Suggested Topics within your search.
Suggested Topics within your search.
-
10141
Assessing carbon footprint and performance of the Kalman filter track fitter in the CBM experiment
Published 2025-07-01Get full text
Article -
10142
Fault Diagnosis Method for Circuit Breaker Opening and Closing Coil Based on IEMD and GA-WNN
Published 2022-05-01Get full text
Article -
10143
-
10144
Feature-Based Classification of Amino Acid Substitutions outside Conserved Functional Protein Domains
Published 2013-01-01Get full text
Article -
10145
Virtual Node-Driven Cloud–Edge Collaborative Resource Scheduling for Surveillance with Visual Sensors
Published 2025-01-01Get full text
Article -
10146
Presenting a multi-objective mathematical model with an integrated approach to scheduling and financial flow in production projects using NSGA-II
Published 2023-11-01“…Purpose: The current research aims to present a multi-objective mathematical model with an integrated approach to scheduling and financial flow in production projects using Non-dominated Sorting Genetic Algorithm II (NSGA-II).Methodology: This research presents a multi-objective mathematical model integrating scheduling and financial flow optimization in civil engineering projects. …”
Get full text
Article -
10147
Keywords spotting in Russian handwritten documents based on strokes segmentation
Published 2024-12-01Get full text
Article -
10148
A Distributed Resilience Enhancement Strategy for Multi-microgrids Based on System of Systems Architecture
Published 2023-12-01Get full text
Article -
10149
Generalized Inverse of Quadri-Partitioned Neutrosophic Fuzzy Matrices and its Application to Decision-Making Problems
Published 2025-07-01“…To the best of our knowledge, no existing algorithm addresses the computation of the g-inverse for QPNFMs. …”
Get full text
Article -
10150
Optimization of Distribution Path considering Cost and Customer Satisfaction under New Retail Modes
Published 2021-01-01“…Moreover, the immune algorithm and genetic algorithm are adopted to achieve the model solution. …”
Get full text
Article -
10151
-
10152
Artificial Intelligent Techniques with Watermarking
Published 2009-07-01“…This research presents three robust blind watermarking algorithms in the discrete wavelet transform and spatial domain based on neural network and fuzzy logic artificial intelligent techniques. …”
Get full text
Article -
10153
Application of Improved WOA in Hammerstein Parameter Resolution Problems under Advanced Mathematical Theory
Published 2024-01-01“…With the development of industrial demand, precise identification of system models is currently required in the field of industrial control, which limits the whale search algorithm. In response to the fact that whale optimization algorithms are prone to falling into local optima and the identification of important Hammerstein models ignores the issue of noise outliers in actual industrial environments, this study improves the whale algorithm and constructs a Hammerstein model identification strategy for nonlinear systems under heavy-tailed noise using the improved whale algorithm. …”
Get full text
Article -
10154
TSHD: Topic Segmentation Based on Headings Detection (Case Study: Resumes)
Published 2023-01-01“…Due to the increased amount of data, it has become very necessary to manipulate resumes by computer to save time and effort. This research presents a new algorithm named TSHD for topic segmentation based on headings detection. …”
Get full text
Article -
10155
Data privacy preservation for the search of Internet of things based on fine-grained authorization
Published 2017-01-01“…Finally, the future research work was summarized and pointed out.…”
Get full text
Article -
10156
Review of information hiding on Chinese text
Published 2019-09-01“…Text information hiding is an important technology to protect the security and integrity of text content.The research progress of Chinese text information hiding was reviewed.According to the clue of Chinese text information hiding,the existing algorithms were divided into three categories,algorithms based on text images,algorithms based on text format and algorithms based on text content.The implementation process of each type of algorithm was elaborated and the advantages and disadvantages of the algorithm were analyzed.At the same time,their principles,embedded capacity and anti-attack capability was compared and analyzed.In addition,the problems existing in Chinese text information hiding technology was summarized,and the research trends were discussed in the future.It is expected to provide reference for research in this field.…”
Get full text
Article -
10157
Intelligibility of speech processed by a spectral contrast enhancement procedure and a binaural procedure
Published 2004-01-01Get full text
Article -
10158
Evaluation of Multi-Class Classification Performance Lung Cancer Through K-NN and SVM Approach
Published 2025-04-01“…Based on the research and discussion of SVM and KNN performance evaluation, the SVM algorithm produces an accuracy of 98.28%, surpassing the accuracy of the KNN algorithm of 97.25%. …”
Get full text
Article -
10159
The influence of machine learning-based knowledge management model on enterprise organizational capability innovation and industrial development.
Published 2020-01-01“…First, through the analysis and discussion of ontology-based data mining (OBDM) algorithm and association analysis (Apriori) algorithm, a data mining algorithm (ML-AR algorithm) on account of ontology-based multilayer association and machine learning is proposed. …”
Get full text
Article -
10160
A Novel Influence Function M-Estimator-Based for Active Noise Control
Published 2021-08-01Get full text
Article