Showing 761 - 780 results of 2,858 for search 'role based algorithm', query time: 0.19s Refine Results
  1. 761
  2. 762
  3. 763

    INTEGRATED CHARACTERISTIC BASE OF MODULAR NUMBER SYSTEMS by A. A. Kolyada, A. F. Chernyavsky

    Published 2016-09-01
    “…Interval index characteristics – the interval index and the main interval index - play a key role in this mechanism. Priority of these characteristics is explained by their essential advantages over known integrated characteristics of a modular code when optimizing algorithms of non-modular operations.…”
    Get full text
    Article
  4. 764

    Exploration of Potential Roles of a New LOXL2 Splicing Variant Using Network Knowledge in Esophageal Squamous Cell Carcinoma by Bing-Li Wu, Guo-Qing Lv, Hai-Ying Zou, Ze-Peng Du, Jian-Yi Wu, Pi-Xian Zhang, Li-Yan Xu, En-Min Li

    Published 2014-01-01
    “…These results found many specific annotations indicating the potential specific role or mechanism for LOXL2-e13. The DEGs of LOXL2-e13, comparing to its wild type, were prioritized by the Random Walk with Restart algorithm. …”
    Get full text
    Article
  5. 765

    Link Prediction Based on the Derivation of Mapping Entropy by Hefei Hu, Yanan Wang, Zheng Li, Yang Tian, Yuemei Ren

    Published 2021-01-01
    “…The algorithms based on topological similarity play an important role in link prediction. …”
    Get full text
    Article
  6. 766

    Malware prediction technique based on program gene by Da XIAO, Bohan LIU, Baojiang CUI, Xiaochen WANG, Suoxing ZHANG

    Published 2018-08-01
    “…With the development of Internet technology,malicious programs have risen explosively.In the face of executable files without source,the current mainstream malware detection uses feature detection based on similarity,with lack of analysis of malicious sources.To resolve this status,the definition of program gene was raised,a generic method of extracting program gene was designed,and a malicious program prediction method was proposed based on program gene.Utilizing machine learning and deep-learning algorithms,the forecasting system has good prediction ability,with the accuracy rate of 99.3% in the deep-learning model,which validates the role of program gene theory in the field of malicious program analysis.…”
    Get full text
    Article
  7. 767
  8. 768

    An overview of iterative methods based on orthogonal projections by Touraj Nikazad, Mona Khakzad

    Published 2025-06-01
    “…We provide a structured overview and comparison of existing orthogonal projection-based iterative methods for solving LFPs, including sequential, simultaneous, and block-iterative algorithms. …”
    Get full text
    Article
  9. 769

    Detection of communities with Naming Game-based methods. by Thais Gobet Uzun, Carlos Henrique Costa Ribeiro

    Published 2017-01-01
    “…In addition, the resulting uncertainty and trust values classify nodes and edges according to role and position in the network. Also, our model has shown a degree of accuracy both for non-overlapping and overlapping communities that are comparable with most algorithms specifically designed for topological community detection.…”
    Get full text
    Article
  10. 770

    Enhancing Transient Stability of DFIG-Based Wind Turbine Systems Using Deep Learning-Controlled Resistance-Based Fault Current Limiters by Yaoying Wang

    Published 2024-03-01
    “…MATLAB/Simulink confirms the efficacy of the proposed limiter and algorithm in boosting transient stability for DFIG-based wind energy systems. …”
    Get full text
    Article
  11. 771
  12. 772
  13. 773

    AI-enhanced automation of building energy optimization using a hybrid stacked model and genetic algorithms: Experiments with seven machine learning techniques and a deep neural net... by Mohammad H. Mehraban, Samad ME Sepasgozar, Alireza Ghomimoghadam, Behrouz Zafari

    Published 2025-06-01
    “…Unlike the common practices, the scenario development and building optimization tend to be enhanced by using AI in the present paper, using a Python-based script alongside the Non-dominated Sorting Genetic Algorithm (NSGA-II) through EnergyPlus simulations. …”
    Get full text
    Article
  14. 774
  15. 775

    Multicluster Distributed Optimization Strategy for Turbine Wake Environment by Zhenping Yu, Xinmeng Zhou, Yedong Huang, Kunyu Zhou, Guangming Cui, Juntian Qu

    Published 2025-08-01
    “…As a crucial component of modern energy systems, wind energy plays a significant role in energy transition. In traditional wind power systems, mutual interference between wind turbines leads to wake effect, adversely impacts the power generation efficiency of wind farms. …”
    Get full text
    Article
  16. 776

    Artificial Intellect and Methodology of Economic Science by M. V. Dubovik, S. G. Dmitriev

    Published 2025-03-01
    “…Apart from that, the issue of public trust to applying algorithms and elaboration of evidence-based policy become hardly attainable without relevant interpretation of model functioning, in spite of hypothetic accuracy of forecasts made with their help. …”
    Get full text
    Article
  17. 777

    Estimation of Sideslip Angle Based on Extended Kalman Filter by Yupeng Huang, Chunjiang Bao, Jian Wu, Yan Ma

    Published 2017-01-01
    “…Traditional estimation method based on Kalman filter algorithm is correct in vehicle linear control area; however, on low adhesion road, vehicles have obvious nonlinear characteristics. …”
    Get full text
    Article
  18. 778

    Implementation of Machine Learning in Flat Die Extrusion of Polymers by Nickolas D. Polychronopoulos, Ioannis Sarris, John Vlachopoulos

    Published 2025-04-01
    “…The dataset was used to train and evaluate the following three powerful machine learning (ML) algorithms: Random Forest (RF), XGBoost, and Support Vector Regression (SVR). …”
    Get full text
    Article
  19. 779
  20. 780

    A Multistep Framework for Vision Based Vehicle Detection by Hai Wang, Yingfeng Cai

    Published 2014-01-01
    “…Vision based vehicle detection is a critical technology that plays an important role in not only vehicle active safety but also road video surveillance application. …”
    Get full text
    Article