-
261
-
262
Fixed time convergence approach for multiplayer iterated dilemmas with continuous action
Published 2024-12-01Get full text
Article -
263
On the Model Checking Problem for Some Extension of CTL*
Published 2020-12-01“…For the logics mentioned above, we have developed algorithms for the verification of finite transducers. …”
Get full text
Article -
264
MEASUREMENT OF THE AMPLITUDE OF PERIODIC SIGNALS USING THE FIBONACCI METHOD
Published 2018-06-01“…Using the Fibonacci sequence of the pentanacci sequence in the basis of the work of the Fibonacci register allowed obtaining odd code values at its output.Based on the obtained research results, a high-resolution converter of the amplitude of high-frequency periodic signals can be developed into a binary code with high speed for tasks: industrial tomography, radar and radio navigation.…”
Get full text
Article -
265
Explainable Machine Learning for Efficient Diabetes Prediction Using Hyperparameter Tuning, SHAP Analysis, Partial Dependency, and LIME
Published 2025-01-01“…The clinical community has a lot of diabetes diagnostic data. Machine learning algorithms may simplify finding hidden patterns, retrieving data from databases, and predicting outcomes. …”
Get full text
Article -
266
Evaluating Deep Learning Architectures for Breast Tumor Classification and Ultrasound Image Detection Using Transfer Learning
Published 2025-04-01“…These insights are further anticipated to advance future algorithm development and broaden the potential of the research applicability across diverse fields.…”
Get full text
Article -
267
-
268
The coverage method of unmanned aerial vehicle mounted base station sensor network based on relative distance
Published 2020-05-01“…The simulation results show that the coverage of the proposed algorithm is 22.4% higher than that of random deployment, and it is 9.9%, 4.7% and 2.1% higher than similar virtual force-oriented node, circular binary segmentation and hybrid local virtual force algorithms.…”
Get full text
Article -
269
Area-Time-Efficient Secure Comb Scalar Multiplication Architecture Based on Recoding
Published 2024-10-01“…Based on this background information, we propose our own research objectives. In this paper, a low-latency and low-area ECSM architecture based on the comb algorithm is proposed. …”
Get full text
Article -
270
Optimization of Z-fuzzy soft $\beta$-covering based fuzzy rough sets and their application to multiple attribute group decision making
Published 2025-03-01“… Fuzzy sets play a crucial role in representing real-world complexities where precise binary logic falls short. Rough sets are closely related to fuzzy sets, and their combined use provides a powerful framework for handling uncertain and incomplete information.The combination of rough sets and fuzzy sets is an intriguing area of research that bridges the gap between crisp and uncertain information. …”
Get full text
Article -
271
Activity-Based Scene Decomposition for Topology Inference of Video Surveillance Network
Published 2014-01-01Get full text
Article -
272
Mental Fatigue Has Great Impact on the Fractal Dimension of Brain Functional Network
Published 2020-01-01“…A modified greedy colouring algorithm was proposed for fractal dimension calculation in both binary and weighted brain functional networks. …”
Get full text
Article -
273
-
274
BIMLP Model Based on Deep Learning for Predicting Electrical Load Demand
Published 2025-08-01“…Furthermore, the proposed system, BIMLP (Bagging-Improved MLP), is designed to iteratively improve its parameters using a binary search algorithm and reduce the learning error using bagging, a technique for ensemble learning. …”
Get full text
Article -
275
Retracted: Active Contour Image Segmentation Method for Training Talents of Computer Graphics and Image Processing Technology
Published 2021-01-01“…The experimental results of this article show that the active contour image segmentation algorithm can not only ensure the image segmentation algorithm but also reduce the number of iterations and shorten the image segmentation time. …”
Get full text
Article -
276
Application of Hilbert Huang Transform Method Based on CEEMD in Forest Boundary Layer Turbulence
Published 2025-04-01Get full text
Article -
277
-
278
Vision-Based Measurement for Catenary Transverse Vibrations in the Winding Mine Hoist
Published 2022-01-01“…Secondly, the region of interest (ROI) was selected, and the ROI was binarized based on the wavelet edge extraction algorithm. Thirdly, in the ROI, the centroid position of the rope was obtained by calculating the matrix, which was described by the binary, and later, the transverse vibration signal of the catenary was obtained. …”
Get full text
Article -
279
Enabling Power Systems With SQKD in Presence of Remote Nodes
Published 2025-01-01“…Due to the complexity of the allocation problem, this paper develops algorithms based on Density-Based Spatial Clustering of Applications with Noise algorithm (DBSCAN), Dijksra’s algorithm and genetic algorithms. …”
Get full text
Article -
280
Maximum Butterfly Generators Search in Bipartite Networks
Published 2024-12-01“…Furthermore, an effective MBGS search algorithm is proposed. Extensive experiments on real-world networks with ground-truth communities and interesting case studies validated the effectiveness and efficiency of our MBGS model and algorithm.…”
Get full text
Article