Showing 1,541 - 1,560 results of 19,511 for search '"Algorithms"', query time: 0.08s Refine Results
  1. 1541

    Intercomparison of Numerical Inversion Algorithms for Particle Size Determination of Polystyrene Suspensions Using Spectral Turbidimetry by Benjamin Glasse, Norbert Riefler, Udo Fritsching

    Published 2015-01-01
    “…In this context, for the evaluation of turbidimetric spectral measurements, the application of different numerical inversion algorithms is investigated with respect to the particle size distribution determination of polystyrene suspensions. …”
    Get full text
    Article
  2. 1542
  3. 1543
  4. 1544

    Accuracy analysis on access hyper-point real-time detection algorithms in high-speed network by Haiqing YU, Wei DING, Jie XU

    Published 2020-04-01
    “…Real-time access hyper-point helps managers better control the network.Under high-speed network conditions,the difficulty in accessing hyper-point detection lies in the pressure exerted by large traffic on computing.Based on the 40 Gbit/s bandwidth network environment,from the perspective of accuracy analysis,the flow record statistics algorithm and the estimation-based superpoint detection algorithm were compared.The flow record statistical algorithm was improved by the threshold model based on heavy-tailed distribution.The estimation-based superpoint detection algorithm was implemented in the GPU environment by SRLA.The research results show that the estimation-based hyper-point detection algorithm which has obviously higher accuracy and more room for improvement is more suitable for real-time detection of hyper-point in high-speed network than the flow record statistical algorithm.…”
    Get full text
    Article
  5. 1545
  6. 1546

    Performance of Gradient-Based Solutions versus Genetic Algorithms in the Correlation of Thermal Mathematical Models of Spacecrafts by Eva Anglada, Laura Martinez-Jimenez, Iñaki Garmendia

    Published 2017-01-01
    “…Previous studies have shown the ability of genetic algorithms to perform this task in several cases, although some limitations have been detected. …”
    Get full text
    Article
  7. 1547
  8. 1548
  9. 1549

    Parallel Algorithms of Well-Balanced and Weighted Average Flux for Shallow Water Model Using CUDA by Nugool Sataporn, Worasait Suwannik, Montri Maleewong

    Published 2021-01-01
    “…Four versions of the CUDA algorithm are presented in addition to a CPU implementation. …”
    Get full text
    Article
  10. 1550

    Book review: Zegart, Amy B. Spies, lies, and algorithms: the history and future of American intelligence by Elena Maceviciute

    Published 2023-09-01
    “…Zegart, Amy B. Spies, lies, and algorithms: the history and future of American intelligence. …”
    Get full text
    Article
  11. 1551

    Forecasting power generation of wind turbine with real-time data using machine learning algorithms by Asiye Bilgili, Kerem Gül

    Published 2024-12-01
    “…The findings indicated XGBoost algorithm outperformed the other models, achieving high accuracy while demonstrating computational efficiency, making it particularly suitable for real-time applications in energy forecasting.…”
    Get full text
    Article
  12. 1552

    Exploring the feasibility of GF1-WFV data in estimating SPAD using spatiotemporal fusion algorithms by Annan Zeng, Jianli Ding, Jinjie Wang, Lijing Han, Haiyan Han, Shuang Zhao, Xiangyu Ge

    Published 2025-05-01
    “…In this study, we evaluated the performance of four fusion algorithms fusing Gaofen-1 WFV and MODIS data while also exploring their fusion accuracy. …”
    Get full text
    Article
  13. 1553
  14. 1554

    Research on Recognition of Quiet Period of Sandstone Acoustic Emission Based on Four Machine Learning Algorithms by Dong Duan, Xiaojing Feng, Ruizhe Zhang, Xiaoyu Chen, Hongzhi Zhang

    Published 2022-01-01
    “…Aiming at solving the problem that it is difficult to recognize the quiet period of acoustic emission in rocks, four machine learning algorithms were adopted to develop and improve the recognition method of the quiet period of acoustic emission. …”
    Get full text
    Article
  15. 1555
  16. 1556
  17. 1557

    Data recommendation algorithm of network security event based on knowledge graph by Xianwei ZHU, Wei LIU, Zihao LIU, Zeyu GU

    Published 2023-12-01
    “…To address the difficulty faced by network security operation and maintenance personnel in timely and accurate identification of required data during network security event analysis, a recommendation algorithm based on a knowledge graph for network security events was proposed.The algorithm utilized the network threat framework ATT&CK to construct an ontology model and establish a network threat knowledge graph based on this model.It extracted relevant security data such as attack techniques, vulnerabilities, and defense measures into interconnected security knowledge within the knowledge graph.Entity data was extracted based on the knowledge graph, and entity vectors were obtained using the TransH algorithm.These entity vectors were then used to calculate data similarity between entities in network threat data.Disposal behaviors were extracted from literature on network security event handling and treated as network security data entities.A disposal behavior matrix was constructed, and the behavior matrix enabled the vector representation of network threat data.The similarity of network threat data entities was calculated based on disposal behaviors.Finally, the similarity between network threat data and threat data under network security event handling behavior was fused to generate a data recommendation list for network security events, which established correlations between network threat domains based on user behavior.Experimental results demonstrate that the algorithm performs optimally when the fusion weight α=7 and the recommended data volume K=5, achieving a recall rate of 62.37% and an accuracy rate of 68.23%.By incorporating disposition behavior similarity in addition to data similarity, the algorithm better represents factual disposition behavior.Compared to other algorithms, this algorithm exhibits significant advantages in recall rate and accuracy, particularly when the recommended data volume is less than 10.…”
    Get full text
    Article
  18. 1558

    A Mathematical Modeling and an Optimization Algorithm for Marine Ship Route Planning by Lili Huang

    Published 2023-01-01
    “…Based on the mathematical model, the ant colony algorithm is used to optimize the initial route of the ship. …”
    Get full text
    Article
  19. 1559

    Spectrum allocation algorithm of elastic optical networks in power distribution system by Biyou ZHAO, Shanhui ZHANG, Jinshuai WANG

    Published 2019-02-01
    “…In order to effectively improve the resource utilization of information transmission network in reality,the spectrum allocation problem in flexible optical network in smart grid environment was analyzed,and a spectrum allocation method was proposed.Combining the advantages of genetic algorithm and ant colony algorithm,the genetic algorithm was used to generate the initial solution.Finally,the optimal solution of the spectrum allocation problem was obtained by the characteristics of positive feedback of ant colony algorithm and efficient convergence.The performance of the optimization algorithm mentioned was verified by software simulation.The proposed algorithm can optimize the use of idle spectrum resources to meet the needs of mass data transmission in distribution network,and improve the reliability of distribution network communication system,which is of great significance to the safe and reliable operation of smart grid.…”
    Get full text
    Article
  20. 1560