Showing 17,021 - 17,040 results of 19,511 for search '"algorithm"', query time: 0.10s Refine Results
  1. 17021

    Deep Learning Applications in Ionospheric Modeling: Progress, Challenges, and Opportunities by Renzhong Zhang, Haorui Li, Yunxiao Shen, Jiayi Yang, Wang Li, Dongsheng Zhao, Andong Hu

    Published 2025-01-01
    “…With the continuous advancement of deep learning algorithms and the rapid growth of computational resources, deep learning technology has undergone numerous milestone developments, evolving from simple BP neural networks into more complex and powerful network models such as CNNs, LSTMs, RNNs, and GANs. …”
    Get full text
    Article
  2. 17022

    Leveraging advanced technologies for early detection and diagnosis of oral cancer: Warning alarm by Saantosh Saravanan, N. Aravindha Babu, Lakshmi T, Mukesh Kumar Dharmalingam Jothinathan

    Published 2024-06-01
    “…The medical technology, particularly in the areas of deep learning, optimization algorithms, and imaging techniques, has begun a new paradigm in oral cancer diagnosing and detecting methodologies. …”
    Get full text
    Article
  3. 17023

    A Spatiotemporal Feature Extraction Technique Using Superlet-CNN Fusion for Improved Motor Imagery Classification by Neha Sharma, Manoj Sharma, Amit Singhal, Nuzhat Fatema, Vinay Kumar Jadoun, Hasmat Malik, Asyraf Afthanorhan

    Published 2025-01-01
    “…The core challenge addressed herein is the development of robust algorithms that enable the accurate identification of MI tasks, thereby empowering individuals with mobility impairments to control devices and interfaces through cognitive commands. …”
    Get full text
    Article
  4. 17024

    Appropriate Contrast Enhancement Measures for Brain and Breast Cancer Images by Suneet Gupta, Rabins Porwal

    Published 2016-01-01
    “…We do have various enhancement algorithms which enhance the medical images to different extents. …”
    Get full text
    Article
  5. 17025

    Research on interference avoidance detection method for wireless access system by Jian GONG, Xu SHI, Qiaochun XU

    Published 2024-02-01
    “…The types of interference avoidance mechanisms adopted by wireless access systems to realize spectrum sharing and compatibility were introduced, and the specific detection methods such as channel occupancy time, idle channel evaluation, idle channel evaluation time cumulative probability distribution statistics, determination of interference signal detection threshold, silent period duration and equivalent utility were explained.The problems in the actual device detection system were highlighted, and new effective channel occupancy time and idle channel evaluation algorithms and the determination process were given.…”
    Get full text
    Article
  6. 17026

    Entropy-based feature selection with applications to industrial internet of things (IoT) and breast cancer prediction by Ismail Mageed

    Published 2024-09-01
    “…Eliminating redundant and irrelevant variables while keeping the most important ones boosts the prediction capacity of the algorithms. FS is essential because of this. The current paper delves into entropy-based FS, which emphasizes the phenomenal role of entropy in developing numerous interdisciplinary fields of human knowledge, including ML. …”
    Get full text
    Article
  7. 17027

    Pedestrian inertial navigation: An overview of model and data-driven approaches by Itzik Klein

    Published 2025-03-01
    “…Among these, are methods and algorithms for shoe-mounted inertial sensors and pedestrian dead reckoning (PDR) with unconstrained inertial sensors. …”
    Get full text
    Article
  8. 17028

    Output Feedback Control for Couple-Group Consensus of Multiagent Systems by Huanyu Zhao, Hongbiao Zhou, Zhongyi Tang

    Published 2014-01-01
    “…We obtain two necessary and sufficient conditions of couple-group consensus in different forms for each case. Two different algorithms are used to design the control gains for continuous- and discrete-time case, respectively. …”
    Get full text
    Article
  9. 17029

    Modified Hybrid Discriminant Analysis Methods and Their Applications in Machine Learning by Liwen Huang

    Published 2020-01-01
    “…Numerical experiments on real data sets show that this method performs well compared to other classification algorithms, and its stability is better than the common discriminant models.…”
    Get full text
    Article
  10. 17030

    Research on NS2-based optical burst switching network simulation platform by ZHU Zhi-jun1, LE Zi-chun2, ZHU Ran1

    Published 2009-01-01
    “…An OBS network simulation platform OBS-NP(OBS-NS2-platform) based on NS-2 was presented.It extended the node class and link class on the basis of NS-2, and provideed the simulation surroundings for key optical burst switching algorithms.After detailed description for the structure of the OBS-NP system, a OBS network with nine nodes was taken as an example to obtain routing results and some significant network parameters, such as the throughput, delay of the burst packets and resource utilization.Finally, the accuracy of the simulation results was discussed and analyzed.…”
    Get full text
    Article
  11. 17031

    APPLICATION OF EXTREME VALUE OF CHOQUE INTEGRAL IN DECIDING IN THE ECONOMIC THEORY OF THE ACTIVE CONNECT by O. V. Lavrichenko

    Published 2014-12-01
    “…Author is considered the basics of the economic theory of the active connect as well as the necessit y of reducing the action of anthropogenic factors on the effectiveness of additive models and decision-making algorithms is provided. The study analyzed the necessit y economic valuation of theanthropogenic successions within the concept of a balanced distribution of the industrial enterprises innovative resources. …”
    Get full text
    Article
  12. 17032

    Causes and optimization of the false alarm rate of code review system by Yuanying XIAO, Yaodong YOU, Lixi XIANG

    Published 2020-12-01
    “…Code review technology has become a pivotal part in the construction of network security.Analysis of the test reports obtained by the current code auditing system shows that there are many false positives in the report.The shortcomings in the development of the code audit system were summarized,the principles of different detection algorithms were briefly described,the causes of false alarm rates were analyzed,corresponding optimization ideas were proposed,the technical principles of optimization were explained,and the application scenarios of optimization schemes were described.…”
    Get full text
    Article
  13. 17033

    Semi-Online Scheduling on Two Machines with GoS Levels and Partial Information of Processing Time by Taibo Luo, Yinfeng Xu

    Published 2014-01-01
    “…Respectively, for the three semi-online versions, we develop algorithms with competitive ratios of 3/2, 20/13, and 4/3 which are shown to be optimal.…”
    Get full text
    Article
  14. 17034

    Overview of programmable data plane technology by Xinxin TANG, Xuewen ZENG, Zhiyuan LING, Lei SONG

    Published 2023-04-01
    “…In software defined network, the programmability provided by the programmable data plane is the cornerstone of network function virtualization.The core of programmable data plane technology is programmability and packet processing performance.Firstly, the packet processing abstraction of existing data planes from the programmability of data planes was explored.Then, the existing data plane related technologies were discussed in detail in terms of the target platforms and related algorithms for data plane implementation, respectively.Finally, the key challenges of high-performance data plane technologies were discussed.…”
    Get full text
    Article
  15. 17035

    Novel ASON routing implementation by LI Jian, YANG Ai-ping, GU Wan-yi, ZHANG Jie

    Published 2006-01-01
    “…An OSPF-based ASON routing implementation was proposed.In the implementation a wavelength LSA and network node LSA were extended to distribute wavelength and topology information.The topology was discovered automatically and routing messages were delivered reliably.In addition,the RWA interface was designed to introduce RWA algorithms easily.The simulation results show that the routing protocol implementation could converge rapidly and could be extended easily at low protocol overhead.The routing information flooding trigger strategies and the feasibility of flooding wavelength information throughout the network are also analyzed.…”
    Get full text
    Article
  16. 17036

    Fixed Point Results in Fuzzy Strong Controlled Metric Spaces with an Application to the Domain Words by Aftab Hussain, Umar Ishtiaq, Hamed Al Sulami

    Published 2023-01-01
    “…Furthermore, we use our main result to obtain the existence of a solution for a recurrence problem linked with the study of Quicksort algorithms.…”
    Get full text
    Article
  17. 17037

    Zoomorphism, Biomimetics and Computational Design by Benedetta Terenzi, Saverio Mecca

    Published 2017-12-01
    “…It has likewise inspired the formalization of furnishings: from the animalières and zoomorphic propositions to the bionic that reinterprets the structure and mechanical behaviour, to the computational design experiments that shape the natural behaviors distilled in algorithms.…”
    Get full text
    Article
  18. 17038

    A mathematical model for antibiotic control of bacteria in peritoneal dialysis associated peritonitis by Colette Calmelet, John Hotchkiss, Philip Crooke

    Published 2014-08-01
    “…Using the model along with experimental data, clinical parameters, and physiological values, we compute variations in PD fluid distributions, drug concentrations, and number of bacteria in peritoneal and extra-peritoneal cavities. Scheduling algorithms for the PD exchanges that minimize bacteria count are investigated.…”
    Get full text
    Article
  19. 17039

    BESS-Set: A Dataset for Cybersecurity Monitoring in a Battery Energy Storage System by Giovanni Battista Gaggero, Alessandro Armellin, Giulio Ferro, Michela Robba, Paola Girdinio, Mario Marchese

    Published 2024-01-01
    “…In this context, there is a need to develop datasets of attacks on these systems to evaluate the risks and allow researchers to develop proper monitoring algorithms. This paper addresses this need by presenting BESS-Set, an open-source dataset for cybersecurity analysis of a Battery Energy Storage System (BESS).…”
    Get full text
    Article
  20. 17040

    Learning-Based Image Restorations of Sparse-View CT Data: Is It Reliable? by Philip Maurice Trapp, Elias Eulig, Joscha Maier, Frederic Ballach, Raoul Christoph, Ralf Christoph, Marc Kachelrieß

    Published 2025-02-01
    “…In addition, this work examines the influence of these methods on metrological specification measurements of CTs and the conclusions that can be drawn with regard to the objective specification of such algorithms.  …”
    Get full text
    Article