Showing 16,981 - 17,000 results of 19,511 for search '"algorithm"', query time: 0.11s Refine Results
  1. 16981

    Fuzzy Shortest Path Problem Based on Level 𝜆-Triangular LR Fuzzy Numbers by S. Elizabeth, L. Sujatha

    Published 2012-01-01
    “…In problems of graphs involving uncertainties, the fuzzy shortest path problem is one of the most studied topics, since it has a wide range of applications in different areas and therefore deserves special attention. In this paper, algorithms are proposed for the fuzzy shortest path problem, where the arc length of the network takes imprecise numbers, instead of real numbers, namely, level 𝜆-triangular LR fuzzy numbers. …”
    Get full text
    Article
  2. 16982

    A Direct Method to Compare Bipolar LR Fuzzy Numbers by Reza Ghanbari, Khatere Ghorbani-Moghadam, Nezam Mahdavi-Amiri

    Published 2018-01-01
    “…We give a direct formula to compare two bipolar triangular fuzzy numbers in O(1) operations, making the process useful for many optimization algorithms. Also, we present an application of bipolar fuzzy number in a real life problem.…”
    Get full text
    Article
  3. 16983

    Group Scheduling with Learning Effect and Random Processing Time by Dingyu Wang, Chunming Ye

    Published 2021-01-01
    “…At the same time, heuristic algorithms and examples are given.…”
    Get full text
    Article
  4. 16984

    Fuzzy trust model for wireless sensor networks with intrusion tolerance by WANG Liang-min1, GUO Yuan-bo2, ZHAN Yong-zhao1

    Published 2010-01-01
    “…To protect key services of wireless sensor networks of data fusion and package forward,a fuzzy trust model based on trust and confidence and its evaluation algorithms were presented,in which the value of confidence was used to describe the impreciseness of the value of the trust.Then the simulation and the example were given to show the per-formances of using the model to detect or tolerate the insidious attacks.Finally,the package drop ration of the networks with the trust evaluation system was simulated and the comparison with the related work was discussed.…”
    Get full text
    Article
  5. 16985

    Sufficient Optimality and Sensitivity Analysis of a Parameterized Min-Max Programming by Huijuan Xiong, Yu Xiao, Chaohong Song

    Published 2012-01-01
    “…Moreover, the formulae based on these assumptions are concise and convenient for algorithmic purpose to solve the applications.…”
    Get full text
    Article
  6. 16986

    COMPUTER- AIDED MODELING AND IMPROVING OF RISOGRAPH PRINTING by P. E. Sulim, V. S. Yudenkov

    Published 2014-12-01
    “…The considered improvement of qualit y of the risofraph print based on a mathematical model in the environment Matlab by using the specialized algorithms and digital filter of the Image Processing Toolbox. …”
    Get full text
    Article
  7. 16987

    A Modified Hybrid Conjugate Gradient Method for Unconstrained Optimization by Minglei Fang, Min Wang, Min Sun, Rong Chen

    Published 2021-01-01
    “…The nonlinear conjugate gradient algorithms are a very effective way in solving large-scale unconstrained optimization problems. …”
    Get full text
    Article
  8. 16988

    Reconstruction of Multiple Strings of Constant Weight from Prefix–Suffix Compositions by Yaoyu Yang, Zitan Chen

    Published 2025-01-01
    “…Additionally, we present two algorithms for reconstructing strings from the compositions of prefixes and suffixes of constant-length constant-weight strings.…”
    Get full text
    Article
  9. 16989

    Bregman distances, totally convex functions, and a method for solving operator equations in Banach spaces

    Published 2006-01-01
    “…First, several basic mathematical concepts involved in the construction and study of Bregman type iterative algorithms are presented from a unified analytic perspective. …”
    Get full text
    Article
  10. 16990

    Determinantal generating functions of colored spanning forests by Gregory M. Constantine, Marius G. Buliga

    Published 2004-01-01
    “…An analogous determinantal expansion yields the generating function of all spanning forests of a given color type that contain a specific subforest. Algorithms are described for obtaining a list of all colored spanning trees and spanning forests of any graph with colored edges based on symbolic calculation.…”
    Get full text
    Article
  11. 16991

    Calculation of Electric Contact Heating on the Basis of Two-Dimensional Temperature Field Model by A. N. Gerasimovich, D. A. Gerasimovich, Yu. A. Klimovich

    Published 2004-06-01
    “…Two-dimensional temperature field model is proposed to calculate flat contact heating. Numerical algorithms for calculation of contact temperature have been developed on the basis of finite-difference method. …”
    Get full text
    Article
  12. 16992

    Using Free Pascal for teaching informatics by Valentina Dagienė, Rimgaudas Laucius

    Published 2001-12-01
    “… Turbo Pascal is the main language used for teaching of algorithms in schools. However it is already outdated. …”
    Get full text
    Article
  13. 16993

    CORE-MD clinical risk score for regulatory evaluation of artificial intelligence-based medical device software by Frank E. Rademakers, Elisabetta Biasin, Nico Bruining, Enrico G. Caiani, Rhodri H. Davies, Stephen H. Gilbert, Eric Kamenjasevic, Gearóid McGauran, Gearóid O’Connor, Jean-Baptiste Rouffet, Baptiste Vasey, Alan G. Fraser

    Published 2025-02-01
    “…Abstract The European CORE–MD consortium (Coordinating Research and Evidence for Medical Devices) proposes a score for medical devices incorporating artificial intelligence or machine learning algorithms. Its domains are summarised as valid clinical association, technical performance, and clinical performance. …”
    Get full text
    Article
  14. 16994

    New fractional cosine transform and its application by ZHANG Yong-liang, ZENG Yi-cheng

    Published 2005-01-01
    “…When the periodicity from two to K was extended, K period fractional cosine transform was obtained. Two algorithms were deduced and the advantages of the new fractional cosine transform were analyzed. …”
    Get full text
    Article
  15. 16995

    Sufficient optimality conditions for a class of epidemic problems with control on the boundary by Miniak-Górecka Alicja, Nowakowski Andrzej

    Published 2016-12-01
    “…Necessary optimality conditions and two gradient-type algorithms are derived. This paper constructs dual dynamic programming method to derive sufficient optimality conditions for optimal solution as well $\varepsilon $-optimality conditions in terms of dual dynamic inequalities. …”
    Get full text
    Article
  16. 16996

    Expeditious Calculations of Electric Power Losses in 0.38–10 kV Electric Networks of Belarusian United Energy Systems by M. I. Fursanov, V. V. Makarevich

    Published 2013-10-01
    “…An algorithmized methodology for expedi­tious calculations of technical losses in 0.38–10 kV electric networks of the Belarusian United Energy Systems has been developed on the basis of performance information which is formed by modern intellectual devices for registration and accumulation of data. …”
    Get full text
    Article
  17. 16997

    LTE multi-user downlink throughput performance modeling and analysis by Zhicheng WEN

    Published 2016-10-01
    “…Aiming at LTE multi-user downlink throughput, it was analyzed that from time domain and frequency domain of LTE resources, user location, UE category and downlink MIMO modes, also combined with the characteristics, influencing factors, action processes of time-domain and frequency-domain scheduling algorithms under multi-user conditions. The multi-user downlink throughput analysis and estimation model was then built based on this, and the model was used to analyze a real example. …”
    Get full text
    Article
  18. 16998

    Computational frameworks transform antagonism to synergy in optimizing combination therapies by Jinghong Chen, Anqi Lin, Aimin Jiang, Chang Qi, Zaoqu Liu, Quan Cheng, Shuofeng Yuan, Peng Luo

    Published 2025-01-01
    “…We comprehensively assess key algorithms including DrugComboRanker and AuDNNsynergy, and evaluate integration approaches encompassing kernel regression and graph networks. …”
    Get full text
    Article
  19. 16999

    Position Control of a 3-CPU Spherical Parallel Manipulator by Massimo Callegari, Luca Carbonari, Giacomo Palmieri, Matteo-Claudio Palpacelli, Donatello Tina

    Published 2013-01-01
    “…The relative simplicity of machine kinematics allowed to test algorithms requiring the closed-loop evaluation of both inverse and direct kinematics; the compensation of gravitational terms has been experimented as well.…”
    Get full text
    Article
  20. 17000

    On Stability of Parametrized Families of Polynomials and Matrices by Handan Akyar, Taner Büyükköroğlu, Vakıf Dzhafarov

    Published 2010-01-01
    “…Based on the Bernstein expansion of a multivariable polynomial and extremal properties of a multilinear function, fast algorithms are suggested.…”
    Get full text
    Article