-
16981
Fuzzy Shortest Path Problem Based on Level 𝜆-Triangular LR Fuzzy Numbers
Published 2012-01-01“…In problems of graphs involving uncertainties, the fuzzy shortest path problem is one of the most studied topics, since it has a wide range of applications in different areas and therefore deserves special attention. In this paper, algorithms are proposed for the fuzzy shortest path problem, where the arc length of the network takes imprecise numbers, instead of real numbers, namely, level 𝜆-triangular LR fuzzy numbers. …”
Get full text
Article -
16982
A Direct Method to Compare Bipolar LR Fuzzy Numbers
Published 2018-01-01“…We give a direct formula to compare two bipolar triangular fuzzy numbers in O(1) operations, making the process useful for many optimization algorithms. Also, we present an application of bipolar fuzzy number in a real life problem.…”
Get full text
Article -
16983
Group Scheduling with Learning Effect and Random Processing Time
Published 2021-01-01“…At the same time, heuristic algorithms and examples are given.…”
Get full text
Article -
16984
Fuzzy trust model for wireless sensor networks with intrusion tolerance
Published 2010-01-01“…To protect key services of wireless sensor networks of data fusion and package forward,a fuzzy trust model based on trust and confidence and its evaluation algorithms were presented,in which the value of confidence was used to describe the impreciseness of the value of the trust.Then the simulation and the example were given to show the per-formances of using the model to detect or tolerate the insidious attacks.Finally,the package drop ration of the networks with the trust evaluation system was simulated and the comparison with the related work was discussed.…”
Get full text
Article -
16985
Sufficient Optimality and Sensitivity Analysis of a Parameterized Min-Max Programming
Published 2012-01-01“…Moreover, the formulae based on these assumptions are concise and convenient for algorithmic purpose to solve the applications.…”
Get full text
Article -
16986
COMPUTER- AIDED MODELING AND IMPROVING OF RISOGRAPH PRINTING
Published 2014-12-01“…The considered improvement of qualit y of the risofraph print based on a mathematical model in the environment Matlab by using the specialized algorithms and digital filter of the Image Processing Toolbox. …”
Get full text
Article -
16987
A Modified Hybrid Conjugate Gradient Method for Unconstrained Optimization
Published 2021-01-01“…The nonlinear conjugate gradient algorithms are a very effective way in solving large-scale unconstrained optimization problems. …”
Get full text
Article -
16988
Reconstruction of Multiple Strings of Constant Weight from Prefix–Suffix Compositions
Published 2025-01-01“…Additionally, we present two algorithms for reconstructing strings from the compositions of prefixes and suffixes of constant-length constant-weight strings.…”
Get full text
Article -
16989
Bregman distances, totally convex functions, and a method for solving operator equations in Banach spaces
Published 2006-01-01“…First, several basic mathematical concepts involved in the construction and study of Bregman type iterative algorithms are presented from a unified analytic perspective. …”
Get full text
Article -
16990
Determinantal generating functions of colored spanning forests
Published 2004-01-01“…An analogous determinantal expansion yields the generating function of all spanning forests of a given color type that contain a specific subforest. Algorithms are described for obtaining a list of all colored spanning trees and spanning forests of any graph with colored edges based on symbolic calculation.…”
Get full text
Article -
16991
Calculation of Electric Contact Heating on the Basis of Two-Dimensional Temperature Field Model
Published 2004-06-01“…Two-dimensional temperature field model is proposed to calculate flat contact heating. Numerical algorithms for calculation of contact temperature have been developed on the basis of finite-difference method. …”
Get full text
Article -
16992
Using Free Pascal for teaching informatics
Published 2001-12-01“… Turbo Pascal is the main language used for teaching of algorithms in schools. However it is already outdated. …”
Get full text
Article -
16993
CORE-MD clinical risk score for regulatory evaluation of artificial intelligence-based medical device software
Published 2025-02-01“…Abstract The European CORE–MD consortium (Coordinating Research and Evidence for Medical Devices) proposes a score for medical devices incorporating artificial intelligence or machine learning algorithms. Its domains are summarised as valid clinical association, technical performance, and clinical performance. …”
Get full text
Article -
16994
New fractional cosine transform and its application
Published 2005-01-01“…When the periodicity from two to K was extended, K period fractional cosine transform was obtained. Two algorithms were deduced and the advantages of the new fractional cosine transform were analyzed. …”
Get full text
Article -
16995
Sufficient optimality conditions for a class of epidemic problems with control on the boundary
Published 2016-12-01“…Necessary optimality conditions and two gradient-type algorithms are derived. This paper constructs dual dynamic programming method to derive sufficient optimality conditions for optimal solution as well $\varepsilon $-optimality conditions in terms of dual dynamic inequalities. …”
Get full text
Article -
16996
Expeditious Calculations of Electric Power Losses in 0.38–10 kV Electric Networks of Belarusian United Energy Systems
Published 2013-10-01“…An algorithmized methodology for expeditious calculations of technical losses in 0.38–10 kV electric networks of the Belarusian United Energy Systems has been developed on the basis of performance information which is formed by modern intellectual devices for registration and accumulation of data. …”
Get full text
Article -
16997
LTE multi-user downlink throughput performance modeling and analysis
Published 2016-10-01“…Aiming at LTE multi-user downlink throughput, it was analyzed that from time domain and frequency domain of LTE resources, user location, UE category and downlink MIMO modes, also combined with the characteristics, influencing factors, action processes of time-domain and frequency-domain scheduling algorithms under multi-user conditions. The multi-user downlink throughput analysis and estimation model was then built based on this, and the model was used to analyze a real example. …”
Get full text
Article -
16998
Computational frameworks transform antagonism to synergy in optimizing combination therapies
Published 2025-01-01“…We comprehensively assess key algorithms including DrugComboRanker and AuDNNsynergy, and evaluate integration approaches encompassing kernel regression and graph networks. …”
Get full text
Article -
16999
Position Control of a 3-CPU Spherical Parallel Manipulator
Published 2013-01-01“…The relative simplicity of machine kinematics allowed to test algorithms requiring the closed-loop evaluation of both inverse and direct kinematics; the compensation of gravitational terms has been experimented as well.…”
Get full text
Article -
17000
On Stability of Parametrized Families of Polynomials and Matrices
Published 2010-01-01“…Based on the Bernstein expansion of a multivariable polynomial and extremal properties of a multilinear function, fast algorithms are suggested.…”
Get full text
Article