Showing 2,661 - 2,680 results of 13,618 for search 'also algorithm', query time: 0.11s Refine Results
  1. 2661

    Negative Group Velocity of Surface Polaritons in Metal Foil Nanostructure by Y.M. Aleksandrov, V.V. Yatsishen

    Published 2017-06-01
    “…The obtained solutions are compared with solutions for a thin single film on a substrate. Also, comparisons of the obtained solutions for different thicknesses of nanolayers in the structure of two films were made. …”
    Get full text
    Article
  2. 2662

    Coupling image denoising model based on total variation by Mei-ling WANG, Xian-chun ZHOU, Lin-feng ZHOU, Lan-fang SHI

    Published 2016-04-01
    “…The fidelity term could not only remove image noise, but also restrain “staircase effect”. Then, wavelet was used to decompose coefficient in frequency domain, control based on the edge detection ability of Canny algorithm were designed. …”
    Get full text
    Article
  3. 2663

    Evaluation of Landscape Dynamics in City Thermal Islands (Case Study: City of Birjand, Iran) by Fatemeh Kafi, Elham Yousefi, Fatemeh Jahanishakib

    Published 2023-02-01
    “…The results showed that the accuracy of the single-channel method (Landsat) was higher than other algorithms (MAE = 3.38 °C). The landscape dynamics were also identified using a package of landscape metrics, including PSSD, MPS, CA, NP, and MPFD. …”
    Get full text
    Article
  4. 2664
  5. 2665
  6. 2666

    ANALYTICAL REVIEW OF THE METHODOLOGY OF COMPUTER MODELING by M. D. Omarov

    Published 2016-07-01
    “…The review of methodology of computer modeling has been offered, the basic concepts of computer modeling have been given, the methodology of algorithms of stage-by-stage and step-by-step modeling has been also given.…”
    Get full text
    Article
  7. 2667

    Super-resolution reconstruction technology and its application on intelligent terminal device by Guqiao ZHU, Chao JIANG, Yuye XU

    Published 2023-07-01
    “…The development history of super-resolution reconstruction technology and its typical approaches were briefly introduced.An implementation solution of super-resolution reconstruction was proposed on one kind of intelligent terminal device.The image super-resolution approaches implemented by interpolation algorithms and deep learning algorithms were experimented and simulated, and their results on terminal’s processing performance and images’ quality of experience were evaluated and analyzed.The suggestions on appropriate scenarios of super-resolution implemented by the intelligent terminal device were proposed.Furthermore, some typical cases of super-resolution reconstruction technology in the fields of entertainment video services and home surveillance services were discussed.The possible research direction and the trend of convergence of this technology and relevant image processing technologies were also prospected.…”
    Get full text
    Article
  8. 2668

    Research of fast decoding for longer constraint length convolutional codes by HUANG Xiao-ling, YANG Hua-long

    Published 2010-01-01
    “…To overcome the disadvantage of Viterbi decoding algorithm, in which its complexity exponentially increases with the increasing constraint length of convolutional codes, and the decoding delay was too large to fit the decoding of longer constraint length convolutional codes, a fast decoding of convolutional codes for longer constraint length, based on improved particle swarm optimization algorithm, was proposed. …”
    Get full text
    Article
  9. 2669

    Equivalence classes of functions on finite sets by Chong-Yun Chao, Caroline I. Deisher

    Published 1982-01-01
    “…We also use our algorithm to construct the family of non-isomorphic fm-graphs relative to a given group.…”
    Get full text
    Article
  10. 2670

    Trust comprehensive evaluation based on the fuzzy inference theory in P2P network by QUAN Yi-ning 1, HU Yu-pu 1, LI Xin-she1

    Published 2009-01-01
    “…Aimed at characteristic of ambiguous relationship among entities in P2P network, as foundation of fuzzy inference theory, a fuzzy proposition deduction system was given, also a trust recommendation and comprehensive evaluation model in P2P network based on triple I fuzzy inference algorithm was built. …”
    Get full text
    Article
  11. 2671

    Kinematic Analysis and Trajectory Planning of Redundant Mobile Manipulators by Xia Guangjian, Zeng Qingsheng, Feng Dongyan, Li Shenlin

    Published 2024-09-01
    “…In the trajectory planning process, the trajectory running time and the spatial distance travelled by the end of the mobile manipulator were taken as the optimization objectives, the velocity and acceleration constraints of each joint were also taken into account, and a genetic algorithm was used to optimize the trajectory of the redundant mobile manipulator. …”
    Get full text
    Article
  12. 2672

    Research of fast decoding for longer constraint length convolutional codes by HUANG Xiao-ling, YANG Hua-long

    Published 2010-01-01
    “…To overcome the disadvantage of Viterbi decoding algorithm, in which its complexity exponentially increases with the increasing constraint length of convolutional codes, and the decoding delay was too large to fit the decoding of longer constraint length convolutional codes, a fast decoding of convolutional codes for longer constraint length, based on improved particle swarm optimization algorithm, was proposed. …”
    Get full text
    Article
  13. 2673

    Applying the Intelligence of Ant and Tabu Search to Solve The 8-puzzle Problem by Ruqaya Sha’ban

    Published 2013-07-01
    “…The research tackled artificial intelligent methods to solve one of the optimization problems by using artificial ant by applying ant colony optimization algorithm and also tabu search algorithm to find the solution of sliding tile 8-puzzel problem. …”
    Get full text
    Article
  14. 2674

    SAPA-based approach for defending DoS attacks in cloud computing by Meng YUE, Kun LI, Zhi-jun WU

    Published 2017-04-01
    “…Denial of service (DoS) attack was one of the major threats to cloud computing.Security access path algorithm (SAPA) used node route table (NRT) to compose security access path.It simplified role nodes of traditional secure overlay services (SOS),and periodically updated role nodes,and cached security access paths.Therefore,SAPA was more appropriate for cloud computing to defend DoS attacks.Based on the turn routing architecture of cloud computing,the mathematical model of SAPA was built and its performance was analyzed in theory.The performance of SAPA was tested in OMNeT++ experimental platform.Also,the Test-bed experiments were performed to evaluate the effectiveness of SAPA for defending DoS attack.Experimental results show that comparing with SOS,SAPA can degrade the impact of communication success rate caused by DoS attack effectively,and guarantees the access delay small enough.…”
    Get full text
    Article
  15. 2675
  16. 2676
  17. 2677

    Comparative Study on Hyperparameter Tuning for Predicting Concrete Compressive Strength by Jeonghyun Kim, Donwoo Lee

    Published 2025-06-01
    “…This study assesses the impact of hyperparameter optimization algorithms on the performance of machine learning-based concrete compressive strength prediction models. …”
    Get full text
    Article
  18. 2678

    Optimization design of urban rainwater and flood drainage system based on SWMM by Cao Xihan

    Published 2025-08-01
    “…To improve the overall performance of urban rainwater and flood drainage system, a coupling model of multiobjective optimization algorithm and rainstorm management model is constructed. …”
    Get full text
    Article
  19. 2679

    Balancing Construction Costs and Environmental and Social Performances in High-Rise Urban Development: A Generative Urban Design Approach by Peng Du, Geoffrey Little, Erick Romero

    Published 2025-02-01
    “…Specifically, 7500 urban forms were generated with variables such as street networks, block offset, building typology, and green space, and then were evaluated and optimized via multi-objective evolutionary algorithms. A total of 30,000 performance values were generated through various simulations. …”
    Get full text
    Article
  20. 2680

    Optimization of Production Scheduling for the Additive Manufacturing of Ship Models Using a Hybrid Method by Kyeongho Kim, Soonjo Kwon, Minjoo Choi

    Published 2024-11-01
    “…This paper introduces a hybrid optimization method that leverages either linear programming (LP) or a genetic algorithm (GA) based on the problem size to enhance the parallel additive manufacturing (AM) process for ship models. …”
    Get full text
    Article