Showing 14,041 - 14,060 results of 19,511 for search '"algorithm"', query time: 0.10s Refine Results
  1. 14041

    A Deep Learning Based Traffic State Estimation Method for Mixed Traffic Flow Environment by Fan Ding, Yongyi Zhang, Rui Chen, Zhanwen Liu, Huachun Tan

    Published 2022-01-01
    “…This article presents a traffic state estimation method based on a deep learning algorithm under a low and dynamic CVs penetration rate environment. …”
    Get full text
    Article
  2. 14042

    C-BERT: A Mongolian reverse dictionary based on fused lexical semantic clustering and BERT by Amuguleng Wang, Yilagui Qi, Dahu Baiyila

    Published 2025-01-01
    “…Initially, the K-means algorithm was used to cluster preprocessed entries from well-known Mongolian dictionaries into 5000 clusters, forming a comprehensive training set. …”
    Get full text
    Article
  3. 14043

    Kinetics of Austenite Formation in a Medium-Carbon, Low-Alloy Steel with an Initial Martensite Microstructure: Influence of Prior Austenite Grain Size by Navneeth Rajakrishnan, Morteza Sadeghifar, Pinaki Bhattacharjee, Henri Champliaud, Mohammad Jahazi

    Published 2025-01-01
    “…The differences in austenite formation kinetics as a function of prior austenite grain size were quantified and modeled in the framework of diffusion-controlled nucleation and growth theories using the genetic algorithm optimization.…”
    Get full text
    Article
  4. 14044

    MARKETING RESEARCH IN THE FIELD OF PUBLIC ADMINISTRATION by Viktor Sychenko, Olha Kudyrko

    Published 2024-12-01
    “…The data collection algorithm was summarized and the analysis of the main elements of the marketing research process for the field of public administration was carried out, in particular, the question of qualitative research methods, which can be used when collecting primary information from respondents, was investigated in detail. …”
    Get full text
    Article
  5. 14045

    Machine vision model for drip leakage detection of pipeline. by Cong Xiao, Yiyuan Zhou, Yanwen Wu, Guodong Zhang

    Published 2025-01-01
    “…The droplet boundary extraction algorithm is proposed, and the three-dimensional model of the target droplet is established, so the volume calculation problem of the droplet is solved, which provides a way of thinking for drip leakage detection of the pipeline.…”
    Get full text
    Article
  6. 14046

    Automated speech therapy through personalized pronunciation correction using reinforcement learning and large language models by Ritika Lakshminarayanan, Ayesha Shaik, Ananthakrishnan Balasundaram

    Published 2025-03-01
    “…The system employs a custom Proximal Policy Optimization (PPO) algorithm for precise pronunciation evaluation and an Large Language Models to deliver detailed, encouraging, and user-specific feedback. …”
    Get full text
    Article
  7. 14047

    Back Analysis of Rock Hydraulic Fracturing by Coupling Numerical Model and Computational Intelligent Technology by Shaojun Li, Hongbo Zhao, Xiating Feng, Quan Jiang, Qiancheng Sun

    Published 2017-01-01
    “…The artificial bee colony algorithm is applied in back analysis to find the optimal in situ stress and elastic parameters. …”
    Get full text
    Article
  8. 14048

    Information Security Risk Management Model for Big Data by Min Yang

    Published 2022-01-01
    “…On the other hand, this research also optimizes and improves the fuzzy mathematical analysis method and proposes a fuzzy comprehensive assessment method as the core algorithm for the risk assessment layer in the model. …”
    Get full text
    Article
  9. 14049

    Importance Analysis of Causative Nodes for Accident Chains of Railway Locomotive Operation Based on STPA-PageRank Method by Ping WAN, Wei-Lun YANG, Jie-Wen LUO, Xiao-Feng MA

    Published 2025-02-01
    “…Then, the complex network theory and PageRank algorithm were utilised to calculate the importance of every node in directed-weighted network formed by those accident chains. …”
    Get full text
    Article
  10. 14050

    Cost-efficient behavioral modeling of antennas by means of global sensitivity analysis and dimensionality reduction by Slawomir Koziel, Anna Pietrenko-Dabrowska

    Published 2025-01-01
    “…Our methodology involves a rapid global sensitivity analysis (GSA) algorithm developed to determine a set of parameter space directions that maximize antenna response variability. …”
    Get full text
    Article
  11. 14051

    High Performance 3D PET Reconstruction Using Spherical Basis Functions on a Polar Grid by J. Cabello, J. E. Gillam, M. Rafecas

    Published 2012-01-01
    “…In this work, we have implemented the reconstruction algorithm using Graphical Processing Unit (GPU) technology for speed and a precomputed Monte-Carlo-calculated SRM for accuracy. …”
    Get full text
    Article
  12. 14052

    A multi-task genetic programming approach for online multi-objective container placement in heterogeneous cluster by Ruochen Liu, Haoyuan Lv, Ping Yang, Rongfang Wang

    Published 2024-11-01
    “…Comprehensive experiments show that the proposed algorithm can improve the resource utilization of clusters, reduce the number of physical machines, and effectively meet resource constraints and high availability requirements.…”
    Get full text
    Article
  13. 14053

    Detection of COVID-19 Using Protein Sequence Data via Machine Learning Classification Approach by Siti Aminah, Gianinna Ardaneswari, Mufarrido Husnah, Ghani Deori, Handi Bagus Prasetyo

    Published 2023-01-01
    “…To optimize performance, we employed machine learning classification algorithms such as K-nearest neighbor (KNN), XGBoost, and Naïve Bayes, along with feature selection techniques like genetic algorithm (GA), LASSO, and support vector machine recursive feature elimination (SVM-RFE). …”
    Get full text
    Article
  14. 14054

    Self-Organizing Mapping Neural Network Implementation Based on 3-D NAND Flash for Competitive Learning by Anyi Zhu, Lei Jin, Wen Zhou, Tianchun Ye, Zongliang Huo

    Published 2024-01-01
    “…Self-organizing Map (SOM) neural network is a prominent algorithm in unsupervised machine learning, which is widely used for data clustering, high-dimensional visualization, and feature extraction. …”
    Get full text
    Article
  15. 14055

    Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks by Saad Said Alqahtany, Asadullah Shaikh, Ali Alqazzaz

    Published 2025-01-01
    “…The selected features are evaluated by using the Random Forest (RF) algorithm to combine multiple decision trees and create an accurate result. …”
    Get full text
    Article
  16. 14056

    Iterative Learning Observer-Based High-Precision Motion Control for Repetitive Motion Tasks of Linear Motor-Driven Systems by Zhitai Liu, Xinghu Yu, Weiyang Lin, Juan J. Rodriguez-Andina

    Published 2024-01-01
    “…A recursive least squares (RLS) algorithm-based indirect adaptation strategy is used to achieve high-accuracy parameter estimation and model compensation. …”
    Get full text
    Article
  17. 14057

    Secure channel estimation model for cognitive radio network physical layer security using two-level shared key authentication by K. Saravanan, K. B. Gurumoorthy, Allwin Devaraj Stalin, Om Prakash Kumar

    Published 2025-01-01
    “…The change in channel capacity and utilization augments the need for security through 2-level key shared authentication. The deep learning algorithm verifies the authentication completeness for maximum channel capacity utilization irrespective of adversary interference. …”
    Get full text
    Article
  18. 14058

    Torque Prediction In Deep Hole Drilling: Artificial Neural Networks Versus Nonlinear Regression Model by Ngoc Hung- Chu, Hoai Nam- Nguyen, Van Du- Nguyen, Dang Binh- Nguyen

    Published 2025-12-01
    “…In this paper, we have developed a two-layer artificial neural network (ANN) model for training using the Levenberg-Marquardt algorithm to predict torque during deep drilling. Unlike many previous studies, this model uses hole depth as an input vector element instead of hole diameter. …”
    Get full text
    Article
  19. 14059

    FPGA-Based Implementation of All-Digital QPSK Carrier Recovery Loop Combining Costas Loop and Maximum Likelihood Frequency Estimator by Kaiyu Wang, Zhiming Song, Xianwei Qi, Qingxin Yan, Zhenan Tang

    Published 2014-01-01
    “…Besides, considering that, for MLFE, the accurate estimation of frequency offset is associated with the linear characteristic of its frequency discriminator (FD), the Coordinate Rotation Digital Computer (CORDIC) algorithm is introduced into the FD based on MLFE to unwrap linearly phase difference. …”
    Get full text
    Article
  20. 14060

    Memory consolidation from a reinforcement learning perspective by Jong Won Lee, Min Whan Jung, Min Whan Jung

    Published 2025-01-01
    “…This framework closely parallels Dyna, a reinforcement learning algorithm introduced by Sutton in 1991. In Dyna, an agent performs offline simulations to supplement trial-and-error value learning, greatly accelerating the learning process. …”
    Get full text
    Article