaluation of ANU-II against differential cryptanalysis is incorrect and the design rationale is flawed. …”
Get full text
Article -
646
IVIM-DWI-based radiomic model for preoperative prediction of hepatocellular carcinoma differentiation
Published 2024-10-01“…Support vector machine (SVM), logistic regression (LR) and random forest (RF) algorithms were utilized to construct different image omics models. …”
Get full text
Article -
647
Policy Evolution of Government Procurement of Public Services in China: A Text-Mining Perspective
Published 2023-01-01“…Secondly, the TF-IDF algorithm is adopted to obtain keywords at each stage, and the static stage characteristics are summarized by constructing the complex network of the extracted keywords. …”
Get full text
Article -
648
Cross-Domain Recommendation Algorithm Based on Latent Factor Model
Published 2015-07-01“…In the internet environment,the combining of multi-source heterogeneous information objects in different areas makes users face information selection dilemma problem in big data environment.It has been very difficulty for traditional information recommendation algorithms to adapt to the interdisciplinary information recommendation service.The evaluation model from a user clustering set to an information object clustering set has common characteristics of cross-domain and personality characteristics of single domain.By analyzing the evaluation data from users to information objects in different areas,these characteristics were extracted based on latent factor model.Then by transmitting and sharing the common characteristics of cross-domain,the data sparseness problem of target field was alleviated,which could improve the accuracy of cross-domain information recommendation.…”
Get full text
Article -
649
The Morphological Classification of Galaxy Clusters: Algorithms for Applying the Numerical Criteria
Published 2025-07-01“…All algorithms are realized in the “Cluster Cartography” tool and can be used with data taken from different catalogs. …”
Get full text
Article -
650
Quantification and Evolution of Online Public Opinion Heat Considering Interactive Behavior and Emotional Conflict
Published 2025-06-01“…To address these issues, first, this study addressed the complexity of interaction behaviors by introducing an approach that employs the information gain ratio as a weighting indicator to measure the “interaction heat” contributed by different interaction attributes during event evolution. …”
Get full text
Article -
651
Smooth likelihood-based collision avoidance for polygon shaped and differential drive vehicles
Published 2025-07-01“…The proposed Smooth Likelihood-based Collision Avoidance (SLBCA) algorithm is robust and enables real-time optimization-based trajectory planning. …”
Get full text
Article -
652
Tuning and Comparison of Optimization Algorithms for the Next Best View Problematic
Published 2024-01-01“…The aim of this paper is to tune and compare different optimization algorithms on the Next Best View (NBV) problem, which consists in finding the next position that the sensor or camera needs to take to scan an object or scenery in its totality. …”
Get full text
Article -
653
Quasiparticle Cooling Algorithms for Quantum Many-Body State Preparation
Published 2025-03-01“…In this work, we develop a kinetic-theory framework to describe quasiparticle cooling dynamics, and employ it to compare the efficiency of different cooling algorithms. In particular, we introduce a protocol where coupling to auxiliaries is modulated in time to minimize heating processes, and demonstrate that it allows a high-fidelity preparation of ground states in different quantum phases. …”
Get full text
Article -
654
Psychosemantic approach as the basis for the algorithmization technology of processing educational information
Published 2021-10-01“…Semantic principles (matching of logical and linguistic categories, considering the text from the inner and outer speech, considering the text as cognitive and communicative essence; differentiation between the meaning and sense as between the semantics of the outer speech and the semantics of thinking; identification of semantic relationships between information elements, etc.), psychological and pedagogical principles (self-reflection support of learning activity; self-motivation due to determining usefulness and applicability of information; self-organization of students while creating their own algorithms of learning activity, etc.), and psycholinguistic principles (building logical supporting schemes, analogues of universal subject codes; semantic evaluation of the quantitative and qualitative characteristics of information, etc.)of work with scientific and educational profession-oriented information are described and correlated with the learning content and mechanisms of students verbal and cognitive activity. …”
Get full text
Article -
655
Overcoming Data Scarcity in Calibrating SUMO Scenarios With Evolutionary Algorithms
Published 2025-07-01Get full text
Article -
656
Vulnerability benchmark generation algorithm based on finite state machines
Published 2025-06-01“…Experimental results demonstrate that the generated benchmarks more closely resemble the complexity of real software, effectively exposing biases and deficiencies in vulnerability detection tools across different code paths. This study validates the algorithm’s effectiveness and practical utility, confirming that it provides a more comprehensive and realistic benchmark for evaluating vulnerability detection tools.…”
Get full text
Article -
657
Application of the metaheuristic algorithms to quantify the GSI based on the RMR classification
Published 2025-08-01“…According to this evaluation, the best-performing equation from each algorithm was selected as the optimum and further evaluated using both graphical and statistical analyses, including comparisons with conventional empirical relationships. …”
Get full text
Article -
658
Realization and discussion of selected artificial intelligence algorithms in computer games
Published 2025-03-01“…The aim is to evaluate the efficiency and learning ability across different scenarios, such as Blackjack and Poker Limit Hold'em. …”
Get full text
Article -
659
Robust UAV Target Tracking Algorithm Based on Saliency Detection
Published 2025-04-01“…Firstly, this article analyzes the features from both spatial and temporal dimensions, evaluates the representational and discriminative abilities of different features, and achieves adaptive feature fusion. …”
Get full text
Article -
660
Adapted Single Scale Retinex Algorithm for Nighttime Image Enhancement
Published 2022-06-01“…Therefore, it is difficult to perceive, extract, and analyze important visual information from these images, unless they were properly processed. Different algorithms exist to process nighttime images, yet most of these algorithms are highly complex, generate processing artifacts, over-smooth the images, or do not improve the illumination adequately. …”
Get full text
Article