Showing 14,821 - 14,840 results of 19,511 for search '"algorithm"', query time: 0.11s Refine Results
  1. 14821

    Assessing Accessibility of Dockless Sharing-Bike Networks by the Social Network Analysis Method by Pei Liu, Junlan Chen, Heyang Sun, Xiucheng Guo, Yan Wang, Zhenjun Zhu

    Published 2021-01-01
    “…Considering bicycle travel characteristics, a hierarchical clustering algorithm was applied to construct the dockless sharing-bike network. …”
    Get full text
    Article
  2. 14822

    Leveraging an Enhanced CodeBERT-Based Model for Multiclass Software Defect Prediction via Defect Classification by Rida Ghafoor Hussain, Kin-Choong Yow, Marco Gori

    Published 2025-01-01
    “…The proposed framework utilizes a CodeBERT-based algorithm for defect prediction, optimizing model hyperparameters to achieve superior accuracy. …”
    Get full text
    Article
  3. 14823

    Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication by Banghua Wu, Shah Nazir, Neelam Mukhtar

    Published 2020-01-01
    “…For cross validation purposes, the decision rules and decomposition tree algorithms were used. The DR algorithm showed accuracy of 59.1%, while the DT showed accuracy of 61.5%. …”
    Get full text
    Article
  4. 14824

    Analisis Sentimen E-Learning X Terhadap Antarmuka Pengguna Menggunakan Kombinasi Multinomial Naive Bayes Dan Pendekatan Design Thinking by Baenil Huda, Irwan Sembiring, Iwan Setiawan, Danny Manongga, Hindriyanto Dwi Purnomo, Hendry Hendry, Ahmad Fauzi, April Lia Hananto, Tukino Tukino

    Published 2024-08-01
    “…Sentiment data from user reviews is classified using the Multinomial Naive Bayes algorithm, while Design Thinking is used to design more user-friendly interface solutions. …”
    Get full text
    Article
  5. 14825

    Identifiability of mathematical models in medical biology by S. I. Kabanikhin, D. A. Voronov, A. A. Grodz, O. I. Krivorotko

    Published 2016-01-01
    “…In this review article, the following approaches are considered: the transfer function method applied to linear models (useful for analysis of pharmacokinetic data, since a large class of drugs is characterized by linear kinetics); the Taylor series expansion method applied to nonlinear models; a method based on differential algebra theory (the structure of this algorithm allows this to be run on a computer); a method based on graph theory (this method allows for analysis of the identifiability of the model as well as finding a proper reparametrization reducing the initial model to an identifiable one). …”
    Get full text
    Article
  6. 14826

    FANT: Flexible Attention-Shifting Network Telemetry by Mingwei Cui, Yufan Peng, Fan Yang

    Published 2025-01-01
    “…To further save bandwidth, we model the attention-shifting process and apply heuristic algorithms to solve it. Our experiments show that FANT effectively supports the operation of ANT network applications. …”
    Get full text
    Article
  7. 14827

    Research on Safe Driving Evaluation Method Based on Machine Vision and Long Short-Term Memory Network by Dongmei Shi, Hongyu Tang

    Published 2021-01-01
    “…The time stream channel uses a single-shot multibox detector (SSD) algorithm to calculate the adjacent two frames of video sequence for the detection of small objects such as face and eyes. …”
    Get full text
    Article
  8. 14828

    A renewable integrated multi-area system for LFC incorporating electrical vehicle with SoC estimation by F. Lalhmangaihzuala, Subir Datta, Samuel Lalngaihawma, Taha Selim Ustun, Akhtar Kalam

    Published 2025-01-01
    “…The controller parameters undergo optimization by applying an innovative optimization method called the Mine Blasting algorithm, which utilizes an integral square error (ISE)-based fitness function. …”
    Get full text
    Article
  9. 14829

    Settlement Prediction of Foundation Pit Excavation Based on the GWO-ELM Model considering Different States of Influence by Qiao Shi-fan, Tan Jun-kun, Zhang Yong-gang, Wan Li-jun, Zhang Ming-fei, Tang Jun, He Qing

    Published 2021-01-01
    “…This paper proposes a novel grey wolf optimization-extreme learning machine model, namely, the GWO-ELM model, to train and predict the ground subsidence by combining the extreme learning machine with the grey wolf optimization algorithm. Taking an excavation project of a foundation pit of Kunming in China as an example, after analyzing the settlement monitoring data of cross sections JC55 and JC56, the representative monitoring sites JC55-2 and JC56-1 were selected as the training monitoring samples of the GWO-ELM model. …”
    Get full text
    Article
  10. 14830

    Improved Adaptive PI-like Fuzzy Control Strategy of Permanent Magnet Synchronous Motor by Wenshao Bu, Shihao Guo, Zongang Fan, Jinwei Li

    Published 2025-01-01
    “…This work redevelops the structure and rules of the adaptive fuzzy controller, and proposes and proves an improved adaptive PI-like fuzzy control algorithm for the PMSM system. Firstly, a parallel dual fuzzy controller structure is constructed to facilitate the adaptive adjustment of the “PI-like fuzzy controller”. …”
    Get full text
    Article
  11. 14831

    Ensemble Methods with Voting Protocols Exhibit Superior Performance for Predicting Cancer Clinical Endpoints and Providing More Complete Coverage of Disease-Related Genes by Runyu Jing, Yu Liang, Yi Ran, Shengzhong Feng, Yanjie Wei, Li He

    Published 2018-01-01
    “…As a result, we proposed a relatively stable scheme that used a set of methods with an ensemble algorithm. Our findings indicated that the ensemble methodologies are more reliable for predicting cancer prognoses than single machine learning algorithms as well as for gene function evaluating. …”
    Get full text
    Article
  12. 14832

    Fault diagnosis and fault-tolerant control strategy for interleaved boost DC/DC converter dedicated to PEM fuel cell applications. by Belkheir Abdesselam, Amar Benaissa, Ouahid Bouchhida, Samir Meradi, Mohamed Fouad Benkhoris

    Published 2025-01-01
    “…To address these drawbacks and achieve both accurate reference tracking with desired dynamic response and rapid fault detection, an algorithm based on current-slopes are proposed. …”
    Get full text
    Article
  13. 14833

    Task-Driven Computing Offloading and Resource Allocation Scheme for Maritime Autonomous Surface Ships Under Cloud–Shore–Ship Collaboration Framework by Supu Xiu, Ying Zhang, Hualong Chen, Yuanqiao Wen, Changshi Xiao

    Published 2024-12-01
    “…Compared with other analogy methods, the proposed algorithm can reduce the task processing delay by at least 15.7% and the task processing energy consumption by 15.4%.…”
    Get full text
    Article
  14. 14834

    Power allocation optimization strategy for multiple virtual power plants with diversified distributed flexibility resources by Zejian Qiu, Xin Zhang, Zhanyuan Han, Fengchao Chen, Yuxin Luo, Kuan Zhang

    Published 2024-12-01
    “…Specifically, a distributed EHVPP division method based on the granular K‐medoids clustering algorithm is proposed to realize the independent autonomy and coordinated interaction between EHVPPs, and in order to quantify the operation and regulation capacity of distributed EHVPPs, an aggregation approach of regulating feasible domains of flexibility resources based on the improved zonotope approximations is developed. …”
    Get full text
    Article
  15. 14835

    Two-dimensional Green’s function for an isotropic equal-thickness double-layer structure by Jie Tong, Juan Li, Jiang Su, Ying-jie Liu

    Published 2025-01-01
    “…Finally, numerical examples were used to compare the interface calculation results of this study with the finite element method numerical results, demonstrating the validity of the algorithm. This method is computationally simple and converges quickly. …”
    Get full text
    Article
  16. 14836

    Intelligent rockburst level prediction model based on swarm intelligence optimization and multi-strategy learner soft voting hybrid ensemble by Qinghong Wang, Tianxing Ma, Shengqi Yang, Fei Yan, Jiang Zhao

    Published 2025-01-01
    “…The data preprocessing method proposed in this study, based on an improved version of the Student t-SNE algorithm, effectively reduced the negative impact of data noise on model performance, enhancing the reliability of predictions. …”
    Get full text
    Article
  17. 14837

    Design and Simulation of a Fused Silica Space Cell Culture and Observation Cavity with Microfluidic and Temperature Controlling by Shangchun Fan, Jinhao Sun, Weiwei Xing, Cheng Li, Dongxue Wang

    Published 2013-01-01
    “…In order to provide appropriate flow rate, temperature, and shear force for space animal cell culture, a closed-loop microfluidic circuit and proportional, integrating, and differentiation (PID) algorithm are employed. This paper also illustrates system architecture and operating method of the principle prototype. …”
    Get full text
    Article
  18. 14838

    Exploring the Potential Imaging Biomarkers for Parkinson’s Disease Using Machine Learning Approach by Illia Mushta, Sulev Koks, Anton Popov, Oleksandr Lysenko

    Published 2024-12-01
    “…This study aims to identify a biomarker from DATSCAN images and develop a machine learning (ML) algorithm for PD diagnosis. Using 13 DATSCAN-derived parameters and patient handedness from 1309 individuals in the Parkinson’s Progression Markers Initiative (PPMI) database, we trained an AdaBoost classifier, achieving an accuracy of 98.88% and an area under the receiver operating characteristic (ROC) curve of 99.81%. …”
    Get full text
    Article
  19. 14839

    An effective electrocardiogram segments denoising method combined with ensemble empirical mode decomposition, empirical mode decomposition, and wavelet packet by Yaru Yue, Chengdong Chen, Xiaoyuan Wu, Xiaoguang Zhou

    Published 2023-06-01
    “…Furthermore, the signal‐to‐noise ratio (SNR), mean square error (MSE), root mean square error (RMSE), and normalised cross correlation coefficient (R) are used to evaluate the noise reduction algorithm. The mean SNR, MSE, RMSE, and R are 5.7427, 0.0071, 0.0551, and 0.9050 in the China Physiological Signal Challenge 2018 dataset. …”
    Get full text
    Article
  20. 14840

    Novel fingerprint key generation method based on the trimmed mean of feature distance by Zhongtian JIA, Qinglong QIN, Li MA, Lizhi PENG

    Published 2023-10-01
    “…In recent years, biometrics has become widely adopted in access control systems, effectively resolving the challenges associated with password management in identity authentication.However, traditional biometric-based authentication methods often lead to the loss or leakage of users’ biometric data, compromising the reliability of biometric authentication.In the literature, two primary technical approaches have been proposed to address these issues.The first approach involves processing the extracted biometric data in a way that the authentication information used in the final stage or stored in the database does not contain the original biometric data.The second approach entails writing the biometric data onto a smart card and utilizing the smart card to generate the private key for public key cryptography.To address the challenge of constructing the private key of a public key cryptosystem based on fingerprint data without relying on a smart card, a detailed study was conducted on the stable feature points and stable feature distances of fingerprints.This study involved the extraction and analysis of fingerprint minutiae.Calculation methods were presented for sets of stable feature points, sets of equidistant stable feature points, sets of key feature points, and sets of truncated means.Based on the feature distance truncated mean, an original fingerprint key generation algorithm and key update strategy were proposed.This scheme enables the reconstruction of the fingerprint key through re-collecting fingerprints, without the need for direct storage of the key.The revocation and update of the fingerprint key were achieved through a salted hash function, which solved the problem of converting ambiguous fingerprint data into precise key data.Experiments prove that the probability of successfully reconstructing the fingerprint key by re-collecting fingerprints ten times is 0.7354, and the probability of reconstructing the fingerprint key by re-collecting fingerprints sixty times is 98.06%.…”
    Get full text
    Article