Showing 3,941 - 3,960 results of 19,511 for search '"Algorithms"', query time: 0.11s Refine Results
  1. 3941
  2. 3942
  3. 3943
  4. 3944

    A hybrid singular value thresholding algorithm with diagonal-modify for low-rank matrix recovery by Ruiping Wen, Liang Zhang, Yalei Pei

    Published 2024-11-01
    “…The convergence of the new algorithm was discussed. Finally, numerical experiments shown that the new algorithm greatly improved the solving efficiency of a matrix recovery problem and saved the calculation cost, and its effect was obviously better than that of the other algorithms mentioned in experiments.…”
    Get full text
    Article
  5. 3945
  6. 3946

    A Lightweight Laser Chip Defect Detection Algorithm Based on Improved YOLOv7-Tiny by HU Wei, ZHAO Jumin, LI Dengao

    Published 2025-01-01
    “…In this study, a lightweight laser chip defect detection algorithm based on an improved YOLOv7-Tiny is proposed, aiming at addressing the high computational and parameter demands of deep learning applications in defect detection. …”
    Get full text
    Article
  7. 3947
  8. 3948

    Nearest neighbor search algorithm for high dimensional data based on weighted self-taught hashing by Cong PENG, Jiangbo QIAN, Huahui CHEN, Yihong DONG

    Published 2017-06-01
    “…Because of efficiency in query and storage,learning hash is applied in solving the nearest neighbor search problem.The learning hash usually converts high-dimensional data into binary codes.In this way,the similarities between binary codes from two objects are conserved as they were in the original high-dimensional space.In practical applications,a lot of data which have the same distance from the query point but with different code will be returned.How to reorder these candidates is a problem.An algorithm named weighted self-taught hashing was proposed.Experimental results show that the proposed algorithm can reorder the different binary codes with the same Hamming distances efficiently.Compared to the naive algorithm,the F1-score of the proposed algorithm is improved by about 2 times and it is better than the homologous algorithms,furthermore,the time cost is reduced by an order of magnitude.…”
    Get full text
    Article
  9. 3949

    Root Coverage for Single Deep Gingival Recessions: Outcomes Based on a Decision-Making Algorithm by João B. César Neto, Marília C. Cavalcanti, Ricardo T. Sekiguchi, Claudio M. Pannuti, Giuseppe A. Romito, Dimitris N. Tatakis

    Published 2019-01-01
    “…Following the proposed decision-making algorithm, root coverage outcomes for GR defects ≥5 mm were comparable to outcomes reported for shallow defects. …”
    Get full text
    Article
  10. 3950

    Topology Control Algorithm considering Antenna Radiation Pattern in Three-Dimensional Wireless Sensor Networks by Myungjune Youn, Jaiyong Lee

    Published 2014-06-01
    “…Topology control is a key issue of wireless sensor network to reduce energy consumption and communication collision. Topology control algorithms in three-dimensional space have been proposed by modifying existing two-dimensional algorithms. …”
    Get full text
    Article
  11. 3951

    Recommendation Algorithm in Double-Layer Network Based on Vector Dynamic Evolution Clustering and Attention Mechanism by Jianrui Chen, Zhihui Wang, Tingting Zhu, Fernando E. Rosas

    Published 2020-01-01
    “…Experiments on Movielens, CiaoDVD, and Filmtrust datasets verify the effectiveness of our proposed algorithm. Experimental results show that our proposed algorithm can attain a better performance than other state-of-the-art algorithms.…”
    Get full text
    Article
  12. 3952

    An Autonomous Navigation Algorithm for High Orbit Satellite Using Star Sensor and Ultraviolet Earth Sensor by Li Baohua, Lai Wenjie, Chen Yun, Liu Zongming

    Published 2013-01-01
    “…The star identification algorithm and star tracking algorithm are executed at FOV1. …”
    Get full text
    Article
  13. 3953

    Robust chance-constrained optimization algorithm design for secure wireless powered backscatter communication system by Wanming HAO, Jinkun XIE, Gangcan SUN, Zhengyu ZHU, Yiqing ZHOU

    Published 2021-03-01
    “…For the channel uncertainty and security problems in wireless powered backscatter communication (WPBC) system, a robust chance-constrained optimization algorithm was proposed.Firstly, an optimization problem was established to maximize the minimum transmission rate of the system based on channel uncertainty considering eavesdropping data transmission rate constraints, minimum energy collection constraints and device reflectivity constraints.In order to solve the problem, the original uncertainty problem was transformed into a deterministic optimization problem by using the security approximation method based on Bernstein inequality.Then, combining the properties of inequality, the corresponding auxiliary variables were introduced to transform the deterministic optimization problem into a convex optimization problem, and the standard convex optimization algorithm was used to solve the problem.Finally, the simulation results show the effectiveness of the proposed algorithm.…”
    Get full text
    Article
  14. 3954
  15. 3955

    Projected Adaptive Cubic Regularization Algorithm with Derivative-Free Filter Technique for Box Constrained Optimization by Lingyun He, Peng Wang, Detong Zhu

    Published 2021-01-01
    “…The new iterations are obtained by the solutions of the projected adaptive cubic regularization algorithm with filter technique. We prove the convergence of the proposed algorithm under some assumptions. …”
    Get full text
    Article
  16. 3956
  17. 3957
  18. 3958
  19. 3959

    Bridge Seismic Damage Assessment Model Applying Artificial Neural Networks and the Random Forest Algorithm by Hanxi Jia, Junqi Lin, Jinlong Liu

    Published 2020-01-01
    “…This paper proposed a rapid assessment method for bridge seismic damage based on the random forest algorithm (RF) and artificial neural networks (ANN). …”
    Get full text
    Article
  20. 3960