Showing 12,701 - 12,720 results of 19,511 for search '"algorithm"', query time: 0.10s Refine Results
  1. 12701

    Applications of Generalized Cascade Scattering Matrix on the Microwave Circuits and Antenna Arrays by Shun-Feng Cao, Yong-Chang Jiao, Zheng Zhang

    Published 2015-01-01
    “…By inserting the ILSRNs, the complex interconnections can be converted into the standard one-by-one case without changing the characteristics of the previous microwave networks. Based on the algorithm of the generalized cascade scattering matrix, a useful derivation on the excitation coefficients of antenna arrays is firstly proposed with consideration of the coupling effects. …”
    Get full text
    Article
  2. 12702

    Prototype System for Supporting Medical Diagnosis Based on Voice Interviewing by Artur Samojluk, Piotr Artiemjew

    Published 2025-01-01
    “…An analysis of data mining and selected machine learning methods was carried out to develop an effective diagnosis algorithm. The system is designed to optimise patient care by automating the initial phase of the medical interview, which can lead to a reduction in errors due to subjective assessments and reduce the workload on doctors. …”
    Get full text
    Article
  3. 12703

    Multiframe maximum a posteriori estimators for single‐microphone speech enhancement by Raziyeh Ranjbaryan, Hamid Reza Abutalebi

    Published 2021-09-01
    “…In a noise‐reduction algorithm, all available information of recorded signals should be optimally utilized in the estimation process. …”
    Get full text
    Article
  4. 12704

    Multi-frame blind deconvolution using X-ray microscope images of an in-plane rotating sample by Shinnosuke Kurimoto, Takato Inoue, Hitoshi Aoto, Toshiki Ito, Satsuki Ito, Yoshiki Kohmura, Makina Yabashi, Satoshi Matsuyama

    Published 2024-11-01
    “…Untrained neural networks are employed as the reconstruction algorithm to enable robust reconstruction against stage motion errors caused by the in-plane rotation of samples. …”
    Get full text
    Article
  5. 12705

    Persevering Routing Technique Based on Event Occurrence Patterns for Wireless Sensor Networks by Majid Rafigh, Maghsoud Abbaspour

    Published 2012-05-01
    “…This paper proposes a new routing algorithm schema based on event occurrence history to secure K-Coverage of event paths and maintain the maximum degree of coverage. …”
    Get full text
    Article
  6. 12706

    Achieving Fair Spectrum Allocation and Reduced Spectrum Handoff in Wireless Sensor Networks: Modeling via Biobjective Optimization by Sang-Seon Byun, Kimmo Kansanen, Ilangko Balasingham, Joon-Min Gil

    Published 2014-01-01
    “…The results obtained from the numerical experiments show that, by adjusting the weight on each objective function, the proposed algorithm allocates spectrum bands fairly with well observing each sensor’s priority and reduced spectrum handoffs.…”
    Get full text
    Article
  7. 12707

    Acoustic analysis using symmetrised implicit midpoint rule by N. Razali, N.B. Masnoor, S. Abdullah, M.F.H.M. Zainaphi

    Published 2022-07-01
    “…Thus, this paper aims to analyse the dissipation, dispersion, accuracy, and stability of the Runge�Kutta method and derive a new scheme and algorithm that preserves the symmetry property. The symmetrised method is introduced in the time-of-finite-difference method for solving problems in aeroacoustics. …”
    Get full text
    Article
  8. 12708

    Honeypot contract detection method for Ethereum based on source code structure and graph attention network by Youwei WANG, Yudong HOU, Lizhou FENG

    Published 2023-09-01
    “…To address the problems of low accuracy and poor generalization of current honeypot contract detection methods, a honeypot contract detection method for Ethereum based on source code structure and graph attention network was proposed.Firstly, in order to extract the structural information of the Solidity source code of the smart contract, the source code was parsed and converted into an XML parsing tree.Then, a set of feature words that could express the structural and content characteristics of the contract was selected, and the contract source code structure graph was constructed.Finally, in order to avoid the impact of dataset imbalance, the concepts of teacher model and student model were introduced based on the ensemble learning theory.Moreover, the graph attention network model was trained from the global and local perspectives, respectively, and the outputs of all models were fused to obtain the final contract detection result.The experiments demonstrate that CSGDetector has higher honeypot detection capability than the existing method KOLSTM, with increments of 1.27% and 7.21% on F<sub>1</sub> measurement in two-class classification and multi-class classification experiments, respectively.When comparing with the existing method XGB, the average recall rate of CSGDetector in the masked honeypot detection experiments for different types of honeypot contracts is improved by 7.57%, which verifies the effectiveness of the method in improving the generalization performance of the algorithm.…”
    Get full text
    Article
  9. 12709

    Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid by Jianwei CHEN, Shuyu WANG, Meiping ZHANG, Zhenping ZHANG

    Published 2024-01-01
    “…Aiming at the problem that how to support lightweight multi-dimensional data aggregation, achieve double-end integrity verification of multi-dimensional data in the overall process of the system, and deal with the centralization of cloud servers, a blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid was proposed.Firstly, in order to meet the demand for fine-grained analysis of power data in smart grid, privacy-preserving multidimensional data aggregation was achieved by using masked values and Horner’s rule.On this basis, for the data integrity verification problem of the existing data aggregation scheme in the sharing of cloud storage data with the third party, a new signature algorithm was designed by borrowing the RSA-based multiplicative homomorphic commitment scheme and homomorphic hash function homomorphism, which enabled the cloud server to verify the integrity of aggregated data and be used for integrity verification in the data sharing phase, i.e., it achieved double-end verifiability of cloud storage data and was resistant to internal attacks.Meanwhile, an aggregated data sharing architecture based on federated chain multichain was proposed to effectively avoid centralisation problems such as single-machine processing bottleneck and vulnerability to attacks.The theoretical analysis proves the security of the scheme.Performance experiments show that the proposed scheme has lower computation and communication costs compared with existing schemes.…”
    Get full text
    Article
  10. 12710

    The intelligent selenium-enriched tea withering control system by Shuang Ren, Sanjun Liu, Jinzhao Fan, Didi Lu

    Published 2025-01-01
    “…Application results show that the system operates stably, accurately measures temperature and humidity in the withering environment, and achieves a control precision of $$\pm 1$$ % through a fuzzy control algorithm. It effectively meets the needs of tea processing in Enshi Prefecture. …”
    Get full text
    Article
  11. 12711

    A Timetable Optimization Model for Urban Rail Transit with Express/Local Mode by Renjie Zhang, Shisong Yin, Mao Ye, Zhiqiang Yang, Shanglu He

    Published 2021-01-01
    “…In this study, a timetable optimization model is proposed by minimizing the total passenger waiting time at platforms. Further, a genetic algorithm is used to solve the minimization problems in the model. …”
    Get full text
    Article
  12. 12712

    LIGHTWEIGHT OF THE VEHICLE B PILLAR BASED ON SIX SIGMA ROBUST DESIGN UNDER SIDE IMPACT by QIU RuiBin, CHEN Yuan, LEI Fei, YANG ShaoYong, LI YongJun

    Published 2016-01-01
    “…In this paper,by considering uncertainty factors,taking side impact of a car as an example,first of all,an accurate finite element model is established and verified according to relevant crash regulations,then,after building an approximate model and a deterministic optimization model,the optimal solution is obtained by sequential quadratic programming algorithm and the reliability analysis is used,finally the original vehicle B pillar is accomplished lightweight research and improvement by using six sigma robust design method. …”
    Get full text
    Article
  13. 12713

    A Study on Zone-Based Secure Multicast Protocol Technique to Improve Security Performance and Stability in Mobile Ad-Hoc Network by Hwanseok Yang

    Published 2025-01-01
    “…In this paper, we propose a zone-based secure routing algorithm to improve the performance of routing protocols. …”
    Get full text
    Article
  14. 12714

    Theory and Application of Interval-Valued Neutrosophic Line Graphs by Keneni Abera Tola, V. N. Srinivasa Rao Repalle, Mamo Abebe Ashebo

    Published 2024-01-01
    “…Finally, an overview of the algorithm used to solve the problems and the practical application of the introduced graphs were provided.…”
    Get full text
    Article
  15. 12715

    Congestion avoidance in 6G networks with V Gradient Geocast Routing Protocol by Arundhati Sahoo, Asis Kumar Tripathy

    Published 2025-01-01
    “…This will be realized using highly technical approaches such as the mini-batch gradient descent optimization algorithm for network optimization and the V Gradient Geocast Routing Protocol for effective routing. …”
    Get full text
    Article
  16. 12716

    Detection of Degradation Effects in Field-Aged c-Si Solar Cells through IR Thermography and Digital Image Processing by E. Kaplani

    Published 2012-01-01
    “…I-V curve analysis results showed an agreement between the source of electrical performance degradation and the degradation effects in the defected cell identified by the IR thermography. Finally, an algorithm was developed to automatically detect EVA discoloration in PV cells through processing of the digital image alone in a way closely imitating human perception of color. …”
    Get full text
    Article
  17. 12717

    Virtual Scoping: lightweight and scalable TSN time synchronization accuracy measurement method by SUN Yinhan, SUN Zhigang, FU Wenwen, LI Wenchao, HUANG Rong

    Published 2024-09-01
    “…As an example of accuracy optimization, a frequency offset compensation algorithm based on V-Scope is designed and implemented, which improves the synchronization accuracy of the prototype system by 32.3%.…”
    Get full text
    Article
  18. 12718

    Research on the Combination Optimization Method of Aircraft Climb Parameters Considering the Influence of Pollution Emissions by Wang Na, Wei Zhiqiang, Han Xiaolan

    Published 2022-01-01
    “…Next, we establish a combined optimization model of indicated airspeed and thrust using the genetic algorithm. The model simulation and result analysis are carried out using a wide-body aircraft. …”
    Get full text
    Article
  19. 12719

    Bearing Feature Extraction Method Based on the Time Subsequence by Wang Dexue, Nie Fei, Zheng Zhifei, Yu Yongsheng

    Published 2023-11-01
    “…Then, the random forest algorithm is used to count the class votes of all subsequences in each time series, and a dictionary is constructed based on the class votes. …”
    Get full text
    Article
  20. 12720

    Application Research of Intelligent Classification Technology in Enterprise Data Classification and Gradation System by Lina Yu, Chunwei Wang, Huixian Chang, Sheng Shen, Fang Hou, Yingwei Li

    Published 2020-01-01
    “…At the same time, the differences, advantages, and disadvantages of K-NN (K-Nearest Neighbors), DT (Decision Tree), and LinearSVC algorithms are compared. The experimental data shows that LinearSVC algorithm is applicable to high-dimensional data, with discrete, sparse data features and large number of features, which is more suitable for classification of sensitive data of enterprises.…”
    Get full text
    Article