Showing 861 - 880 results of 31,575 for search '"algorithm"', query time: 0.10s Refine Results
  1. 861

    Laryngeal cancer diagnosis based on improved YOLOv8 algorithm by Xin Nie, Xueyan Zhang, Di Wang, Yuankun Liu, Lumin Xing, Wenjian Liu

    Published 2025-01-01
    “…This study introduces an improved YOLOv8 algorithm named MSEC-YOLO, specifically designed for the detection and classification tasks of laryngeal cancer in endoscopic images. …”
    Get full text
    Article
  2. 862

    Novel algorithm of maintaining packet order in two-stage switch by ZHANG Xiao-ning, XU Du, LI Le-min

    Published 2005-01-01
    “…However, in its basic fabric, the load-balanced switch may mis-sequence the packets. A new algorithm called FFS (full frame stuff) was proposed in this paper, which maintains packet order in the two-stage load-balanced switch and has excellent switching performance (in terms of mean delay and throughput).This algorithm is distributed and each port operates independently.…”
    Get full text
    Article
  3. 863

    Local outlier factor algorithm based on correction of bidirectional neighbor by Xiaohui YANG, Xiaoming LIU

    Published 2020-08-01
    “…A local outlier factor algorithm based on bidirectional neighbor correction was proposed to solve the problems of existing outlier detection algorithms such as difficulty in parameter selection,poor efficiency and low accuracy.The bidirectional neighbor searching algorithm was used to reduce the neighbor search time.Then the bidirectional neighbor pruning algorithm was used to reduce the number of parameters and unnecessary calculations.And the correction factor based on bidirectional neighbors was used to improve the calculation accuracy.Experimental results show that the proposed algorithm has better performance in parameter selection and time efficiency than other outlier detection methods.The correction factor improves the accuracy of the algorithm,in the synthetic data set and UCI data set.…”
    Get full text
    Article
  4. 864
  5. 865

    Parallel time-delay estimation algorithm for GMSK mixing signals by RUI Guo-sheng1, XU Bin2, ZHANG Song2

    Published 2011-01-01
    “…Parallel time-delay estimation algorithm was proposed for GMSK mixing signals based on linear approxima-tion approach.Parallel estimation equations were built in flat-fading channel according to autocorrelation of over-sampling based mixing signals and then Cramer-Rao bound for parallel time-delay estimation was deduced.Poly-nomial fitting method was uesed to simplifying nonlinear complexity of GMSK shaping filter and estimation equations were resolved numerically by gradient descent algorithm with fast convergence.Simulation results show that its estimat-ing performance is good and the variance of estimation error is close to Cramer-Rao bound.As a non-preamble aided al-gorithm with lower complexity it is significant for the next blind processing.…”
    Get full text
    Article
  6. 866

    Formula over Function? From Algorithms to Values in Judicial Evaluation by Francesco Contini, Richard Mohr, Marco Velicogna

    Published 2014-02-01
    “…On the one hand individual judges' productivity is evaluated through quantitative data and mathematical algorithms: in the extreme case considered here, judge's remuneration was adjusted accordingly. …”
    Get full text
    Article
  7. 867
  8. 868

    A parallel algorithm for solving one problem of nonlinear optics by Raimondas Čiegis, Genė Kairytė, P. Ratė

    Published 1998-12-01
    “…A parallel version of the finite-difference scheme is proposed and the efficiency of this algorithm is investigated. …”
    Get full text
    Article
  9. 869

    Slovak morphological tokenizer using the Byte-Pair Encoding algorithm by Dávid Držík, Frantisek Forgac

    Published 2024-11-01
    “…This study introduces a new approach to text tokenization, SlovaK Morphological Tokenizer (SKMT), which integrates the morphology of the Slovak language into the training process using the Byte-Pair Encoding (BPE) algorithm. Unlike conventional tokenizers, SKMT focuses on preserving the integrity of word roots in individual tokens, crucial for maintaining lexical meaning. …”
    Get full text
    Article
  10. 870

    Resource allocation algorithm for downlink multiuser CoMP system by Yong-hong KUO, Ren-yong WAN, Jian CHEN, Jian WANG

    Published 2013-06-01
    “…For downlink multiuser coordinated multi-point transmission (MU-CoMP) system,a fast resource allocation algorithm was proposed to solve the margin adaptive (MA) problem.Firstly the algorithm estimated the number of sub-carriers for each user based on its average channel gain and minimal-rate requirement,and then an efficient algorithm was designed to complement subcarrier allocation.At last,fast bit-loading was achieved through pre-determining and remov-ing the inefficient spatial subchannels.Simulation results show that the proposed algorithm decreases the total transmit power with both the minimal-rate and bit error rate requirements satisfied,and obtains near-optimal performance with less complexity,compared with the optimal algorithm.…”
    Get full text
    Article
  11. 871

    Filtration Algorithms of Untrustworthy Analogous Information in APCS at TPP and NPP by V. I. Nazarov, Е. V. Pronkevich

    Published 2012-02-01
    “…The paper considers filtration algorithms of untrustworthy analogous information in APCS at TTP and NPP that make it possible to identify credibility of information transmitted through communication channels in the form of signals and which are continuously changeable in the regime of real time.…”
    Get full text
    Article
  12. 872
  13. 873

    Influence maximization algorithm of social networks based on Transformer model by YU Shuke, YAO Yao, YAN Chenxue

    Published 2024-12-01
    “…The network topology structure based influence maximization algorithms are greatly influenced by the network structure, which leads to unstable performance of social networks of different scales and different topology structures. …”
    Get full text
    Article
  14. 874
  15. 875
  16. 876

    Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks by Imanishimwe Jean de Dieu, Nyirabahizi Assouma, Maniraguha Muhamad, Wang Jin, Sungyoung Lee

    Published 2012-04-01
    “…This transmission requires a specific routing algorithm. To prolong the network lifetime, sensor nodes need a secure load-balancing route. …”
    Get full text
    Article
  17. 877
  18. 878

    General Improvements of Heuristic Algorithms for Low Complexity DOA Estimation by Haihua Chen, Haoran Li, Mingyang Yang, Changbo Xiang, Masakiyo Suzuki

    Published 2019-01-01
    “…Traditional heuristic algorithms usually need a large number of particles and iteration times. …”
    Get full text
    Article
  19. 879

    Medical Images Segmentation Based on Unsupervised Algorithms: A Review by Revella E. A. Armya, Adnan Mohsin Abdulazeez

    Published 2021-04-01
    “…The key aim of this paper is to study some literature on unsupervised algorithms (K-mean, K-medoids) and to compare the working efficiency of unsupervised algorithms with different types of medical images. …”
    Get full text
    Article
  20. 880

    An Adaptive Cauchy Differential Evolution Algorithm for Global Numerical Optimization by Tae Jong Choi, Chang Wook Ahn, Jinung An

    Published 2013-01-01
    “…In this paper, we present an adaptive parameter control DE algorithm. In the proposed algorithm, each individual has its own control parameters. …”
    Get full text
    Article