Showing 3,821 - 3,840 results of 25,328 for search 'research algorithm', query time: 0.56s Refine Results
  1. 3821

    A novel approach to node coverage enhancement in wireless sensor networks using walrus optimization algorithm by V. Saravanan, Indhumathi G, Ramya Palaniappan, Narayanasamy P, M. Hema Kumar, K. Sreekanth, Navaneethan S

    Published 2024-12-01
    “…By incorporating metaheuristics and optimizing node coverage, WSNs can become more resilient and robust, leading to the development of self-adapting, self-organizing networks capable of efficiently covering dynamic and diverse environments. This research introduces the Walrus Optimization Algorithm for Node Coverage Enhancement in WSNs, called the WaOA-NCEWSN technique. …”
    Get full text
    Article
  2. 3822

    Novel Approach for Energy Balancing With Intermittent Renewable Energy Source Using Multi-Objective Genetic Algorithm by Ahmad Shah Irshad, M. H. Elkholy, Nahar F. Alshammari, Gul Ahmad Ludin, Tomonobu Senjyu, Gabor Pinter, Alexey Mikhaylov

    Published 2024-01-01
    “…By exploring this approach, ongoing research and development in renewable energy technologies can enhance efficiency, cost-effectiveness, and overall performance, leading to a more robust and sustainable energy balance.…”
    Get full text
    Article
  3. 3823

    Remote Sensing Discrimination Algorithm for Transmission Line Forest Fire Based on Fuzzy Comprehensive Evaluation Method by Bo TANG, Yaowei LI, Li YE, Li HUANG, Fating YUAN, Hao CHEN, Peng FENG

    Published 2019-11-01
    “…The traditional remote sensing discrimination algorithm for transmission line forest fires usually uses the brightness temperature threshold method to directly perform the fire point discrimination, which makes it difficult to accurately set the threshold value and frequently lead to false discrimination or omissions. …”
    Get full text
    Article
  4. 3824

    Large-Space Laser Tracking Attitude Combination Measurement Using Backpropagation Algorithm Based on Neighborhood Search by Ziyue Zhao, Zhi Xiong, Zhengnan Guo, Hao Zhang, Xiangyu Li, Zhongsheng Zhai, Weihu Zhou

    Published 2025-01-01
    “…Finally, the experimental platform is set up with the precision rotary table as the motion carrier to verify the effectiveness of the research method in this paper. The experimental results show that with the neighborhood-based backpropagation algorithm, the measurement results have a higher data update rate and a certain inhibition effect on the error accumulation of IMU. …”
    Get full text
    Article
  5. 3825

    Algoritmos Implementation of PID Control Algorithms and Fuzzy Logic based on robotics teaching with arduino applied to students by MILAGROS DEL CARMEN CASTAÑEDA BARBARAN

    Published 2025-04-01
    “… This research paper addresses the implementation of robotic control algorithms applied to the educational environment, with the objective of improving the teaching of robotics to students. …”
    Get full text
    Article
  6. 3826

    New correlative algorithm and its fast implementation for the acquisition of Y-code without the use of W-code by Zhu WANG

    Published 2017-10-01
    “…GPS military positioning system uses P/Y-code to capture signals and then go through tracking and navigation solution.The feasibility research on the acquisition of Y-code was given without the use of W-code.First the basis of the acquisition method was presented.Then,comparison with the standard correlative algorithm the simulation of the algorithm was given to show the characteristics of the new algorithm.At last a segment FFT-based fast implementation of the algorithm was proposed.The correctness of the fast implementation method was proved and Matlab was used to compare the fast implementation with the basic algorithm to show the high efficiency of the former method.…”
    Get full text
    Article
  7. 3827
  8. 3828

    Early detection of monkeypox: Analysis and optimization of pretrained deep learning models using the Sparrow Search Algorithm by Amna Bamaqa, Waleed M. Bahgat, Yousry AbdulAzeem, Hossam Magdy Balaha, Mahmoud Badawy, Mostafa A. Elhosseini

    Published 2024-12-01
    “…When PCR tests are unavailable, computational lesion detection offers a promising option. This research presents a non-invasive diagnostic method using the Sparrow Search Algorithm (SpaSA). …”
    Get full text
    Article
  9. 3829

    UWB localization of unmanned monorail crane with dual tags based on UKF weighted C-T fusion algorithm by Yuhan LYU, Muye ZHANG, Jiusheng BAO, Yang YANG, Jianjian YANG, Maosen WANG

    Published 2024-12-01
    “…To enhance the precision of unmanned monorail crane positioning, research has been conducted on a dual-tag UWB positioning method based on the UKF filtering and weighted C-T fusion algorithm. …”
    Get full text
    Article
  10. 3830
  11. 3831

    La rhétorique scientifique des jeux vidéo. Spacewar! et la translation visuelle des algorithmes by Angelo Careri

    Published 2021-06-01
    “…Developed in the context of experimental research and driven by the technological race against USSR, Spacewar! …”
    Get full text
    Article
  12. 3832

    A domain adaptive hybrid genetic algorithm and its verification in security service function chain orchestration by Xiaohui YAO, Qing LI, Kunkun SUN

    Published 2020-05-01
    “…Faced with changeful network demands,users have increasingly higher requirements for traditional network.Features such as flexibility,scalability and ease of use have become essential elements of modern network.A domain adaptive hybrid genetic algorithm (DAHGA) was proposed,which could be applied to the security service chain arrangement of cloud data center tenants,to achieve automatic loading and activation of tenant cloud security services and policies,to meet tenant cloud security “customization on demand” requirements.And conducts experimental comparison research on the effective placement efficiency of each VNF on the cloud security service chain orchestration was carried out,which fully validated the proposed algorithm.Effectiveness provides a reference and reference for the realization of cloud business non-destructive security service chain orchestration technology.…”
    Get full text
    Article
  13. 3833

    Algorithmes de recommandation et culture technique : penser le dialogue entre éducation et design by Arnaud CLAES, Victor WIARD, Heidi MERCENIER, Thibault PHILIPPETTE, Marie DUFRASNE, Arnaud BROWET, Raphaël JUNGERS

    Published 2021-05-01
    “…In order to respond to the proliferation of online media content, many platforms now use recommendation algorithms to structure and prioritize information flows. …”
    Get full text
    Article
  14. 3834

    A Talent Training Model for Electrical Courses considering Diverse Constraint Models and Knowledge Recognition Algorithms by Fanping Min

    Published 2022-01-01
    “…In addition, this paper uses the knowledge base and alias dictionary to build a knowledge graph and constructs a teaching model for electrical courses considering diverse constraint models and knowledge recognition algorithms. Through the research, it can be seen that the experimental teaching model of electrical courses proposed in this paper considering diverse constraint models and knowledge recognition algorithms has a very good effect on talent training.…”
    Get full text
    Article
  15. 3835

    A domain adaptive hybrid genetic algorithm and its verification in security service function chain orchestration by Xiaohui YAO, Qing LI, Kunkun SUN

    Published 2020-05-01
    “…Faced with changeful network demands,users have increasingly higher requirements for traditional network.Features such as flexibility,scalability and ease of use have become essential elements of modern network.A domain adaptive hybrid genetic algorithm (DAHGA) was proposed,which could be applied to the security service chain arrangement of cloud data center tenants,to achieve automatic loading and activation of tenant cloud security services and policies,to meet tenant cloud security “customization on demand” requirements.And conducts experimental comparison research on the effective placement efficiency of each VNF on the cloud security service chain orchestration was carried out,which fully validated the proposed algorithm.Effectiveness provides a reference and reference for the realization of cloud business non-destructive security service chain orchestration technology.…”
    Get full text
    Article
  16. 3836
  17. 3837

    A Novel Skeletonization Algorithm for Topologically Complex Structures: Comparative Analysis and Application to Renal Arterial Trees by Katarzyna Heryan, Stefan-Daniel Caliman

    Published 2025-01-01
    “…Accurate skeletonization of complex vascular structures is essential for clinical applications and anatomical research. This paper presents a domain-adapted skeletonization algorithm specifically developed for the intrarenal arterial tree, with a focus on high-resolution <inline-formula> <tex-math notation="LaTeX">$\mu $ </tex-math></inline-formula>-CT scans of human renal corrosion cast specimens. …”
    Get full text
    Article
  18. 3838

    European ILD registry algorithm for self-assessment in interstitial lung diseases (eurILDreg ASA-ILD). by Ekaterina Krauss, Laurenz H Claas, Silke Tello, Jennifer Naumann, Sandra Wobisch, Stefan Kuhn, Raphael W Majeed, Karen Moor, Maria Molina-Molina, Oisin Byrne, Rebecca Borton, Marlies S Wijsenbeek, Nik Hirani, Carlo Vancheri, Bruno Crestani, Andreas Guenther, eurILDreg investigators

    Published 2025-01-01
    “…This ASA-ILD algorithm is integrated into the patientMpower Ltd. smartphone application, used for patient-led monitoring, research, and clinical care since 2016, and available on both Apple and Android platforms.…”
    Get full text
    Article
  19. 3839

    Toward Sustainable Campus Energy Management: A Comprehensive Review of Energy Management, Predictive Algorithms, and Recommendations by Noor Islam Jasim, Saraswathy Shamini Gunasekaran, Nouar AlDahoul, Ali Najah Ahmed, Ahmed El-Shafie, Mohsen Sherif, Moamin A Mahmoud

    Published 2025-06-01
    “…This paper aims to review the existing studies related to energy management, efficiency, prediction, and recommendations in university buildings. Various works and algorithms were discussed addressing the challenges and limitations in the existing systems, and proposing insights as an attempt to fill the gap in this significant research domain. …”
    Get full text
    Article
  20. 3840

    Design and Analysis of SSSC-Based Damping Controller: A Novel Modified Zebra Optimization Algorithm Approach by Rajendra Kumar Khadanga, Deepa Das, Sidhartha Panda

    Published 2024-01-01
    “…A modified optimization algorithm (ZOA) that can be used to adjust the controller parameters is constructed by modifying the original ZOA algorithm. …”
    Get full text
    Article