Suggested Topics within your search.
Suggested Topics within your search.
-
781
ALGORITHM OF DIAGNOSTICS AND SURGERY OF TRAUMA AND DEGENERATIVE DISEASES OF CERVICAL SPINE
Published 2018-01-01Subjects: Get full text
Article -
782
Target Image Matching Algorithm Based on Binocular CCD Ranging
Published 2014-01-01“…Secondly, we deduced the algorithm which was named improved cross-correlation matching algorithm and cubic surface fitting algorithm for target images matched, and it could achieve a subpixel level matching for binocular CCD ranging images. …”
Get full text
Article -
783
[Translated article] Consensus on the Diagnostic Algorithm for Chronic Nodular Prurigo
Published 2024-11-01“…The aim of this study was to reach consensus among a group of experts based on a non-systematic literature review and an algorithm for the clinical diagnosis of CNP. The resulting algorithm is structured in 3 blocks: 1) early identification of the patient with a possible diagnosis of CNP; 2) diagnosis and assessment of CNP; and 3) categorization of CNP (identification of the underlying causes or associated comorbidities).We believe that this clinical algorithm can facilitate the correct diagnosis of patients with CNP. …”
Get full text
Article -
784
Efficient routing algorithm for opportunistic networks based on network coding
Published 2013-09-01Subjects: Get full text
Article -
785
Efficient algorithms for electric vehicles’ min-max routing problem
Published 2024-01-01“…We propose an efficient branch and cut framework and a three-phase hybrid heuristic algorithm that can efficiently solve a variety of instances. …”
Get full text
Article -
786
Centrifugal pump degradation identification based on GA-GMDH algorithm
Published 2024-10-01“…Second, based on the existing pump degradation data, a degradation identification model based on the genetic algorithm-group method of data handling (GA-GMDH) algorithm is proposed.ResultsThe reliability of the GA-GMDH monitoring model is relatively high, with a root mean square error of 0.029216 between the output values of the health index and the actual values. …”
Get full text
Article -
787
Fuzzy logic applied to tunning mutation size in evolutionary algorithms
Published 2025-01-01Subjects: Get full text
Article -
788
Negative feedback scheduling algorithm based on historical information in SDN
Published 2018-06-01“…In the current SDN architecture,the controllers suffer from lots of potential attacks.For example,malicious flow rule attacks may introduce fake flow rules to confuse the host.A negative feedback scheduling algorithm based on historical information was proposed,in which hypothesis testing was used to judge the behavior of the attacker and the result will be used as a basis for scheduling.Simulation results and analysis show that,compared with the traditional scheduling methods,the proposed algorithm can increase the attacker’s time cost to a certain extent,so as to effectively defend the attacker’s probe attack.In addition,the more types of controllers,the more difficult it is to break the system.…”
Get full text
Article -
789
Enhancing Residential Electricity Consumption Forecasting with Meta-Heuristic Algorithms
Published 2024-06-01“…These algorithms were evaluated for their effectiveness in adapting to seasonal variations in electricity consumption data. …”
Get full text
Article -
790
Energy-Efficient Train Operation Using Nature-Inspired Algorithms
Published 2017-01-01“…A train operation optimization by minimizing its traction energy subject to various constraints is carried out using nature-inspired evolutionary algorithms. The optimization process results in switching points that initiate cruising and coasting phases of the driving. …”
Get full text
Article -
791
Nonparametric Bayesian dictionary learning algorithm based on structural similarity
Published 2019-01-01“…Though nonparametric Bayesian methods possesses significant superiority with respect to traditional comprehensive dictionary learning methods,there is room for improvement of this method as it needs more consideration over the structural similarity and variability of images.To solve this problem,a nonparametric Bayesian dictionary learning algorithm based on structural similarity was proposed.The algorithm improved the structural representing ability of dictionaries by clustering images according to their non-local structural similarity and introducing block structure into sparse representing of images.Denoising and compressed sensing experiments showed that the proposed algorithm performs better than several current popular unsupervised dictionary learning algorithms.…”
Get full text
Article -
792
Improvement of identity adaptive recognition algorithm in visual sensor network
Published 2016-06-01“…When recognizing the identity in visual sensor network,it’s easily to be interfered with facial expression,illumination condition and shelter,so as to reduce the recognition accuracy.An identity adaptive recognition algorithm based on the improved minimum gray difference tree in visual sensor network was put forward.After gray processing,the minimum gray difference was used to enhance the quality of the image;cost function based on gray level was defined,the match price of each corresponding pair of gray of the image to be recognized and the specified face image were achieved,minimum gray difference tree model was set up,after two image similarity were calculated,the nearest neighbor matching algorithm was directly applied to obtain the image identity corresponding to minimum matching cost in the visual sensor network registration gallery,it was viewed as the identity to be recognized,the adaptive identity recognition was achieved in visual sensor network.Simulation results show that the proposed algorithm has high identification accuracy.…”
Get full text
Article -
793
A TSN traffic scheduling algorithm combined with enqueue shaping
Published 2022-12-01“…Most of the existing studies on the scheduling of mixed traffic in time-sensitive network (TSN) focus on how to ensure low-latency of stream reservation (SR) traffic.However, SR traffic blocks best-effort (BE) traffic for a long time will lead to excessive delay in BE traffic, which is not conducive to the state maintenance of network and the management of system.In order to reduce the maximum end-to-end delay of BE messages, a traffic scheduling algorithm which combines with enqueue shaping was proposed.It reduced the blocking of BE traffic by reducing the reserved bandwidth of SR traffic.The algorithm first added enqueue buffers in front of SR queues.Then, the reserved bandwidth ratio among the same priority traffic was adjusted by setting the number of frames in each enqueue buffer entering the SR queue during enqueue shaping.Finally, it jointed egress shaping to reserve bandwidth resources for each SR flow to match its latency requirement.Simulation results showed that combining enqueue shaping can reduce the maximum end-to-end delay of BE messages by 9.66%~75.76%.…”
Get full text
Article -
794
Identification of maize kernel varieties based on interpretable ensemble algorithms
Published 2025-02-01Subjects: “…differential evolutionary algorithm…”
Get full text
Article -
795
Generalized Exponentiated Gradient Algorithms and Their Application to On-Line Portfolio Selection
Published 2024-01-01Subjects: “…exponentiated gradient algorithms…”
Get full text
Article -
796
Genetic Algorithm for Finding the Global Forcing Number of Bipartite Graphs
Published 2024-12-01Subjects: Get full text
Article -
797
Numerical Solutions to the Variational Problems by Dijkstra’s Path-Finding Algorithm
Published 2024-11-01Subjects: Get full text
Article -
798
Neutrosophic Clustering Algorithm Based on Sparse Regular Term Constraint
Published 2021-01-01“…Clustering algorithm is one of the important research topics in the field of machine learning. …”
Get full text
Article -
799
Image Encryption Using a Lightweight Stream Encryption Algorithm
Published 2012-01-01“…In this paper, we consider a simple and lightweight stream encryption algorithm for image encryption, and a series of tests are performed to confirm suitability of the described encryption algorithm. …”
Get full text
Article -
800
RETRACTED: Correction of the movement of the mobile robot using the modified algorithm
Published 2024-01-01Get full text
Article