Showing 14,101 - 14,120 results of 19,511 for search '"algorithm"', query time: 0.11s Refine Results
  1. 14101

    Influencing Factors and Clustering Characteristics of COVID-19: A Global Analysis by Tianlong Zheng, Chunli Zhang, Yueting Shi, Debao Chen, Sheng Liu

    Published 2022-12-01
    “…In addition, the epidemic clustering characteristics were analyzed through the spectral clustering algorithm. The visualization results of spectral clustering showed that the geographical distribution of global COVID-19 pandemic spread formation was highly clustered, and its clustering characteristics and influencing factors also exhibited some consistency in distribution. …”
    Get full text
    Article
  2. 14102

    Features of interrogation of minors who are victims of violence by N. E. Miloradova, N. A. Pashko

    Published 2020-06-01
    “…The author has analyzed the algorithm of interrogation of a child based on the use of the following formula: “safe place + safe adult = safe child”; has provided recommendations to take into account the psychological and organizational features of different phases of the child’s interviewing; formulation of questions for minors who are victims of violence according to age and their psycho-emotional state. …”
    Get full text
    Article
  3. 14103

    Optimal Design of Bus Stop Locations Integrating Continuum Approximation and Discrete Models by Xiaoling Luo, Wenbo Fan, Yangsheng Jiang, Jun Zhang

    Published 2020-01-01
    “…Then, the stop location problem is formulated into a multivariable nonlinear minimization problem with a given number of stop location variables and location constraint. The interior-point algorithm is presented to find the optimal design that is ready for implementation. …”
    Get full text
    Article
  4. 14104

    Block level cloud data deduplication scheme based on attribute encryption by Wenting GE, Weihai LI, Nenghai YU

    Published 2023-10-01
    “…Due to the existing cloud data deduplication schemes mainly focus on file-level deduplication.A scheme was proposed, based on attribute encryption, to support data block-level weight removal.Double granularity weight removal was performed for both file-level and data block-level, and data sharing was achieved through attribute encryption.The algorithm was designed on the hybrid cloud architecture Repeatability detection and consistency detection were conducted by the private cloud based on file labels and data block labels.A Merkle tree was established based on block-level labels to support user ownership proof.When a user uploaded the cipher text, the private cloud utilized linear secret sharing technology to add access structures and auxiliary information to the cipher text.It also updated the overall cipher text information for new users with permissions.The private cloud served as a proxy for re-encryption and proxy decryption, undertaking most of the calculation when the plaintext cannot be obtained, thereby reducing the computing overhead for users.The processed cipher text and labels were stored in the public cloud and accessed by the private cloud.Security analysis shows that the proposed scheme can achieve PRV-CDA (Privacy Choose-distribution attacks) security in the private cloud.In the simulation experiment, four types of elliptic curve encryption were used to test the calculation time for key generation, encryption, and decryption respectively, for different attribute numbers with a fixed block size, and different block sizes with a fixed attribute number.The results align with the characteristics of linear secret sharing.Simulation experiments and cost analysis demonstrate that the proposed scheme can enhance the efficiency of weight removal and save time costs.…”
    Get full text
    Article
  5. 14105

    High-Performance Wireless Piezoelectric Sensor Network for Distributed Structural Health Monitoring by Shang Gao, Xuewu Dai, Zheng Liu, Guiyun Tian

    Published 2016-03-01
    “…In addition to hardware, embedded signal processing and distributed data processing algorithm are designed as the intelligent “brain” of the proposed wireless monitoring network to extract features of the PZT signals, so that the data transmitted over the wireless link can be reduced significantly.…”
    Get full text
    Article
  6. 14106
  7. 14107
  8. 14108

    RWA-BFT: Reputation-Weighted Asynchronous BFT for Large-Scale IoT by Guanwei Jia, Zhaoyu Shen, Hongye Sun, Jingbo Xin, Dongyu Wang

    Published 2025-01-01
    “…This paper introduces RWA-BFT, a reputation-weighted asynchronous Byzantine Fault Tolerance (BFT) consensus algorithm designed to address the scalability and performance challenges of blockchain systems in large-scale IoT scenarios. …”
    Get full text
    Article
  9. 14109

    Real-Time On-Orbit Estimation Method for Microthruster Thrust Based on High-Precision Orbit Determination by Qinglin Yang, Weijing Zhou, Hao Chang

    Published 2021-01-01
    “…By establishing a high-precision orbit dynamic model, the microthrust generated by a microthruster is modeled as a first-order Markov model, combined with a high-precision GNSS measuring device, and the satellite position is obtained through the cubature Kalman filter algorithm, velocity, and thrust real-time on-orbit estimates. …”
    Get full text
    Article
  10. 14110

    Distance and Density Similarity Based Enhanced k-NN Classifier for Improving Fault Diagnosis Performance of Bearings by Sharif Uddin, Md. Rashedul Islam, Sheraz Ali Khan, Jaeyoung Kim, Jong-Myon Kim, Seok-Man Sohn, Byeong-Keun Choi

    Published 2016-01-01
    “…An enhanced k-nearest neighbor (k-NN) classification algorithm is presented, which uses a density based similarity measure in addition to a distance based similarity measure to improve the diagnostic performance in bearing fault diagnosis. …”
    Get full text
    Article
  11. 14111

    A hardware prototype of wideband high‐dynamic range analog‐to‐digital converter by Satish Mulleti, Eliya Reznitskiy, Shlomi Savariego, Moshe Namer, Nimrod Glazer, Yonina C. Eldar

    Published 2023-07-01
    “…To avoid clipping, modulo folding can be used before sampling, followed by an unfolding algorithm to recover the true signal. Here, the authors present a modulo hardware prototype that can be used before sampling to avoid clipping. …”
    Get full text
    Article
  12. 14112

    Automatic level control system for telephone communication channels of radio-transmitting devices by A. V. Tkacheva, A. P. Pavlov, I. E. Kashchenko

    Published 2019-06-01
    “…The presented automatic level control system provides a quick recovery of the output level without significant surge. А compression algorithm based on the Hamming window function is used to correct the spectral mask of the signal and increase the mean-square average power of the radio-transmission path. …”
    Get full text
    Article
  13. 14113

    An Improved Extrapolation Scheme for Truncated CT Data Using 2D Fourier-Based Helgason-Ludwig Consistency Conditions by Yan Xia, Martin Berger, Sebastian Bauer, Shiyang Hu, Andre Aichert, Andreas Maier

    Published 2017-01-01
    “…The forward projection of the optimized ellipse can be used to complete the truncation data. The proposed algorithm is evaluated using simulated data and reprojections of clinical data. …”
    Get full text
    Article
  14. 14114

    Improved Low-Complexity Demodulation: Integrating Minimum-Mean-Square-Error and Maximum-Likelihood Detection for Image-Sensor-Based Visible Light Communication by Yuki Ohira, Shintaro Arai, Kengo Fujii, Tomohiro Yendo

    Published 2025-01-01
    “…To address these limitations, this study introduces an improved error signal candidate selection algorithm that focuses on residual signals and channel matrix characteristics to refine the signal estimation result. …”
    Get full text
    Article
  15. 14115

    Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range by Zhe SUN, Hong NING, Lihua YIN, Binxing FANG

    Published 2023-02-01
    “…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
    Get full text
    Article
  16. 14116

    Ferrography Wear Particles Image Recognition Based on Extreme Learning Machine by Qiong Li, Tingting Zhao, Lingchao Zhang, Wenhui Sun, Xi Zhao

    Published 2017-01-01
    “…With the rapid development of computer image processing technology, neural network based on traditional gradient training algorithm can be used to recognize them. However, the feedforward neural network based on traditional gradient training algorithms for image segmentation creates many issues, such as needing multiple iterations to converge and easy fall into local minimum, which restrict its development heavily. …”
    Get full text
    Article
  17. 14117

    Combined Heat and Mass Transfer of Fluid Flowing through Horizontal Channel by Turbulent Forced Convection by Jamal Eddine Salhi, Kamal Amghar, Hicham Bouali, Najim Salhi

    Published 2020-01-01
    “…A specifically developed numerical model was based on the finite-volume method to solve the coupled governing equations and the SIMPLE (Semi Implicit Method for Pressure Linked Equation) algorithm for the treatment of velocity-pressure coupling. …”
    Get full text
    Article
  18. 14118

    Resilience-Oriented Scheduling of Shared Autonomous Electric Vehicles: A Cooperation Framework for Electrical Distribution Networks and Transportation Sector by Mohammad Hassan Amirioun, Saeid Jafarpour, Ali Abdali, Josep M. Guerrero, Baseem Khan

    Published 2023-01-01
    “…Afterward, SA runs a targeted algorithm to schedule trip assignments and charging cycles of SAEVs so that the required constraints of DSO are satisfied. …”
    Get full text
    Article
  19. 14119

    Prediction and Evaluation of Coal Mine Coal Bump Based on Improved Deep Neural Network by Shuang Gong, Yi Tan, Wen Wang

    Published 2021-01-01
    “…To predict coal bump disaster accurately and reliably, we propose a depth neural network (DNN) prediction model based on the dropout method and improved Adam algorithm. The coal bump accident examples were counted in order to analyze the influencing factors, characteristics, and causes of this type of accidents. …”
    Get full text
    Article
  20. 14120

    Compressive Sensing Based Bayesian Sparse Channel Estimation for OFDM Communication Systems: High Performance and Low Complexity by Guan Gui, Li Xu, Lin Shan, Fumiyuki Adachi

    Published 2014-01-01
    “…Broadband channel model is often described by very few dominant channel taps and they can be probed by compressive sensing based sparse channel estimation (SCE) methods, for example, orthogonal matching pursuit algorithm, which can take the advantage of sparse structure effectively in the channel as for prior information. …”
    Get full text
    Article