Showing 13,041 - 13,060 results of 19,511 for search '"algorithm"', query time: 0.10s Refine Results
  1. 13041

    Combined Damped Sinusoidal Oscillation Solutions to the (3 + 1)-D Variable-Coefficient Generalized NLW Equation in Liquid with Gas Bubbles by Xiuwang Wang, Jalil Manafian, Wayan Eka Mahendra, Azher M. Abed, Mustafa Z. Mahmoud, Guizhen Liang

    Published 2022-01-01
    “…Accordingly, we utilize a binary Bell polynomial transformation for reducing the Cole-Hopf algorithm to get the exact solutions of the VC generalized NLW equation. …”
    Get full text
    Article
  2. 13042

    Experimental and Mathematical Studies for Optimality of GTAW Parameters on Similar and Dissimilar Steel Substrates by Bandaru Kiran, Dega Nagaraju, Senthil Kumaran Selvaraj, Baye Molla

    Published 2022-01-01
    “…Furthermore, tensile tests are carried out for the weldments with optimal predefined weld parameters, and subsequently, the welded specimens with better tensile strength are discussed in the results. Genetic algorithm and mathematical modelling are opted for selecting the final optimal welding parameters. …”
    Get full text
    Article
  3. 13043

    Key public verifiable MA-CP-ABE scheme based on aggregatable PVSS and consortium blockchain by JING Xu, JIANG Yan

    Published 2024-08-01
    “…An aggregatable PVSS algorithm was improved based on ElGamal, which enabled the public verifiability of the system master key distribution. …”
    Get full text
    Article
  4. 13044

    Cost-benefit analysis in demand response with penalty and grid management using blockchain by Manikandan Ramasamy, Thenmalar Kaliannan, Saravanakumar Ramasamy

    Published 2025-01-01
    “…Two distinct optimization methods such as the gray wolf optimization algorithm and particle swarm optimization are employed to solve the optimization model. …”
    Get full text
    Article
  5. 13045

    Bearing fault diagnosis method based on improved compressed sensing and deep multi-kernel extreme learning machine by FU Qiang, HU Dong, YANG Tongliang, LUO Guoqing, TAN Weimin

    Published 2024-01-01
    “…Particle swarm optimization(PSO) algorithm was applied to optimize critical parameters, enabling intelligent fault diagnosis.ResultsResults demonstrate that the proposed method, using only a small amount of bearing diagnostic data, automatically extracts feature information of bearings from a limited number of measurement signals through the D-MKELM. …”
    Get full text
    Article
  6. 13046

    Research on Runoff Simulation of Arid Oasis Irrigation Area Based on SWAT Model by JIANG Mengyao, WANG Shuixian, ZHAO Zhigang

    Published 2021-01-01
    “…In order to study the runoff changes in the arid oasis irrigation area,this paper constructs a distributed hydrological model of Yanqi Basin based on SWAT model with the Chinese meteorological assimilation driving datasets (CMADS) from 1955 to 2017,traditional hydrometeorological station data,land use data,soil data,digital elevation data,analyzes the sensitivity of parameters by SUFI-2 (Sequential Uncertainty Fitting) algorithm,calibrates several important parameters influencing runoff simulation results through SWAT-CUP (SWAT Calibration Uncertainty Procedures) software,and verifies the model by the measured runoff from 1991 to 2017.The results show that:the simulated runoff of Yanqi Basin in Xinjiang for a long time scales coincides with the measured runoff.During the calibration period and verification period,the Nash coefficient (NES) is above 0.82,the Pearson correlation coefficient (R<sup>2</sup>) is 0.86 and 0.90 respectively,and the relative error (R<sub>e</sub>) is less than 10.Therefore,SWAT model is well applicable to the runoff simulation of Yanqi Basin.Based on this,runoff changes from 2016 to 2100 in Yanqi Basin under the scenarios of RCP4.5 and RCP8.5 are simulated.It can be found that precipitation changes in Kaidu River basin have a significant impact on runoff in Yanqi Basin,that is,when precipitation increases by 20% and temperature increases by 2°C,the runoff increases by 26.53% compared with the current year.…”
    Get full text
    Article
  7. 13047

    Spectral Analysis of Large Finite Element Problems by Optimization Methods by Luca Bergamaschi, Giuseppe Gambolati, Giorgio Pini

    Published 1994-01-01
    “…Numerical results point out that the optimal βk leads to a very cost effective algorithm in terms of CPU time in all the sample problems presented. …”
    Get full text
    Article
  8. 13048

    Enhanced bearing RUL prediction based on dynamic temporal attention and mixed MLP by Zhongtian Jin, Chong Chen, Aris Syntetos, Ying Liu

    Published 2025-01-01
    “…An experimental study using the XJTU-SY rolling bearings dataset and the PRONOSTIA bearing dataset revealed that the proposed deep learning algorithm significantly outperforms other state-of-the-art algorithms in terms of RMSE and MAE, demonstrating its robustness and accuracy.…”
    Get full text
    Article
  9. 13049

    Scheme on user identity attribute preserving based on ring signcryption for cloud computing by Shuan-bao LI, Jian-ming FU, Huan-guo ZHANG, Jing CHEN, Jing WANG, Bi-jun REN

    Published 2014-09-01
    “…Identity attribute leak as the most severe security threat of cloud computing,in order to solve this problem,a protection scheme of identity attributes based on ring signcryption was proposed.Focused on digital identity management in cloud service,which discusses user key parting management with decentralization.Users can choose some seeds for generation and storage of key,then integrated user key cannot be acquired by registrar,based on this payload on certifica-tion management is reduced.In addition,access-centric blindness ring signcryption verification for identity attribute is designed,which constitutes ring of users and CSP,combined with own attribute users can accomplish ring-oriented sub-linear blindness signcryption and non-interactive public ciphertext verifiability for messages so that integrity and confidentiality of identity attribute can be protected avoiding identity attribute leakage in collusion of multi-CSP.At last,strong blindness and unforgeability of ciphertext and attribute is proved in proposed model,three private key components can be generated by users and identity forgeability of ring member can be prevented successfully on the condition of DBDH difficult assumption and adaptive chosen-ciphertex tattacking.Effectiveness of proposed mechanism is verified via performance evaluation of blindness ring signcryption algorithm based on comprehensive payload in identity attribute protection,and optimization is confirmed compared with similar algorithms.…”
    Get full text
    Article
  10. 13050

    Multi-detector computer tomography as effective method for Crohn's disease diagnostics by A. A. Tikhonov, A. V. Gorinov, I. V. Zarodnyuk, I. L. Khalif, Ye. S. Korolevsky

    Published 2015-05-01
    “…Thus, CT-enterography technique of can be regarded either as alternative to X-ray investigation of the small intestine at CD diagnostics or important addition to diagnostic algorithm for this group of patients.…”
    Get full text
    Article
  11. 13051

    Research on equipment layout of multi-layer circular manufacturing cell based on NSGA III. by Yanlin Zhao

    Published 2024-01-01
    “…Existing literature predominantly utilizes the NSGA II algorithm for SCMC layouts due to their relatively few objectives. …”
    Get full text
    Article
  12. 13052

    Optimal robust sizing of distributed energy storage considering power quality management by Ying Zhu, Juan Wei, Bozhong Wang, Shiyu Hong, Yutong Liu, Liang Lu

    Published 2024-12-01
    “…The column and constraint generation (C&CG) algorithm is applied for efficient handling of this model. …”
    Get full text
    Article
  13. 13053

    Robust machine learning based Intrusion detection system using simple statistical techniques in feature selection by Sunil Kaushik, Akashdeep Bhardwaj, Ahmad Almogren, Salil bharany, Ayman Altameem, Ateeq Ur Rehman, Seada Hussen, Habib Hamam

    Published 2025-02-01
    “…In order to address this issue, this study presents a unique feature selection algorithm based on basic statistical methods and a lightweight intrusion detection system. …”
    Get full text
    Article
  14. 13054

    A Short-Term Load Forecasting Model of LSTM Neural Network considering Demand Response by Xifeng Guo, Qiannan Zhao, Shoujin Wang, Dan Shan, Wei Gong

    Published 2021-01-01
    “…Secondly, an improved genetic algorithm (IGA) is used to obtain the best LSTM parameters; finally, the special gate structure of the LSTM model is used to selectively control the influence of input variables on the model parameters and perform load forecasting. …”
    Get full text
    Article
  15. 13055

    Development of Bio-Machine Based on the Plant Response to External Stimuli by K. Aditya, Ganesha Udupa, Yongkwun Lee

    Published 2011-01-01
    “…The modulated signals are used for providing information to the microcontroller’s algorithm for working of the bio-machine. The changes of frequency of action potentials in plant are studied. …”
    Get full text
    Article
  16. 13056

    Aerodynamic Optimization of a UAV Wing subject to Weight, Geometric, Root Bending Moment, and Performance Constraints by Durmuş Sinan Körpe, Öztürk Özdemir Kanat

    Published 2019-01-01
    “…The sequential quadratic programming algorithm of the MATLAB optimization toolbox is used for the solution of the constrained optimization problems. …”
    Get full text
    Article
  17. 13057

    MALT-lymphoma of the stomach: clinical presentation, diagnostics and treatment by Ye. V. Ledin, A. P. Seryakov, V. L. Astashov

    Published 2011-02-01
    “…Basing on obtained data, original treatment algorithm was developed, which is proposed to application in clinical practice to provide optimal amount of medical care to the patient.Conclusion. …”
    Get full text
    Article
  18. 13058

    ANTi-JAM solutions for smart roads: Ant-inspired traffic flow rules under CAVs environment by Marco Guerrieri, Nicola Pugno

    Published 2025-01-01
    “…The macroscopic traffic flow variables of interest were estimated using the deep learning method and the YOLO detection algorithm. The results show that ants adopt specific traffic strategies (platoon formation, quasi-constant speed and no overtaking maneuvers) that help avoid jam phenomena, even at high density. …”
    Get full text
    Article
  19. 13059

    Laminar Wall Jet Flow and Heat Transfer over a Shallow Cavity by P. Maheandera Prabu, K. P. Padmanaban

    Published 2015-01-01
    “…For higher accuracy, third-order discretization is applied for momentum equation which is solved using QUICK scheme with SIMPLE algorithm for pressure-velocity coupling. Low Reynolds numbers 25, 50, 100, 200, 400, and 600 are assigned for simulation. …”
    Get full text
    Article
  20. 13060

    Numerical analysis and optimization of crashworthiness of bionic hierarchical thin-walled square tubes by XU Fei, QIN RuiXian, CHEN BingZhi

    Published 2024-06-01
    “…The radial basis function (RBF) model and the genetic algorithm were used for the multi-objective optimization of the BHST4-2 structure, and optimal al parameters of the structure were obtained. …”
    Get full text
    Article