Showing 5,201 - 5,220 results of 12,962 for search 'while algorithm', query time: 0.15s Refine Results
  1. 5201

    A Deep Reinforcement-Learning-Based Route Optimization Model for Multi-Compartment Cold Chain Distribution by Jingming Hu, Chong Wang

    Published 2025-06-01
    “…Compared to a recent ant colony optimization algorithm, it achieves up to a 6.32% reduction in costs while being up to 1637 times faster in computation.…”
    Get full text
    Article
  2. 5202

    Adaptive enhancement of shoulder x-ray images using tissue attenuation and type-II fuzzy sets. by Qifeng Liu, Yong Han, Lu Shen, Jialei Du, Marzia Hoque Tania

    Published 2025-01-01
    “…The method integrates automatic tissue attenuation techniques, which enhance the image contrast by removing non-essential tissue components while preserving important tissues and bones. Additionally, we apply an improved Type-II fuzzy set algorithm to further optimize image sharpness. …”
    Get full text
    Article
  3. 5203

    Adaptive Localization in Wireless Sensor Network through Bayesian Compressive Sensing by Zuoxin Xiahou, Xiaotong Zhang

    Published 2015-08-01
    “…Furthermore, we provide adaptive iteration BCS localization (AIBCSL) algorithm, which is based on BCS and will choose measurement sensors according to the environment adaptively with only an initial value, while other frameworks require prior knowledge such as target numbers to choose measurements. …”
    Get full text
    Article
  4. 5204

    Using random subcarrier weighting for multi-carrier systems physical layer security by Zhou ZHONG, Liang JIN, Kai-zhi HUANG

    Published 2012-10-01
    “…An OFDM security model and a physical layer security transmission scheme were proposed for multi-carrier systems to achieve low probability of interception.In contrast to the resource allocation algorithm which would be disabled at the low SNR,this method designed the subcarrier transmission weighting vectors to randomize the eavesdropper’s signals but not the authorized receiver’s signals.The channel state information was the only character to distinguish authorized receivers and eavesdroppers,which was conducted to guide the weighting vectors design.Simulation results show that the proposed method guarantees that authorized receiver performs transmitted reference demodulation successfully,while the eavesdroppers can not detect the transmitted symbols.…”
    Get full text
    Article
  5. 5205

    Analytic field solution for machine learning integrating physics model and data driven approach by Xiaobin Wang, April Wang

    Published 2025-05-01
    “…We use a path integral method to find a field solution that calculates machine learning statistics while considering the physics model’s uncertainty, data limitations, geometry complexity, and mixed probability distributions due to field interactions. …”
    Get full text
    Article
  6. 5206

    Norwegian Endurance Athlete ECG Database by Bjorn-Jostein Singstad

    Published 2022-01-01
    “…The electrocardiograms are standard 12-lead resting ECGs, recorded for 10 seconds while the athlete's lay supine on a bench. …”
    Get full text
    Article
  7. 5207

    基于透视不变二值特征描述子的图像匹配算法 by Li-chuan GENG, Song-zhi SU, Shao-zi LI

    Published 2015-04-01
    “…Current local feature based image matching algorithms are usually less robust to image perspective transformation.Aiming to solve this problem,a new perspective invariant binary code (PIBC) based image matching algorithm is proposed.Firstly,FAST corners are detected on the pyramid images,those corners with non-maximum Harris corner response value and the edge points are further eliminated.And then,by simulating the perspective transformations of images taken from different viewpoints,a single FAST corner is described with binary descriptors under different viewpoint transformations,which makes the descriptor could describe the identical feature point on different perspective transform images.Experimental results show its robustness to image perspective transformation,while its complexity is similar with SURF.…”
    Get full text
    Article
  8. 5208

    Optimization of costs in the enterprise. Effective strategies for business by N. Yu. Pracheva

    Published 2021-04-01
    “…The author offers an algorithm of actions for entrepreneurs who are ready to solve the optimization problem in a complex way.…”
    Get full text
    Article
  9. 5209

    Pekalongan Regency Tourism Recommendation System with Content based Filtering by Cinta Salsabilla, Danang Wahyu Utomo

    Published 2025-01-01
    “…The method utilizes the TF-IDF algorithm to measure the weight of tourist attraction categories and cosine similarity to assess the similarity between attractions based on their categories. …”
    Get full text
    Article
  10. 5210

    In-Line and Off-Axis Hybrid Digital Holographic Imaging Method Based on Off-Axis Hologram Constraints by Fengpeng Wang, Feifan Fan, Deren Yuan, Xinghua Wang

    Published 2022-01-01
    “…We put forward a novel hybrid iterative algorithm to improve the imaging quality of digital holography. …”
    Get full text
    Article
  11. 5211

    基于平滑伪维格纳分布与阶次跟踪的汽车变速器啸叫噪声分析 by 王鹏, 吴光强, 栾文博

    Published 2014-01-01
    “…The smoothed pseudo Wigner-Ville distribution(SPWVD)and order tracking are applied in the analysis of gearbox whine noise.Firstly,the SPWVD algorithm is put forward for computer programming.Then,by using instantaneous frequency estimation method,the speed signal is extracted with SPWVD.Combined with Hermite interpolation polynomial,the equal angle interval resample of the noise signal is carried out in angular domain for order tracking.Finally,the timefrequency analysis and order tracking analysis of the 2nd shift noise are carried out by using SPWVD,while the qualitative analysis and quantitative analysis are used to research the feature of whine noise.It’s a new method for the study of automobile gearbox whine noise.…”
    Get full text
    Article
  12. 5212

    Throughput-Delay Trade-Off for Cognitive Radio Networks: A Convex Optimization Perspective by Hang Hu, Hang Zhang, Hong Yu

    Published 2014-01-01
    “…It is proved that the maximum achievable throughput and the minimum transmission delay cannot be obtained simultaneously. An efficient algorithm is proposed to optimize the sensing bandwidth and the final decision threshold jointly such that the throughput is maximized while the delay is constrained. …”
    Get full text
    Article
  13. 5213

    Optimization of Smooth Trajectories for Two-Wheel Differential Robots Under Kinematic Constraints Using Clothoid Curves by Wei Zeng, Tifan Xiong, Chao Wang

    Published 2025-05-01
    “…An improved and efficient RRT algorithm is employed for global navigation, while an adaptive clothoid curve is utilized for local trajectory smoothing. …”
    Get full text
    Article
  14. 5214

    A Spectral Collocation Technique for Riesz Fractional Chen-Lee-Liu Equation by M. A. Abdelkawy, S. A. Alyami

    Published 2021-01-01
    “…The first is the approach of the spatial variable, while the other is the approach of the temporal variable. …”
    Get full text
    Article
  15. 5215

    Self-Adaptive Alternating Direction Method of Multipliers for Image Denoising by Mingjie Xie, Haibing Guo

    Published 2024-11-01
    “…This adaptive technique autonomously adjusts variable penalty parameters to expedite algorithm convergence, thereby markedly boosting algorithmic performance. …”
    Get full text
    Article
  16. 5216

    Diagonal Hessian Approximation for Limited Memory Quasi-Newton via Variational Principle by Siti Mahani Marjugi, Wah June Leong

    Published 2013-01-01
    “…Some numerical results are also presented to illustrate the effectiveness of our approximating matrices when incorporated within the L-BFGS algorithm.…”
    Get full text
    Article
  17. 5217

    INPUTS ACCESSIBILITY AND EFFECTIVENESS OF GROWTH ENHANCEMENT SUPPORT SCHEME (GESS) IN SOUTHWEST NIGERIA by Ibidun Olatohun IBITUNDE, Francis Oke ADERETI, Akinloye Jimoh FARINDE

    Published 2019-01-01
    “…In 2017, the equivalent of 56% of the value of the agricultural production generated was used for intermediary consumption, while the gross added value represented 44%. The present paper is looking at how a mathematical algorithm used to study the impact of the agricultural production on the GDP can represent a tool for analysing and assessing the evolution of the GDP..The conclusion of the article is that the current fluctuations of the agricultural production trigger variations of the GDP, which means that agriculture is maintaining its impact on the GDP.…”
    Get full text
    Article
  18. 5218

    PHOTOEMISSION METHOD OF TEMPERATURE MEASURING IN THE PROCESS OF SPARK PLASMA SINTERING POWDERS OF REFRACTORY METALS by D. V. Minko, O. O. Kuznechik

    Published 2015-04-01
    “…Construction and algorithm of the photoemission pyrometer based on a photomultiplier are outlined; the calibration procedure is set out. …”
    Get full text
    Article
  19. 5219

    Optimal Mobile Sensor Scheduling for a Guaranteed Coverage Ratio in Hybrid Wireless Sensor Networks by Zhixin Fu, Keyou You

    Published 2013-04-01
    “…This paper proposes an optimal mobile sensor-scheduling algorithm for recovering the failure sensors in hybrid wireless sensor networks (WSNs). …”
    Get full text
    Article
  20. 5220

    Research on system log anomaly detection based on deep learning by Yidong WANG, Peishun LIU, Gbin WAN

    Published 2019-10-01
    “…The system log reflects the running status of the system and records the activity information of specific events in the system.Therefore,the rapid and accurate detection of the system abnormal log is important to the security and stability of the system.A log anomaly detection algorithm based on GRU neural network is proposed.Log parsing is implemented based on log key technology.Log anomaly detection is realized by using anomaly detection model of execution path and anomaly detection model of parameter value.The system has the advantages of less parameters and faster training.It improves the running speed while achieving higher detection accuracy,and is suitable for log analysis of large information systems.…”
    Get full text
    Article