Showing 15,181 - 15,200 results of 19,511 for search '"algorithm"', query time: 0.16s Refine Results
  1. 15181

    A Semi-Automated Usability Evaluation Framework for Interactive Image Segmentation Systems by Mario Amrehn, Stefan Steidl, Reinier Kortekaas, Maddalena Strumia, Markus Weingarten, Markus Kowarschik, Andreas Maier

    Published 2019-01-01
    “…It is demonstrated that even when the underlying segmentation algorithm is the same throughout interactive prototypes, their user experience may vary substantially. …”
    Get full text
    Article
  2. 15182

    Attention-Based CNN Fusion Model for Emotion Recognition During Walking Using Discrete Wavelet Transform on EEG and Inertial Signals by Yan Zhao, Ming Guo, Xiangyong Chen, Jianqiang Sun, Jianlong Qiu

    Published 2024-03-01
    “…To effectively improve the performance of the recognition system, the proposed decision fusion algorithm combines Critic method and majority voting strategy to determine the weight values that affect the final decision results. …”
    Get full text
    Article
  3. 15183

    Time Complexity of Training DNNs With Parallel Computing for Wireless Communications by Pengyu Cong, Chenyang Yang, Shengqian Han, Shuangfeng Han, Xiaoyun Wang

    Published 2025-01-01
    “…Then, we compare the results with the se-FLOPs for inference of the DNNs and for executing a popular numerical algorithm, and provide the scaling laws of these complexities with respect to the numbers of antennas and users. …”
    Get full text
    Article
  4. 15184

    Ensemble modelling reveals spiny monkey orange (Strychnos spinosa Lam.) as a vulnerable wild edible fruit tree in West Africa by Hospice Gérard Gracias Avakoudjo, Mahunan Eric José Vodounnon, Rodrigue Idohou, Aly Coulibaly, Achille Ephrem Assogbadjo

    Published 2025-01-01
    “…The Models’ performance was evaluated using the Area under the Curve (AUC), True Skill Statistic (TSS), Correlation coefficient (COR), and the Deviance. The most efficient algorithm (RF) was employed for the modelling, and the resulting maps were overlaid on the existing protected area network. …”
    Get full text
    Article
  5. 15185

    Accuracy of administrative data for surveillance of healthcare-associated infections: a systematic review by Karel G M Moons, Marc J M Bonten, Maaike S M van Mourik, Pleun Joppe van Duijn, Grace M Lee

    Published 2015-08-01
    “…Administrative data algorithms, including (combinations of) diagnosis codes, are commonly used to determine the occurrence of HAI, either to support within-hospital surveillance programmes or as free-standing quality indicators. …”
    Get full text
    Article
  6. 15186

    Sequential Optimization Configuration Method for Power Quality Monitors Considering Photovoltaic Access by Xiaorui Liang, Qiming Zhong, Huaying Zhang, Ying Wang, Huicong Liu

    Published 2024-01-01
    “…Firstly, the improved k-means algorithm is used to reduce PV output scenarios and a calculation method for the amplitude of voltage sag considering PV access is proposed. …”
    Get full text
    Article
  7. 15187

    Location Information-Based Routing Protocol for Energy Harvesting Cognitive Radio Wireless Sensor Network by Mohamad-Rida Mortada, Abbass Nasser, Alaaeddine Ramadan, Koffi-Clement Yao, Ali Mansour

    Published 2025-01-01
    “…LIBRO has been recently proposed as an efficient routing algorithm for traditional WSN networks. In this paper, we extend its application to EH-CWSNs, in which the WSN nodes act as Secondary Users (SUs). …”
    Get full text
    Article
  8. 15188

    Fast 3D Transmission Tower Detection Based on Virtual Views by Liwei Zhou, Jiaying Tan, Jing Fu, Guiwei Shao

    Published 2025-01-01
    “…Finally, by leveraging the projection transformation between the virtual image and the 3D point cloud, combined with a 3D region growing algorithm, the 3D points belonging to the TTs are extracted from the whole 3D point cloud. …”
    Get full text
    Article
  9. 15189

    A Fluid Model for Mobile Data Offloading Based on Device-to-Device Communications with Time Constraints by Antonio Pinizzotto, Raffaele Bruno

    Published 2024-12-01
    “…Although several analytical models have been developed to derive theoretical performance bounds of D2D-based offloading schemes under different user mobility patterns and routing algorithms used for content dissemination, how to jointly analyse time-limited caching and forwarding policies with both constant and asynchronous timeouts remains still an unsolved problem. …”
    Get full text
    Article
  10. 15190

    Air Pollution Forecasting Using Artificial and Wavelet Neural Networks with Meteorological Conditions by Qingchun Guo, Zhenfang He, Shanshan Li, Xinzhou Li, Jingjing Meng, Zhanfang Hou, Jiazhen Liu, Yongjin Chen

    Published 2020-05-01
    “…When Bayesian regularization was applied as a training algorithm, the WANN and ANN models accurately reproduced the APIs in both Xi’an and Lanzhou, although the WANN model (R = 0.8846 for Xi’an and R = 0.8906 for Lanzhou) performed better than the ANN (R = 0.8037 for Xi’an and R = 0.7742 for Lanzhou) during the forecasting stage. …”
    Get full text
    Article
  11. 15191

    Seismic and GNSS strain-based probabilistic seismic hazard evaluation for northern Chile using DAS Magnitude Scale by Ranjit Das, Claudio Meneses, Hua Wang

    Published 2025-01-01
    “…Conclusions A PSHA map for Northern Chile, synthesizing seismic catalog data and GNSS strain rates using a Logic Tree-based algorithm, has been developed for a 475-year return period. …”
    Get full text
    Article
  12. 15192

    Real-Time Physics Simulation Method for XR Application by Nak-Jun Sung, Jun Ma, Kunthroza Hor, Taeheon Kim, Hongly Va, Yoo-Joo Choi, Min Hong

    Published 2025-01-01
    “…The system is deployed within the Unity engine and enhances real-time performance through the use of sophisticated collision detection and response algorithms. Our method employs an AABB-based bounding volume hierarchy (BVH) structure to efficiently detect collisions, and incorporates the Möller–Trumbore algorithm for precise triangle-level interactions. …”
    Get full text
    Article
  13. 15193

    Saber With Hybrid Striding Toom Cook-Based Multiplier: Implementation Using Open-Source Tool Flow and Industry Standard Chip Design Tools by Muhammad Naveed Abbasi, Abdul Rehman Aslam, Muhammad Awais Bin Altaf, Wala Saadeh

    Published 2025-01-01
    “…Quantum computers are a significant threat to the existing cryptography algorithms. The Saber is a lattice-based post-quantum cryptographic or quantum-safe algorithm designed as a quantum computing attack-resistant protocol. …”
    Get full text
    Article
  14. 15194

    Multilayer entropy-weighted TOPSIS method and its decision-making in ecological operation during the subsidence period of the Three Gorges Reservoir by Ai Xueshan, Yu Yangxin, Liang Zhiming, Shi Xuanyu, Cao Rui, Zhang Xiaoke

    Published 2025-01-01
    “…A multi-objective optimal reservoir scheduling model was constructed to coordinate the spawning flow demand of " Four Major Chinese Carps"; The model takes the maximum power generation and the maximum membership degree of downstream river ecological water demand as the objective functions, and uses the dynamic programming multi-objective solution algorithm based on penalty factors to solve the problem, and obtains the non-inferior solution set in each scenario. …”
    Get full text
    Article
  15. 15195

    Optimized ANFIS-Based Robust Nonlinear Control of a Solar Off-Grid Charging Station for Electric Vehicles by Bibi Tabassam Gul, Iftikhar Ahmad, Habibur Rehman, Ammar Hasan

    Published 2025-01-01
    “…The controller gains are optimized using the grey wolf optimization algorithm, and global stability is demonstrated through Lyapunov stability analysis. …”
    Get full text
    Article
  16. 15196

    A multi-scale rotated ship targets detection network for remote sensing images in complex scenarios by Siyu Li, Fei Yan, Yunqing Liu, Yuzhuo Shen, Lan Liu, Ke Wang

    Published 2025-01-01
    “…The mAP07, mAP12 on the HRSC2016 dataset, as well as the mAP in the ship category of the DOTA dataset, show a significant advantage over other commonly used object detection algorithms, with accuracies of 90.70%, 98.98%, and 89.46%, respectively. …”
    Get full text
    Article
  17. 15197

    An Estimation Model on Electricity Consumption of New Metro Stations by Zhao Yu, Yun Bai, Qian Fu, Yao Chen, Baohua Mao

    Published 2020-01-01
    “…., passenger volume, air temperature and relative humidity). A genetic algorithm with five-fold cross-validation is used to optimize the hyper-parameters of the SVR model in order to improve its accuracy in estimating the electricity consumption of a metro station (ECMS). …”
    Get full text
    Article
  18. 15198

    Adaptive Resource Allocation and Mode Switching for D2D Networks With Imperfect CSI in AGV-Based Factory Automation by Safiu A. Gbadamosi, Gerhard P. Hancke, Adnan M. Abu-Mahfouz

    Published 2025-01-01
    “…The ARAMS scheme integrates mode switching (MS), channel-quality factor (CQF), and power control (PC) within a bi-phasic resource-sharing (RS) algorithm to lower the computational complexity. In the initial phase, the operational mode for each D2D user (DU) per cell is adaptively selected based on the channel gain ratio (CGR). …”
    Get full text
    Article
  19. 15199

    The effects of linear energy density and gas environment on droplet spatter characteristics and dynamics during selective laser melting by Guang Yang, Qi Liu, Da An, Xiangming Wang, Ranliang Wu, Han Xie

    Published 2025-02-01
    “…Utilizing high-speed imaging technology and a novel image processing method, we developed a new spatter feature extraction algorithm to analyze the number, area, angle, and speed of the spatter under different energy densities and protective gas directions. …”
    Get full text
    Article
  20. 15200

    Traffic Status Prediction of Arterial Roads Based on the Deep Recurrent Q-Learning by Wei Hao, Donglei Rong, Kefu Yi, Qiang Zeng, Zhibo Gao, Wenguang Wu, Chongfeng Wei, Biljana Scepanovic

    Published 2020-01-01
    “…The model is based on the optimized Long Short-Term Memory (LSTM) algorithm to handle the explosive growth of Q-table data, which not only avoids the gradient explosion and disappearance but also has the efficient storage and analysis. …”
    Get full text
    Article