Showing 4,701 - 4,720 results of 13,928 for search '(whole OR while) algorithm', query time: 0.14s Refine Results
  1. 4701
  2. 4702

    Neural Networks Method in modeling of the financial company’s performance by I. P. Kurochkina, I. I. Kalinin, L. A. Mamatova, E. B. Shuvalova

    Published 2017-11-01
    “…The copyright factor selection algorithm complements the developed model. Because of the functioning of the neural network, a management report on the financial performance of the company is formed. …”
    Get full text
    Article
  3. 4703

    Integration of bulk RNA-seq and scRNA-seq reveals transcriptomic signatures associated with deep vein thrombosis by Bao-ze Pan, Ming-jun Jiang, Li-ming Deng, Jie Chen, Xian-peng Dai, Zi-xuan Wu, Zhi-he Deng, Dong-yang Luo, Yang-yi-jing Wang, Dan Ning, Guo-zuo Xiong, Guo-shan Bi

    Published 2025-04-01
    “…This study aimed to identify and examine the most distinctive genes linked to DVT.MethodsIn this study, the bulk RNA sequencing (bulk RNA-seq) analysis was conducted on whole blood samples from 11 DVT patients and six control groups. …”
    Get full text
    Article
  4. 4704

    Performance analysis and optimization of cooperative spectrum sensing for maximizing secondary throughput by LI Mei-ling1, YUAN Chao-wei1, LI Lin1, YANG Rui-zhe3

    Published 2011-01-01
    “…The relationship among SU,detection threshold,bandwidth,spectrum utilization and secondary throughput in cognitive radio networks was analyzed,which indicates the lower false alarm probability,higher spectrum utilization and larger secondary throughput with less SU in C-CSS(censoring based cooperative spectrum sensing),besides,the required detection threshold for maximizing the secondary throughput different with the traditional CSS under given SU number and the objective demand.Based on the NP criticism,an optimal cooperative spectrum sensing algorithm for maximizing the secondary throughput was proposed by solving the mathematic model to obtain the optimal party of SU and detection threshold.Theoretical analysis and simulation results show that the maximized secondary throughput achieved by the proposed optimal algorithm,while maintaining the given detection probability.…”
    Get full text
    Article
  5. 4705

    A Quantum Implementation Model for Artificial Neural Networks by Ammar Daskin

    Published 2018-02-01
    “…In quantum computing, the phase estimation algorithm is known to provide speedups over the conventional algorithms for the eigenvalue-related problems. …”
    Get full text
    Article
  6. 4706

    URALP: Unreachable Region Aware Location Privacy against Maximum Movement Boundary Attack by Nha Nguyen, Seungchul Han, Minho Shin

    Published 2015-08-01
    “…In this paper, we present an anonymization algorithm that effectively counters such attacks while achieving k -anonymity requirements as well as minimum acceptable cloaked region size. …”
    Get full text
    Article
  7. 4707

    Crowd abnormal behavior detection based on motion similar entropy by Fei LI, Ken CHEN, Meng LI, Chunmei GUO

    Published 2017-05-01
    “…It is an important research content of graphic processing in the field of intelligent video surveillance to detect abnormal events.An algorithm based on entropy of motion similarity (EMS) to detect abnormal behavior was proposed.Based on the optical flow algorithm,taking the bottom flow block as the basic unit to get the scene motion information,according to the concept of social network model,the construction scene of the motion network model (MNM) was proposed,the division of the scene particles motion similarity was completed,and the distribution EMS of MNM was calculated in the time domain.Finally,the obtained image entropy was compared with the reasonable threshold,to determine whether abnormal behavior occured.Experimental results indicate that the proposed algo-rithm can detect abnormal behavior effectively and show promising performance while comparing with the state of the art methods.…”
    Get full text
    Article
  8. 4708

    DiffPRFs:random forest under differential privacy by Hai-rong MU, Li-ping DING, Yu-ning SONG, Guo-qing LU

    Published 2016-09-01
    “…A differential privacy algorithm DiffPRFs based on random forests was proposed.Exponential mechanism was used to select split point and split attribute in each decision tree building process,and noise was added according to Laplace mechanism.Differential privacy protection requirement was satisfied through overall process.Compared to existed algorithms,the proposed method does not require pre-discretization of continuous attributes which significantly reduces the performance cost of preprocessing in large multi-dimensional dataset.Classification is achieved conveniently and efficiently while maintains the high accuracy.Experimental results demonstrate the effectiveness and superiority of the algorithm compared to other classification algorithms.…”
    Get full text
    Article
  9. 4709

    Call Admission Control Based on Resource Sharing in LTE-Advanced Relay System by Jihong Zhao, Haifang Han, Hua Qu

    Published 2014-02-01
    “…A call admission control based on resource sharing in LTE-Advanced relay system was proposed.If the shared resources of the target site for new users and handover users are used up,handover users can use the reserved r esources of the target site for handover users to access system,while new users can access system by resource sharing between the sites in the cell which the target site inside.Simulation results show that compared the proposed algorithm with LTE-Advanced system on fixed bandwidth reservation scheme and LTE-Advanced relay system on fixed bandwidth reservation scheme,the proposed algorithm can effectively reduce the blocking probability of new users and dropping probability of handover users in the cell,and can improve the system resource utilization.…”
    Get full text
    Article
  10. 4710

    Design of key technologies for intranet dynamic gateway based on DPDK by Fucai CHEN, Weizhen HE, Guozhen CHENG, Shumin HUO, Dacheng ZHOU

    Published 2020-06-01
    “…Aiming at the problems of high packet processing delay and high overhead caused by IP hopping,active defense gateway system with multi-layer network deployment structure was designed and implemented based on the data plane development kit (DPDK).Firstly,based on the DPDK fast forwarding framework,forwarding and processing performance of the system were optimized.Secondly,for the dynamic random mapping gateway with three different types of IP addresses,an efficient IP address allocation algorithm and an unpredictable IP address conversion algorithm were designed.The experimental results show that the designed system can effectively reduce the rate of information acquisition of sniffing attack,while greatly improving the processing delay caused by dynamic hopping.…”
    Get full text
    Article
  11. 4711

    Simulations of the sterile neutrino oscillations with a crossing-width term by Qiankang Wang, DaYun Qiu, Yi-Lei Tang

    Published 2025-05-01
    “…We prove the validity of our algorithm, and adopt some tricks for practical calculations. …”
    Get full text
    Article
  12. 4712

    GENERATING OF OPTIMAL QUANTIZATION LEVELS OF CONTROL CURRENTS FOR LINEAR STEPPING DRIVES OF PRECISION MOTION SYSTEMS by I. V. Dainiak, V. P. Oger, D. S. Tsitko, D. G. Begun

    Published 2014-06-01
    “…The paper proposes a method of taking into account accumulated and temperature errors while forming coordinate discrete grid of a linear stepping drive. …”
    Get full text
    Article
  13. 4713

    HITS: Hyperplanes intersection tabu search for maximum score estimation by Kostas Florios, Alexandros Louka, Yannis Bilias

    Published 2025-05-01
    “…This is a deterministic algorithm rather than a stochastic one. The tabu search is much faster than the Simulated Annealing, while providing solutions of about the same quality. …”
    Get full text
    Article
  14. 4714

    Tau identification in CMS during LHC run 2 by Mohammad Hassan Hassanshahi

    Published 2025-07-01
    “…Low transverse momentum topologies were addressed separately with a dedicated identification algorithm, while machine learning techniques were implemented to improve the identification of the tau hadronic decay channels. …”
    Get full text
    Article
  15. 4715

    A method for estimating the certified value uncertainty of a multicomponent reference material by P. V. Migal, S. V. Medvedevskikh, V. A. Firsanov

    Published 2019-07-01
    “…The results calculated according to the preparation procedure using the proposed algorithm were confirmed by the Monte Carlo method, while the elemental content in the mixture was confirmed via inductively coupled plasma optical emission spectroscopy. …”
    Get full text
    Article
  16. 4716

    Coordinated beamforming for cognitive multi-cell networks with wiretap channels by Dong-hua CHEN, Xiu-xiu ZHANG, Wei-bo XIE

    Published 2014-11-01
    “…Owing to the coupling among the vectors to be optimized,the problem becomes non-convex and non-linear.Accordingly,a centralized coordinated beamforming design method was proposed by constraining the leakage interference and using the semi-definite relaxation,and on the base of it,a decentralized algorithm was also proposed by decomposing the centralized design problem into a group of sub-problems on each cell’s base by using dual decomposition.Simulation results show that the proposed schemes make effective reduction in power consumption while guarantee the legal users’ secrecy rate requirement and the cognitive interference constraint.Moreover,the proposed decentralized method not only reduces the computational complexity,but also has the same performance as the centralized algorithm.…”
    Get full text
    Article
  17. 4717

    Analysis of Two-Grid Characteristic Finite Element Methods for Convection-Diffusion Equations by Keyan Wang, Boxia Hu

    Published 2023-01-01
    “…In this paper, two efficient two-grid algorithms for the convection-diffusion problem with a modified characteristic finite element method are studied. …”
    Get full text
    Article
  18. 4718
  19. 4719

    Electromagnetic Transient Parallel Simulation of Large-Scale New Energy Grid Connection Based on PSCAD/EMTDC by Bin CAO, Liqiang WANG, Yongfei ZHAO, Xiuqi ZHANG

    Published 2020-11-01
    “…Therefore, new requirements of the power grid simulation have been put forward from both the algorithm and the calculation scale. The electromagnetic transient model of Inner Mongolia power grid with new energy access is built based on PSCAD software to realize the accurate simulation of the electromagnetic transient of the whole network. …”
    Get full text
    Article
  20. 4720

    Alternatives for Connecting Photovoltaic Generators to Power Systems with Three-Port and Partial Power Converters by Donghui Ye, Sergio Martinez

    Published 2024-12-01
    “…In general, PV panels are connected to DC-DC converters and/or DC-AC inverters to implement the maximum power point tracking algorithm and to fulfill the load requirements. Thus, power conversion efficiency and power density need to be taken into consideration when designing PV systems. …”
    Get full text
    Article