Showing 781 - 800 results of 31,575 for search '"algorithm"', query time: 0.13s Refine Results
  1. 781
  2. 782

    Target Image Matching Algorithm Based on Binocular CCD Ranging by Dongming Li, Wei Su, Jinhua Yang, Lijuan Zhang

    Published 2014-01-01
    “…Secondly, we deduced the algorithm which was named improved cross-correlation matching algorithm and cubic surface fitting algorithm for target images matched, and it could achieve a subpixel level matching for binocular CCD ranging images. …”
    Get full text
    Article
  3. 783

    [Translated article] Consensus on the Diagnostic Algorithm for Chronic Nodular Prurigo by J. Ortiz de Frutos, E. Serra Baldrich, M.J. Tribó Boixareu, J.C. Armario Hita, J.M. Carrascosa Carrillo, I. Figueras Nart, Á. Flórez, P. Herranz Pinto, J. Francisco Silvestre

    Published 2024-11-01
    “…The aim of this study was to reach consensus among a group of experts based on a non-systematic literature review and an algorithm for the clinical diagnosis of CNP. The resulting algorithm is structured in 3 blocks: 1) early identification of the patient with a possible diagnosis of CNP; 2) diagnosis and assessment of CNP; and 3) categorization of CNP (identification of the underlying causes or associated comorbidities).We believe that this clinical algorithm can facilitate the correct diagnosis of patients with CNP. …”
    Get full text
    Article
  4. 784
  5. 785

    Efficient algorithms for electric vehicles’ min-max routing problem by Seyed Sajjad Fazeli, Saravanan Venkatachalam, Jonathon M. Smereka

    Published 2024-01-01
    “…We propose an efficient branch and cut framework and a three-phase hybrid heuristic algorithm that can efficiently solve a variety of instances. …”
    Get full text
    Article
  6. 786

    Centrifugal pump degradation identification based on GA-GMDH algorithm by Guangxi SUN, Hui CAO, Ziwei ZHANG, Zhenhao MA

    Published 2024-10-01
    “…Second, based on the existing pump degradation data, a degradation identification model based on the genetic algorithm-group method of data handling (GA-GMDH) algorithm is proposed.ResultsThe reliability of the GA-GMDH monitoring model is relatively high, with a root mean square error of 0.029216 between the output values of the health index and the actual values. …”
    Get full text
    Article
  7. 787
  8. 788

    Negative feedback scheduling algorithm based on historical information in SDN by Yingying LYU, Yunfei GUO, Zhenpeng WANG, Guozhen CHENG, Yawen WANG

    Published 2018-06-01
    “…In the current SDN architecture,the controllers suffer from lots of potential attacks.For example,malicious flow rule attacks may introduce fake flow rules to confuse the host.A negative feedback scheduling algorithm based on historical information was proposed,in which hypothesis testing was used to judge the behavior of the attacker and the result will be used as a basis for scheduling.Simulation results and analysis show that,compared with the traditional scheduling methods,the proposed algorithm can increase the attacker’s time cost to a certain extent,so as to effectively defend the attacker’s probe attack.In addition,the more types of controllers,the more difficult it is to break the system.…”
    Get full text
    Article
  9. 789

    Enhancing Residential Electricity Consumption Forecasting with Meta-Heuristic Algorithms by Milad Mohebbi, Behnam Sobhani

    Published 2024-06-01
    “…These algorithms were evaluated for their effectiveness in adapting to seasonal variations in electricity consumption data. …”
    Get full text
    Article
  10. 790

    Energy-Efficient Train Operation Using Nature-Inspired Algorithms by Kemal Keskin, Abdurrahman Karamancioglu

    Published 2017-01-01
    “…A train operation optimization by minimizing its traction energy subject to various constraints is carried out using nature-inspired evolutionary algorithms. The optimization process results in switching points that initiate cruising and coasting phases of the driving. …”
    Get full text
    Article
  11. 791

    Nonparametric Bayesian dictionary learning algorithm based on structural similarity by Daoguang DONG, Guosheng RUI, Wenbiao TIAN, Jian KANG, Ge LIU

    Published 2019-01-01
    “…Though nonparametric Bayesian methods possesses significant superiority with respect to traditional comprehensive dictionary learning methods,there is room for improvement of this method as it needs more consideration over the structural similarity and variability of images.To solve this problem,a nonparametric Bayesian dictionary learning algorithm based on structural similarity was proposed.The algorithm improved the structural representing ability of dictionaries by clustering images according to their non-local structural similarity and introducing block structure into sparse representing of images.Denoising and compressed sensing experiments showed that the proposed algorithm performs better than several current popular unsupervised dictionary learning algorithms.…”
    Get full text
    Article
  12. 792

    Improvement of identity adaptive recognition algorithm in visual sensor network by Na LI, Xiaoning ZHANG, Fang’e ZHU

    Published 2016-06-01
    “…When recognizing the identity in visual sensor network,it’s easily to be interfered with facial expression,illumination condition and shelter,so as to reduce the recognition accuracy.An identity adaptive recognition algorithm based on the improved minimum gray difference tree in visual sensor network was put forward.After gray processing,the minimum gray difference was used to enhance the quality of the image;cost function based on gray level was defined,the match price of each corresponding pair of gray of the image to be recognized and the specified face image were achieved,minimum gray difference tree model was set up,after two image similarity were calculated,the nearest neighbor matching algorithm was directly applied to obtain the image identity corresponding to minimum matching cost in the visual sensor network registration gallery,it was viewed as the identity to be recognized,the adaptive identity recognition was achieved in visual sensor network.Simulation results show that the proposed algorithm has high identification accuracy.…”
    Get full text
    Article
  13. 793

    A TSN traffic scheduling algorithm combined with enqueue shaping by Wenxuan HAN, Hailong ZHU, Xinxin HE, Yanjue LI, Changchuan YIN

    Published 2022-12-01
    “…Most of the existing studies on the scheduling of mixed traffic in time-sensitive network (TSN) focus on how to ensure low-latency of stream reservation (SR) traffic.However, SR traffic blocks best-effort (BE) traffic for a long time will lead to excessive delay in BE traffic, which is not conducive to the state maintenance of network and the management of system.In order to reduce the maximum end-to-end delay of BE messages, a traffic scheduling algorithm which combines with enqueue shaping was proposed.It reduced the blocking of BE traffic by reducing the reserved bandwidth of SR traffic.The algorithm first added enqueue buffers in front of SR queues.Then, the reserved bandwidth ratio among the same priority traffic was adjusted by setting the number of frames in each enqueue buffer entering the SR queue during enqueue shaping.Finally, it jointed egress shaping to reserve bandwidth resources for each SR flow to match its latency requirement.Simulation results showed that combining enqueue shaping can reduce the maximum end-to-end delay of BE messages by 9.66%~75.76%.…”
    Get full text
    Article
  14. 794
  15. 795
  16. 796
  17. 797
  18. 798

    Neutrosophic Clustering Algorithm Based on Sparse Regular Term Constraint by Dan Zhang, Yingcang Ma, Hu Zhao, Xiaofei Yang

    Published 2021-01-01
    “…Clustering algorithm is one of the important research topics in the field of machine learning. …”
    Get full text
    Article
  19. 799

    Image Encryption Using a Lightweight Stream Encryption Algorithm by Saeed Bahrami, Majid Naderi

    Published 2012-01-01
    “…In this paper, we consider a simple and lightweight stream encryption algorithm for image encryption, and a series of tests are performed to confirm suitability of the described encryption algorithm. …”
    Get full text
    Article
  20. 800