Showing 21 - 40 results of 62 for search 'code machine scheme', query time: 0.15s Refine Results
  1. 21
  2. 22

    Machine learning for Internet of things anomaly detection under low-quality data by Shangbin Han, Qianhong Wu, Yang Yang

    Published 2022-10-01
    “…However, the existing schemes ignore the problem of data quality, which leads to the unsatisfactory detection effect in practice. …”
    Get full text
    Article
  3. 23

    Discussing the spectrum of physics-enhanced machine learning: a survey on structural mechanics applications by Marcus Haywood-Alexander, Wei Liu, Kiran Bacsa, Zhilu Lai, Eleni Chatzi

    Published 2024-01-01
    “…The intersection of physics and machine learning has given rise to the physics-enhanced machine learning (PEML) paradigm, aiming to improve the capabilities and reduce the individual shortcomings of data- or physics-only methods. …”
    Get full text
    Article
  4. 24

    Control-flow integrity technology based on the combination of software and hardware by LIANG Hao, HE Benwei, WANG Qingfeng, CHENG Guozhen, MA Hailong

    Published 2024-10-01
    “…For shadow stack, balancing security and performance was difficult, and the forward CFI (control-flow integrity) scheme implemented by software was too expensive and difficult to be deployed in practice. …”
    Get full text
    Article
  5. 25
  6. 26

    Machine-learning aided calibration and analysis of porous media CFD models used for rotating packed beds by Ahmed M. Alatyar, Abdallah S. Berrouk

    Published 2024-11-01
    “…These sensitivity equations are discretized using a finite volume scheme and solved to obtain the sensitivity pressure drop differences at the packing edges. …”
    Get full text
    Article
  7. 27

    Hybrid FRP strengthening of reinforced concrete deep beams: Experimental, theoretical and machine learning-based study by Phromphat Thansirichaisree, Qudeer Hussain, Mingliang Zhou, Ali Ejaz, Shabbir Ali Talpur, Panumas Saingam

    Published 2025-07-01
    “…A novel and cost-effective hybrid strengthening scheme is proposed comprising glass chopped mat sheets and eco-friendly basalt FRP sheets (GF-BFRP). …”
    Get full text
    Article
  8. 28

    A CONTERPORARYAPPROACH FOR OBTAINING REGULARLY SHAPED ROUGHNESS BY BALL-BURNISHING PROCESS CARIED OUT USINGCNC CONTROLEDMILLING MACHINES by STOYAN SLAVOV

    Published 2017-05-01
    “…A mathematical model developed for generating the sinusoidal curves, which represents needed toolpaths and an algorithm for obtaining the NC-code for corresponding machine tools are presented. …”
    Get full text
    Article
  9. 29

    Flying Robots Teach Floating Robots—A Machine Learning Approach for Marine Habitat Mapping Based on Combined Datasets by Zacharias Kapelonis, Georgios Chatzigeorgiou, Manolis Ntoumas, Panos Grigoriou, Manos Pettas, Spyros Michelinakis, Ricardo Correia, Catarina Rasquilha Lemos, Luis Menezes Pinheiro, Caio Lomba, João Fortuna, Rui Loureiro, André Santos, Eva Chatzinikolaou

    Published 2025-03-01
    “…The methodology implements a machine learning scheme, where knowledge obtained from UAV imagery is embedded (through training) into a classifier that utilizes acoustic backscatter intensity and features derived from the MBES data provided by an ASV. …”
    Get full text
    Article
  10. 30

    Vectorial principles of sensorimotor decoding by Vassiliy Tsytsarev, Anna Volnova, Legier Rojas, Priscila Sanabria, Alla Ignashchenkova, Jescelica Ortiz-Rivera, Janaina Alves, Mikhail Inyushin

    Published 2025-07-01
    “…These findings suggest a unifying vectorial framework for sensory and motor coding, with implications for periprosthetic and brain-machine interface.…”
    Get full text
    Article
  11. 31

    Defining Disease Phenotypes in Primary Care Electronic Health Records by a Machine Learning Approach: A Case Study in Identifying Rheumatoid Arthritis. by Shang-Ming Zhou, Fabiola Fernandez-Gutierrez, Jonathan Kennedy, Roxanne Cooksey, Mark Atkinson, Spiros Denaxas, Stefan Siebert, William G Dixon, Terence W O'Neill, Ernest Choy, Cathie Sudlow, UK Biobank Follow-up and Outcomes Group, Sinead Brophy

    Published 2016-01-01
    “…<h4>Methods</h4>This study linked routine primary and secondary care EHRs in Wales, UK. A machine learning based scheme was used to identify patients with rheumatoid arthritis from primary care EHRs via the following steps: i) selection of variables by comparing relative frequencies of Read codes in the primary care dataset associated with disease case compared to non-disease control (disease/non-disease based on the secondary care diagnosis); ii) reduction of predictors/associated variables using a Random Forest method, iii) induction of decision rules from decision tree model. …”
    Get full text
    Article
  12. 32

    Pyrolysis Kinetics of Pine Waste Based on Ensemble Learning by Alok Dhaundiyal, Laszlo Toth

    Published 2025-05-01
    “…Moreover, the multiclassification in pyrolysis kinetics through the proposed scheme was not able to capture the distribution pattern of target values of the differential method. …”
    Get full text
    Article
  13. 33

    Enhanced Global Ionospheric Mapping Using Deep Ensemble Neural Networks With Uncertainty Quantification by Shuyin Mao, Yuanxin Pan, Grzegorz Kłopotek, Matthias Schartner, Hana Krásná, Aletha deWitt, Benedikt Soja

    Published 2025-07-01
    “…This study proposes a deep ensemble method based on neural networks (NNs) that generates high‐accuracy global vertical total electron content (VTEC) maps along with corresponding uncertainty estimates. To develop the machine learning model, we first determined the VTEC time series based on the carrier‐to‐code leveling method using multi‐GNSS observations from global IGS stations. …”
    Get full text
    Article
  14. 34

    Host’s source address verification based on stream authentication in the IPv6 access subnet by Yue CHEN, Hong-yong JIA, Peng-xu TAN, Jing SHAO

    Published 2013-01-01
    “…A cryptographically-implemented high-speed source address verification scheme for the hosts in the IPv6 access subnet was proposed.The MAC address was used as the identity of the host machine and bounded with the host’s public key.Then the IPv6 address was derived from the host machine’s public key using the cryptographically generated address algorithm.The address authenticity was guaranteed by the digital signature and the fast and secure source address verification for packet stream was achieved through message authentication code algorithm and stream authentication.The experimental system show that the scheme could ver fy the source addresses of data packets at a loss cost.Thus,it is a secure and feasible scheme.…”
    Get full text
    Article
  15. 35
  16. 36
  17. 37

    Optimizing Energy and Spectral Efficiency in Mobile Networks: A Comprehensive Energy Sustainability Framework for Network Operators by Luis Mata, Marco Sousa, Pedro Vieira, Maria Paula Queluz, Antonio Rodrigues

    Published 2025-01-01
    “…For example, the results show that using higher order modulation coding schemes reduces the probability of a BS falling into class D by 50%. …”
    Get full text
    Article
  18. 38

    Multi-class fault diagnosis of BF based on global optimization LS-SVM by ZHANG Hai-gang, ZHANG Sen, YIN Yi-xin

    Published 2017-01-01
    “…Finally, the heuristic error correcting output codes were constructed on the basis of Fisher linear discriminate rate. …”
    Get full text
    Article
  19. 39

    The LED-ID Detection and Recognition Method Based on Visible Light Positioning Using Proximity Method by Canyu Xie, Weipeng Guan, Yuxiang Wu, Liangtao Fang, Ye Cai

    Published 2018-01-01
    “…Different from the traditional LED-ID coding and decoding method, we create different features for different LED-ID, and use a machine learning method to identify the LED-ID once the feature extraction and selection of the LED image is achieved with an image processing method. …”
    Get full text
    Article
  20. 40

    Coordinated Scheduling for Zero-Wait RGV/ASR Warehousing Systems with Finite Buffers by Wenbin Gu, Na Tang, Lei Wang, Zhenyang Guo, Yushang Cao, Minghai Yuan

    Published 2025-06-01
    “…To address this, the research frames the inbound and outbound problem as a task allocation issue for the RGV/ASR system with a finite buffer, and proposes a collision avoidance strategy and a zero-wait strategy for loaded machines to reallocate tasks. To improve computational efficiency, we introduce an adaptive multi-neighborhood hybrid search (AMHS) algorithm, which integrates a dual-sequence coding scheme and an elite solution initialization strategy. …”
    Get full text
    Article