Search alternatives:
pruning » printing (Expand Search)
Showing 201 - 220 results of 411 for search '(pruning OR writing) algorithm', query time: 0.11s Refine Results
  1. 201
  2. 202
  3. 203

    Weak form shallow ice approximation models with an improved time-step restriction by Igor Tominec, Josefin Ahlkrona

    Published 2025-01-01
    “…When that velocity field is used to advance the ice surface in time, the time steps have to take small values due to quadratic scaling in the horizontal mesh size. In this paper, we write the SIA model in weak form and add in the free-surface stabilization algorithm (FSSA) terms. …”
    Get full text
    Article
  4. 204

    ABF-RRT*: Bidirectional fast optimal rapidly-exploring random tree via adaptive sampling of a permissible hyper-ellipsoid by Zhaoyang Zeng, Yufang Chang

    Published 2025-08-01
    “…The improved bidirectional planner combines the bisection optimization process, significantly improves the topological structure of the random tree, and accelerates the convergence to the optimal path solution. Since the algorithm relies on the tree expansion framework, it is compatible with various samplers and graph pruning strategies. …”
    Get full text
    Article
  5. 205

    Reconceptualizing Gatekeeping in the Age of Artificial Intelligence: A Theoretical Exploration of Artificial Intelligence-Driven News Curation and Automated Journalism by Dan Valeriu Voinea

    Published 2025-05-01
    “…We integrate classic media theories—gatekeeping, agenda-setting, and framing—with contemporary insights from algorithmic news recommender systems, large language model (LLM)–based news writing, and platform studies. …”
    Get full text
    Article
  6. 206
  7. 207
  8. 208
  9. 209

    Fast Single Pbase Algoritbm for Utility Mining in Big Data by Junqiang Liu, Qingfeng Zhou, Wenhui Wang, Lei Shi

    Published 2015-04-01
    “…Most of the latest works on utility mining generates a huge number of candidates in dealing with big data,which suffers from the scalability issue.Some work does not generate candidates,but suffers from the efficiency issue due to lack of strong pruning and high computation overhead.A novel algorithm that finds high utility patterns in a single phase without generating candidates was proposed.The novelties lie in a prefix growth strategy with strong pruning,and a sparse matrix based representation of transactions with pseudo projection.The proposed algorithm works in a depth first manner and does not materialize high utility patterns in memory,which further improves the scalability.Extensive experiments on synthetic and rea1-world data show that the proposed algorithm outperforms the latest works in terms of running time,memory overhead,and scalability.…”
    Get full text
    Article
  10. 210

    Policy-Based Reinforcement Learning Approach in Imperfect Information Card Game by Kamil Chrustowski, Piotr Duch

    Published 2025-02-01
    “…Comparisons were made against two benchmark strategies: a random strategy agent and an alpha-beta pruning tree search with varying search depths. The proposed algorithm achieved win rates exceeding 65% against the random agent, nearly 60% against alpha-beta pruning at a search depth of 6, and 55% against alpha-beta pruning at the maximum possible depth.…”
    Get full text
    Article
  11. 211

    The Referenced Vertex Ordering Problem: Theory, Applications, and Solution Methods by Omer, Jérémy, Mucherino, Antonio

    Published 2021-08-01
    “…We then discuss how upper and lower bounds can be computed during the enumeration to design a branch-and-bound algorithm. Finally, we validate our branch-and-bound algorithm by conducting a large set of computational experiments on instances coming from various real-life applications. …”
    Get full text
    Article
  12. 212

    Assigning Priorities for Fixed Priority Preemption Threshold Scheduling by Saehwa Kim

    Published 2015-01-01
    “…This paper analyzes the inefficiency or nonoptimality of the previously proposed optimal priority assignment algorithms for PTS. We develop theorems for exhaustively but safely pruning infeasible priority orderings while assigning priorities to tasks for PTS. …”
    Get full text
    Article
  13. 213

    Research on autonomous obstacle avoidance of mountainous tractors based on semantic neural network and laser SLAM. by Ningjie Chang, Xianghai Yan, Bingxin Chen, Yiwei Wu, Liyou Xu

    Published 2025-01-01
    “…Then, the observed data is input into the lightweight convolutional neural network, and obstacles in the mountain environment are detected and semantic information is extracted through layer pruning and channel pruning strategies, and key information such as the type, size, and location of obstacles is output. …”
    Get full text
    Article
  14. 214

    Discussing the Construction of a Budget Management System Combining Multimedia Technology and Financial Risk Management by Xiaoyi Jiang

    Published 2022-01-01
    “…From the whole process of data mining, a data mining system is designed, which is “data preprocessing standardization + genetic algorithm feature selection + training set pruning + support vector machine classifier discrimination optimization.” …”
    Get full text
    Article
  15. 215

    Multi-Energy Microgrid Data-Driven Distributionally Robust Optimization Dispatch Considering Uncertainty Correlation by LI Jiawei, SUN Qinghe, WANG Qiong, YE Yujian, HU Heng, ZHANG Xi

    Published 2025-08-01
    “…This transforms the distributionally robust model into a linear deterministic model,thereby enabling an efficient solution using optimization solvers. Finally,a sample-pruning algorithm is proposed,which iteratively generates subsamples from the original dataset by removing the outliers and extreme data points. …”
    Get full text
    Article
  16. 216

    Morphological Estimation of Primary Branch Inclination Angles in Jujube Trees Based on Improved PointNet++ by Linyuan Shang, Fenfen Yan, Tianxin Teng, Junzhang Pan, Lei Zhou, Chao Xia, Chenlin Li, Mingdeng Shi, Chunjing Si, Rong Niu

    Published 2025-05-01
    “…The segmentation of jujube tree branches and the estimation of primary branch inclination angles (IAs) are crucial for achieving intelligent pruning. This study presents a primary branch IA estimation algorithm for jujube trees based on an improved PointNet++ network. …”
    Get full text
    Article
  17. 217

    Application of selective ensemble learning soft sensor modeling based on GPR in the solar thermal power collection system by Yalu Sun, Kun Ding, Changhai Yang, Zhuxiu Wang

    Published 2025-03-01
    “…Secondly, the local domain (LTs) was identified by Gaussian mixture model (GMM) clustering, and the local GPR model was established for each LT to obtain the base model (MGPR). Finally, the set pruning strategy based on a genetic algorithm (GA) was used to select the MGPR model with high estimation performance, and the base models were fused by the Stacking algorithm to obtain the SESMGPR model. …”
    Get full text
    Article
  18. 218

    Unbalanced Threshold Based Distributed Data Collection Scheme in Multisink Wireless Sensor Networks by Guorui Li, Ying Wang, Cong Wang, Yiying Liu

    Published 2016-01-01
    “…By computing unbalanced thresholds and pruning unnecessary element exchanging, each sink can synchronize the top- K aggregated values efficiently via the unbalanced threshold based distributed top- K query algorithm. …”
    Get full text
    Article
  19. 219

    A visual SLAM loop closure detection method based on lightweight siamese capsule network by Yuhan Zhou, Mingli Sun

    Published 2025-03-01
    “…The algorithm was tested on the CityCentre dataset and the New College dataset. …”
    Get full text
    Article
  20. 220

    A graph-based sensor recommendation model in semantic sensor network by Yuanyi Chen, Yihao Lin, Peng Yu, Yanyun Tao, Zengwei Zheng

    Published 2022-05-01
    “…In addition to using the traditional graph matching algorithm, we propose a threshold pruning algorithm to narrow the matching scope and improve the matching efficiency. (2) Recommending top- k sensors. …”
    Get full text
    Article