Showing 11,781 - 11,800 results of 19,511 for search '"algorithm"', query time: 0.09s Refine Results
  1. 11781

    TriangularSORT: A Deep Learning Approach for Ship Wake Detection and Tracking by Chengcheng Yu, Yanmei Zhang

    Published 2025-01-01
    “…This paper introduces a novel approach for ship tracking and wake detection utilizing advanced computational techniques, particularly the TriangularSORT algorithm for monitoring vessels. This method enhances effective ship tracking by closely associating the vertices of the triangular wake with the coordinates of the ship. …”
    Get full text
    Article
  2. 11782

    Semi-supervised learning by constructing query-document heterogeneous information network by Yu-feng LIU, Ren-fa LI

    Published 2014-08-01
    “…Various graph-based algorithms for semi-supervised learning have been proposed in recent literatures. …”
    Get full text
    Article
  3. 11783

    An Approach to Iron-Deficiency Anemia by Imran Rasul, Gabor P Kandel

    Published 2001-01-01
    “…The present article provides a diagnostic algorithm to iron-deficiency anemia, which describes a more systematic manner in which to approach iron-deficiency anemia.…”
    Get full text
    Article
  4. 11784

    Prediction and evaluation of residual life of casing with corrosion defects by JIA Aoyin, QIAN Liqin, WANG Jie, YANG Jingwei, WU Yaokun, WEI Mingji

    Published 2024-01-01
    “…The particle swarm optimization-gaussian process regression (PSO-GPR) algorithm was employed to construct a predictive model for casing corrosion rates.ResultsIntegration of the two models, the evaluation of the residual life of casings with corrosion defects was completed, it has theoretical guidance significance for the prevention and management of corroded casings in oil field operations.…”
    Get full text
    Article
  5. 11785

    Mixed Platoon Flow Dispersion Model Based on Speed-Truncated Gaussian Mixture Distribution by Weitiao Wu, Wenzhou Jin, Luou Shen

    Published 2013-01-01
    “…Expectation maximum (EM) algorithm was used for parameters estimation. The relationship between the arriving flow distribution at downstream intersection and the departing flow distribution at upstream intersection was investigated using the proposed model. …”
    Get full text
    Article
  6. 11786

    A new method for reducing 5G overlapping coverage of urban grid roads by Yejiang ZHANG, Jie CHEN, Yi LIU, Xingzheng LI, Fuyang LI, Jian HU

    Published 2024-01-01
    “…The 5G network for urban grid road scenes has entered a new stage of refined operation and maintenance.The main contradiction has also shifted from insufficient coverage to severe overlapping coverage of some road sections.5G overlapping coverage will have a significant impact on users’ basic services such as internet access and voice.The optimization of traditional road overlapping coverage has many problems, such as inconsistent standards, recurring problems, and low work efficiency.The concept of overlapping coverage contribution was proposed, and an algorithm for root cause analysis of overlapping coverage was designed based on expert experience.An IT platform for optimizing overlapping coverage problems was also developed.The practice has proven that this method can effectively reduce the 5G overlapping coverage rate of urban grid roads, help enterprises save network optimization costs, and truly achieve the goal of cost reduction and efficiency increase.…”
    Get full text
    Article
  7. 11787

    Adaptive Dual-Polarization Filtering Method for Countering Active Jamming by Qiang Zhang, Rui Zhou, Xianbo Shi, Yixin Zhao

    Published 2020-01-01
    “…Finally, the specific polarization filtering algorithm and the output criterion of the optimal filtering results are given. …”
    Get full text
    Article
  8. 11788

    Application of Neural Networks in Financial Time Series Forecasting Models by Xinhui Li

    Published 2022-01-01
    “…Accurate financial forecasts can provide reference for financial activities and decision-making to a certain extent, promote the steady development of the market, and improve the conversion rate of financial profits. As an algorithm model that can simulate the biological visual system, the convolutional neural network can predict the numerical trend of the next period of time based on known data. …”
    Get full text
    Article
  9. 11789

    Teletactile System Based on Mechanical Properties Estimation by Mauro M. Sette, Hendrik Van Brussel, Jos Vander Sloten

    Published 2011-01-01
    “…The approach presents different technical difficulties and some solutions are proposed: the implementation of a fast Young’s modulus estimation algorithm, the implementation of a real time finite element model, and finally the implementation of a stiffness estimation approach in order to guarantee the system’s stability. …”
    Get full text
    Article
  10. 11790

    Clutch Online Adaptive Engagement Control of ISG Type Hybrid Electric Vehicle by Yan Ting, Yang Lin, Chen Liang

    Published 2018-01-01
    “…Then an object function is formulated to reduce impact and shorten engagement time integrally,combined with a combination optimization algorithm to obtain the optimal outlet valve duty ratio sequence and optimal engagement time. …”
    Get full text
    Article
  11. 11791

    Reconstruction of LDPC code sparse check matrix based on modified LBP decoding by ZHANG Tianqi, LI Chunyun, WU Xianyue, WU Yunge

    Published 2024-05-01
    “…In order to reconstruct the sparse check matrix of LDPC code, a sparse check matrix reconstruction algorithm for LDPC code at high BER was proposed based on modified LBP decoding. …”
    Get full text
    Article
  12. 11792

    Matrix computation over homomorphic plaintext-ciphertext and its application by Yang LIU, Linhan YANG, Jingwei CHEN, Wenyuan WU, Yong FENG

    Published 2024-02-01
    “…Those homomorphic encryption schemes supporting single instruction multiple data (SIMD) operations effectively enhance the amortized efficiency of ciphertext computations, yet the structure of ciphertexts leads to high complexity in matrix operations.In many applications, employing plaintext-ciphertext matrix operations can achieve privacy-preserving computing.Based on this, a plaintext-ciphertext matrix multiplication scheme for matrices of arbitrary dimension was proposed.The resulting ciphertext was computed through steps such as encoding the plaintext matrix, transforming the dimensions of the encrypted matrix, etc.Compared to the best-known encrypted matrix multiplication algorithm for square matrices proposed by Jiang et al., the proposed scheme supported matrix multiplication of arbitrary dimension, and consecutive matrix multiplications.Both theoretical analysis and experimental results show that the proposed scheme requires less rotations on ciphertexts and hence features higher efficiency.When applied to a privacy-preserving Bayesian classifier, the proposed scheme can complete classification tasks with higher security parameters and reduced running time.…”
    Get full text
    Article
  13. 11793

    Client grouping and time-sharing scheduling for asynchronous federated learning in heterogeneous edge computing environment by Qianpiao MA, Qingmin JIA, Jianchun LIU, Hongli XU, Renchao XIE, Tao HUANG

    Published 2023-11-01
    “…., edge heterogeneity, data Non-IID, and communication resource constraints, a grouping asynchronous federated learning (FedGA) mechanism was proposed.Edge nodes were divided into multiple groups, each of which performed global updated asynchronously with the global model, while edge nodes within a group communicate with the parameter server through time-sharing communication.Theoretical analysis established a quantitative relationship between the convergence bound of FedGA and the data distribution among the groups.A time-sharing scheduling magic mirror method (MMM) was proposed to optimize the completion time of a single round of model updating within a group.Based on both the theoretical analysis for FedGA and MMM, an effective grouping algorithm was designed for minimizing the overall training completion time.Experimental results demonstrate that the proposed FedGA and MMM can reduce model training time by 30.1%~87.4% compared to the existing state-of-the-art methods.…”
    Get full text
    Article
  14. 11794

    Efficient revocable certificateless remote anonymous authentication protocol for wireless body area network by Shun ZHANG, Hongli FAN, Hong ZHONG, Miaomiao TIAN

    Published 2018-04-01
    “…To ensure the security and privacy of patients’ health data in wireless body area network (WBAN),communication parties must be mutual authenticated.Now some bilinear pairings led to a larger computation cost for users and tree structure revocation would lead to larger user storage cost.In order to achieve revocation and reduce the cost of the user side,a novel revocable certificate less remote anonymous authentication protocol for WBAN was proposed by using elliptic curve cryptography and revoke algorithm that could revoke users by updating their time-private-keys.Security requirements including anonymity,mutual authentication and session key establishment were satisfied in proposed scheme.Compared with the existing schemes,the experimental analysis shows that the computation cost and storage cost of the authentication protocol are greatly reduced,which is more suitable for resource-constrained WBAN.Security analysis also shows that the protocol is secure in the random oracle model.…”
    Get full text
    Article
  15. 11795

    ON CONCEPTUAL APPROACHES TO DIGITAL TRANSFORMATION OF THE NATIONAL ECONOMY OF BELARUS by D. M. Krupsky

    Published 2018-08-01
    “…Based on the world experience, an algorithm for organizing the digital transformation of the Belarusian economy has been formed, taking into account the existing institutional environment.…”
    Get full text
    Article
  16. 11796

    RESEARCH ON ACOUSTIC RADIATION CHARACTRRISTICS OF PERIODIC PERFORATED DAMPING SANDWICH PLATE by ZHOU JingDong, WEN Yao, CHEN Yuan, LIU MingYong, LIU Yang

    Published 2015-01-01
    “…Base on the principle of damping reduction vibration and reference the periodic boundary conditions,through the acoustic bridge vibration energy transfer, this paper established a double-layer plate with the opening damping model;Considering the frequency-dependent properties of viscoelastic,through the finite element and boundary element numerical algorithm of calculating the radiation sound power,analyzes the periodic perforated damped sandwich plate structure acoustic radiation characteristics. …”
    Get full text
    Article
  17. 11797

    RESEARCH ON PARAMETRIC ANALYSIS AND MULTI-OBJECTIVE OPTIMIZATION OF CYLINDRICAL PRESSURE STRUCTURE by LIU Feng, TU ChaoHua, ZHAO YanKai

    Published 2021-01-01
    “…In order to improve the design efficiency and performance of the cylindrical pressure structure,strength and stability analysis methods were determined,the initial scheme was analyzed. the second development of Abaqus software was carried out by using Python language,Abaqus was integrated with i Sight software,the parametric analysis flow of pressure structure was designed,could realize automatic modeling and analysis of cylindrical pressure structure. the most Latin hypercube method was used to selectting the sample points,the sensitivity analysis of the design variables were carried out,The comparison of the fitting accuracy shown that the response surface model had the highest accuracy,the approximate model of the cylindrical pressure structure based on the fourth-order response surface was obtained. the multi-objective optimization model was established,The second generation of non dominated sorting genetic algorithm was used to solving the multi-objective optimization problem,the results shown that the weight of the optimization scheme was reduced,while the ultimate strength was greatly improved,improved the performance of the cylindrical pressure structure.…”
    Get full text
    Article
  18. 11798

    An Analytical Optimisation Framework for Airport Terminal Capacity Expansion by Sultan Alodhaibi, Robert L. Burdett, Prasad K. D. V. Yarlagadda

    Published 2020-01-01
    “…As this model is stochastic and nonlinear, a Simulated Annealing (SA) metaheuristic was implemented and tested. The SA algorithm repeatedly perturbs a resource allocation solution using one of two methods. …”
    Get full text
    Article
  19. 11799

    “FLIPPED CLASSROOM” METHOD WITH BYOD-TECHNOLOGY APPLICATION AS A TOOL TO DEVELOP COMMUNICATION SKILLS IN TEACHING FOREIGN LANGUAGES by M. G. MININ, O. I. SHAYKINA

    Published 2018-02-01
    “…The authors define an algorithm of login process and management of online resource tools, reveal and reason efficiency criteria and corresponding indicators of the approach application. …”
    Get full text
    Article
  20. 11800

    Flexible Modeling and Simulation Study for Two Speed Transmission of Electric Vehicle by Suqin Dou

    Published 2019-04-01
    “…The dynamics optimization of input axis is carried out by modal analysis and zero order optimization algorithm, and then dynamic stability of the transmission system is enhanced effectively. …”
    Get full text
    Article