Showing 13,661 - 13,680 results of 19,511 for search '"algorithm"', query time: 0.11s Refine Results
  1. 13661

    Rao-Blackwellized Gaussian Sum Particle Filtering for Multipath Assisted Positioning by Markus Ulmschneider, Christian Gentner, Thomas Jost, Armin Dammann

    Published 2018-01-01
    “…In this paper, we present and derive a novel filtering approach for our multipath assisted positioning algorithm called Channel-SLAM. Making use of Rao-Blackwellization, the location of a user is tracked by a particle filter, and each landmark is represented by a sum of Gaussian probability density functions, whose parameters are estimated by unscented Kalman filters. …”
    Get full text
    Article
  2. 13662

    Power Load Event Detection and Classification Based on Edge Symbol Analysis and Support Vector Machine by Lei Jiang, Jiaming Li, Suhuai Luo, Sam West, Glenn Platt

    Published 2012-01-01
    “…In power load event detection, the paper presents a new transient detection algorithm. By turn-on and turn-off transient waveforms analysis, it can accurately detect the edge point when a device is switched on or switched off. …”
    Get full text
    Article
  3. 13663

    A New Variable Exponential Power Reaching Law of Complementary Terminal Sliding Mode Control by Feng Xu, Na An, Jianlin Mao, Shubo Yang

    Published 2020-01-01
    “…In this article, a new nonlinear algorithm based on the sliding mode control is developed for the ball and plate control system to improve dynamic response and steady-state tracking accuracy of the control system. …”
    Get full text
    Article
  4. 13664

    An Extendable Gaussian Mixture Model for Lane-Based Queue Length Estimation Based on License Plate Recognition Data by Chaofeng Tan, Hao Wu, Keshuang Tang, Chaopeng Tan

    Published 2022-01-01
    “…Then, the two-dimensional Gaussian distributions of queued vehicles and nonqueued vehicles were fitted, and the expectation-maximization algorithm was adopted to solve the distribution parameters. …”
    Get full text
    Article
  5. 13665

    Privacy Auditing in Differential Private Machine Learning: The Current Trends by Ivars Namatevs, Kaspars Sudars, Arturs Nikulins, Kaspars Ozols

    Published 2025-01-01
    “…While the definition of differential privacy makes it possible to provably limit the amount of information leaked by an algorithm, practical implementations of differentially private algorithms often contain subtle vulnerabilities. …”
    Get full text
    Article
  6. 13666

    Adaptive mobile application for the CATS learning system by Y. V. Popova, I. V. Lehchylin

    Published 2020-05-01
    “…The proposed adaptability algorithm will allow you to create a unique training program that will build on existing knowledge and the level of perception of learning material for students. …”
    Get full text
    Article
  7. 13667

    Immunomodulatory insights of monoterpene glycosides in endometriosis: immune infiltration and target pathways analysis by Jin Zhan, Jiajie Wu

    Published 2025-01-01
    “…This study aims to explore the immunomodulatory effects of monoterpene glycosides from Paeonia lactiflora on endometriosis. Using the ssGSEA algorithm, we assessed immune cell infiltration levels between normal and endometriosis groups. …”
    Get full text
    Article
  8. 13668

    Discrete-Time Event-Triggered Control of Nonlinear Wireless Networked Control Systems by Songlin Hu, Dong Yue, Min Shi, Xiangpeng Xie

    Published 2014-01-01
    “…., a soft computation algorithm) under consideration is that the current sensor data is transmitted only when the current sensor data and the previously transmitted one satisfy a certain state-dependent trigger condition. …”
    Get full text
    Article
  9. 13669

    Explainable Artificial Intelligence (XAI) to Enhance Trust Management in Intrusion Detection Systems Using Decision Tree Model by Basim Mahbooba, Mohan Timilsina, Radhya Sahal, Martin Serrano

    Published 2021-01-01
    “…The previous studies focused more on the accuracy of the various classification algorithms for trust in IDS. They do not often provide insights into their behavior and reasoning provided by the sophisticated algorithm. …”
    Get full text
    Article
  10. 13670

    End-to-End Methodology for Predictive Maintenance Based on Fingerprint Routines and Anomaly Detection for Machine Tool Rotary Components by Amaia Arregi, Aitor Barrutia, Iñigo Bediaga

    Published 2025-01-01
    “…These features are then introduced to an anomaly and paradigm shifts detection algorithm. The method is evaluated through three distinct scenarios. …”
    Get full text
    Article
  11. 13671

    Optimal Speech Signal Processing Based on Dynamic Multi-Scale Analysis by Zefei Guo, Xiao Li, Yuchen Zhang

    Published 2025-01-01
    “…Finally, the method is further enhanced through the adaptive error minimization algorithm, leading to a more pronounced noise reduction effect. …”
    Get full text
    Article
  12. 13672

    Rapid Driving Style Recognition in Car-Following Using Machine Learning and Vehicle Trajectory Data by Qingwen Xue, Ke Wang, Jian John Lu, Yujie Liu

    Published 2019-01-01
    “…The driving style of each driver in training data is labelled based on their collision risk level using K-mean algorithm. Then, the driving style recognition model’s inputs are extracted from vehicle trajectory features, including acceleration, relative speed, and relative distance, using Discrete Fourier Transform (DFT), Discrete Wavelet Transform (DWT), and statistical method to facilitate the driving style recognition. …”
    Get full text
    Article
  13. 13673

    Non-contact lensless holographic reconstruction of diffractive intraocular lenses profiles by Rosa Vila-Andrés, Anabel Martínez-Espert, Walter D. Furlan, José J. Esteve-Taboada, Vicente Micó

    Published 2025-01-01
    “…Besides, a study evaluating the convergence and robustness of the proposed iterative phase-retrieval routine based on a modified classical Gerchberg-Saxton algorithm is performed. These results provide experimental validation of the proposed technique for accurately measuring the optical profiles of MIOLs.…”
    Get full text
    Article
  14. 13674

    Preparation of objects for the examination of narcotic drugs, psychotropic substances, their analogues and precursors: a case study approach by S. M. Lozova, S. I. Perlin

    Published 2023-07-01
    “…It is proposed to involve specialists of various fields (criminalist, botanist, agronomist) in conducting investigative (“detective”) actions. An algorithm of actions for seizure, packaging and storage of objects has been developed depending on the identified typical situations: detection of illegal crops; detection of drug laboratories/drug houses; detection of “bookmarks” or detention of a person during an operational purchase. …”
    Get full text
    Article
  15. 13675

    Critical import insurance as a tool to support entrepreneurs under sanctions by А. V. Averin, A. F. Baranova, A. M. Kutyrev

    Published 2023-09-01
    “…The necessity of state support of insurance of advance payments for imports of critical goods has been assessed and the algorithm of state support of advance payments insurance for critical goods imports described. …”
    Get full text
    Article
  16. 13676

    Transmit Waveform Optimization for Spatial-Frequency Diversity MIMO Radar in the Presence of Clutter by Yonghao Tang, Xiaofeng Ma, Weixing Sheng, Yubing Han

    Published 2014-01-01
    “…Inspired by the MIMO communication system, the water-filling algorithm is introduced into the transmitted energy allocation problem for each carrier frequency channel. …”
    Get full text
    Article
  17. 13677

    A Power-Efficient Soft-Output Detector for Spatial-Multiplexing MIMO Communications by Hsiao-Chi Wang, Tung-Lin Liu, Yuan-Wei Wu, Hsi-Pin Ma

    Published 2012-01-01
    “…A novel tree search algorithm is proposed to enable the detector to provide soft outputs and to be implemented in parallel and pipelined hardware architecture. …”
    Get full text
    Article
  18. 13678

    An ORESTE approach based decision-making framework for renewable energy development with probabilistic dual hesitant fuzzy information by Soniya Gupta, Natasha Awasthi, Dheeraj Joshi

    Published 2025-03-01
    “…The aim of this paper is to develop the French Organization Rangement Et Synthese De Ronnees Relationnelles’ (ORESTE) approach for ranking the renewable energy plant under probabilistic dual hesitant fuzzy environment. First, an algorithm has been developed to normalize the Probabilistic Dual Hesitant Fuzzy Element (PDHFE). …”
    Get full text
    Article
  19. 13679

    Temperature Control of Quartz-Glass Melting Areas in Laser Additive Manufacturing by Jing Chen, Zeping Lv, Xuanjia Zhang, Tao Xu, Yuntao Cheng

    Published 2024-12-01
    “…It was based on a PID (proportional–integral–derivative) control algorithm for adjusting laser power. Changes in the macroscopic morphology, microstructure, and other qualities of the final additive result before and after the temperature control of the quartz glass were examined. …”
    Get full text
    Article
  20. 13680

    Fungal Infection following Total Elbow Arthroplasty by Samuel S. Ornell, Khang H. Dang, Aaron J. Bois, Anil K. Dutta

    Published 2019-01-01
    “…The purpose of this report is to describe our experience and outline our treatment algorithm for a rare case of prosthetic joint infection (PJI) following a TEA. …”
    Get full text
    Article