Showing 3,741 - 3,760 results of 13,618 for search 'also algorithm', query time: 0.12s Refine Results
  1. 3741

    Generalized PCA Method and Its Application in Uncertainty Reasoning by Bin Wu, Xiao Yi, Dong Ning Zhao

    Published 2025-01-01
    “…The traditional PCA algorithm is a special case of the generalized PCA algorithm proposed in this paper. …”
    Get full text
    Article
  2. 3742

    The Differential Transform Method as an Effective Tool to Solve Implicit Hessenberg Index-3 Differential-Algebraic Equations by Brahim Benhammouda

    Published 2023-01-01
    “…Furthermore, to enlarge the interval of convergence of the power series solution obtained from the DTM, an algorithm for the multistage DTM is also given. Both algorithms are applied to solve two examples of highly nonlinear implicit index-3 Hessenberg DAEs. …”
    Get full text
    Article
  3. 3743

    Agricultural Model for Allocation of Crops Using Pollination Intelligence Method by C. N. Ejieji, A. E. Akinsunmade

    Published 2020-01-01
    “…A new class of metaheuristic method called Flower Pollinated Algorithm is also presented in this work to solve the designed model. …”
    Get full text
    Article
  4. 3744

    Robust smoothing of one‐dimensional data with missing and/or outlier values by Nasser Mourad

    Published 2021-07-01
    “…These algorithms also have difficulties associated with the selection of the smoothing parameter and the order of the difference matrix they utilize. …”
    Get full text
    Article
  5. 3745

    A mechanism of topology optimization for underwater acoustic sensor networks based on autonomous underwater vehicles by Ming He, Fangxin Liu, Zhuang Miao, Huan Zhou, Qiuli Chen

    Published 2017-01-01
    “…To solve this problem, a topology optimization method, also called TO-A algorithm, is developed based on topology reconfiguration. …”
    Get full text
    Article
  6. 3746

    Design and Fabrication of Shell Structures by Yu-Chou Chiang

    Published 2022-02-01
    “…It can also tweak an initial shape to meet free-edge conditions. …”
    Get full text
    Article
  7. 3747

    Dynamic Simulation and Comprehensive Quantitative Evaluation of Rural Tourism Core Competitiveness Based on Neural Network by Shiyuan Gan

    Published 2022-01-01
    “…Comparing the experimental data of each group, the results show that the algorithm has high efficiency in solving problems and also confirms the scientific validity of the algorithm.…”
    Get full text
    Article
  8. 3748

    Approach for distributed BPEL engine placement using K-means by Rong-heng LIN, Bu-dan WU, Yao ZHAO, Fang-chun YANG

    Published 2014-05-01
    “…How to apply the algorithm in dif-ferent network topologies was also discussed, such as random graph and tree network. …”
    Get full text
    Article
  9. 3749

    Analysis of Multimedia Combination-Assisted English Teaching Mode Based on Computer Platform by Yitian Zhang, Na Li

    Published 2022-01-01
    “…This research will use computer platform and multimedia technology to build a new English teaching platform. It also uses the ConvLSTM algorithm and the CF algorithm to implement the active recommendation function of English knowledge. …”
    Get full text
    Article
  10. 3750

    Efficient blind adaptive Karhunen–Loéve transform via parallel search by Wenbiao Tian, Guosheng Rui, Daoguang Dong, Jian Kang

    Published 2018-06-01
    “…Moreover, the process is “blind,” which means that minimal information about the original data is used. The new algorithm also avoids repeating the Karhunen–Loéve transform basis learning step in data compression applications. …”
    Get full text
    Article
  11. 3751

    Fragile watermarking technique for detecting image by Yu-hong CHANG, Hui-fen HUANG, Zhi-hong WANG

    Published 2017-07-01
    “…Aiming at the problem of image tampering and forensic localization,a fragile watermarking algorithm based on chaos sequence and image QR decomposition was proposed to determine the image tampering.The algorithm chooses QR decomposition to decompose the image,embeds the watermark after the image is decomposed,and encrypts the watermark by chaotic system to enhance the security of the watermark.Experimental results show that the algorithm not only improves the security of the location watermarking algorithm,but also can estimate the tampering strength of the tampered area.…”
    Get full text
    Article
  12. 3752

    Predicting Affinity Through Homology (PATH): Interpretable binding affinity prediction with persistent homology. by Yuxi Long, Bruce R Donald

    Published 2025-06-01
    “…PATH+ is not only one of the most accurate algorithms for BAP, it is also the first algorithm that is inherently interpretable. …”
    Get full text
    Article
  13. 3753

    Path planning of mobile robot based on improved PRM and APF by Wanqiang Xi, Junzhi Lin, Ziyan Shao

    Published 2025-08-01
    “…The improved PRM not only reduces redundant nodes but also enhances the quality of sampling points. Furthermore, this paper uses the path nodes from the improved PRM as virtual target points for the APF algorithm, and effectively solves the inherent flaws of the APF algorithm through the segmented processing of the attractive force function and the introduction of a relative distance factor in the repulsive force function. …”
    Get full text
    Article
  14. 3754

    Assigning Priorities for Fixed Priority Preemption Threshold Scheduling by Saehwa Kim

    Published 2015-01-01
    “…Based on the developed theorems, we correct the previously proposed optimal priority assignment algorithm for PTS. We also propose a performance improved optimal priority assignment algorithm for PTS proving its optimality. …”
    Get full text
    Article
  15. 3755

    A hybrid decoding of Reed–Muller codes by Shuang Li, Shicheng Zhang, Zhenxing Chen, Seog Geun Kang

    Published 2017-02-01
    “…A simplified maximum-likelihood algorithm based on fast Hadamard transform is also exploited to decode the systematic code through its special structure. …”
    Get full text
    Article
  16. 3756

    Hybrid Iterative Scheme for Triple Hierarchical Variational Inequalities with Mixed Equilibrium, Variational Inclusion, and Minimization Constraints by Lu-Chuan Ceng, Cheng-Wen Liao, Chin-Tzong Pang, Ching-Feng Wen

    Published 2014-01-01
    “…In addition, we also consider the application of the proposed algorithm to solving a hierarchical variational inequality problem with constraints of the GMEP, the CMP, and finitely many variational inclusions.…”
    Get full text
    Article
  17. 3757

    On the study of one way to detect anomalous program execution by Yury V. Kosolapov, Tatjyana A. Pavlova

    Published 2024-06-01
    “…This algorithm is based on a previously proposed approach, when the legitimate execution of a protected program is described by a profile of differences in the return addresses of called functions, also called a distance profile. …”
    Get full text
    Article
  18. 3758

    Augmented Reality Interactive Guide System and Method for Tourist Attractions Based on Geographic Location by Xueqiu Zhuang, Huihua Jiao, Kai Lu

    Published 2022-01-01
    “…This paper proposes an improved probabilistic algorithm model to accurately locate tourists. (Probabilistic algorithms are also called randomization algorithms. …”
    Get full text
    Article
  19. 3759

    The quantification of percentage filling of gutta-percha in obturated root canal using image processing and analysis by Pravin R. Lokhande, S. Balaguru

    Published 2020-04-01
    “…The proposed algorithm not only helps to overcome this false assessment but also helps to quantify accurate percentage filling of gutta-percha and outlines unfilled cavity gap of root canal. …”
    Get full text
    Article
  20. 3760

    GPU Parallelization Nested Decomposition Method for Solving Large Linear Systems in Reservoir Numerical Simulation by Xin Shi, Yuan Di

    Published 2019-07-01
    “…Its features include: using a custom matrix structure to achieve merge access, improving access bottlenecks and improving the efficiency of the SpMV algorithm. It is also applicable to the two-stage preprocessing method CPR. …”
    Get full text
    Article