Showing 17,301 - 17,320 results of 19,511 for search '"algorithm"', query time: 0.12s Refine Results
  1. 17301

    Measuring Chern–Simons level k by braiding $$SU(2)_k$$ S U ( 2 ) k anyons by Artem Belov, Andrey Morozov

    Published 2025-01-01
    “…However, most discussed are the questions of using materials with known parameters and building corresponding quantum gates and algorithms. In this paper we discuss opposite problem of finding Chern–Simons level k in the unknown material. …”
    Get full text
    Article
  2. 17302

    POI recommendation by incorporating trust-distrust relationship in LBSN by Jinghua ZHU, Qian MING

    Published 2018-07-01
    “…POI (point of interest) recommendation is an important personalized service in the LBSN (location-based social network) which has wide applications such as popular sights recommendation and travel routes planning.Most existing collaborative filter algorithms make recommendation according to user similarity and location similarity,they don’t consider the trust relationship between users.And trust relationship is helpful to improve recommendation accuracy,robustness and user satisfaction.Firstly,the propagation property of trust and distrust relationship was analyzed.Then,the measurement and computation method of trust were given.Finally,a hybrid recommendation system which combined user similarity,geographical location similarity and trust relationship was proposed.The experiments results show that the hybrid recommendation is obviously superior to the traditional collaborative filtering in terms of results accuracy and user satisfaction.…”
    Get full text
    Article
  3. 17303

    Delay-Range-Dependent Stability Criteria for Takagi-Sugeno Fuzzy Systems with Fast Time-Varying Delays by Pin-Lin Liu

    Published 2012-01-01
    “…By developing delay decomposition approach, integral inequalities approach (IIA), and Leibniz-Newton formula, the information of the delayed plant states can be taken into full consideration, and new delay-dependent sufficient stability criteria are obtained in terms of linear matrix inequalities (LMIs) which can be easily solved by various optimization algorithms. Simulation examples show resulting criteria outperform all existing ones in the literature. …”
    Get full text
    Article
  4. 17304

    Internal risk assessment of development and implementation of the state programs by A. I. Denisova

    Published 2022-09-01
    “…The software implementation of the algorithms for the formation and evaluation of the program plan was carried out in the form of software developed by the author in the Python.…”
    Get full text
    Article
  5. 17305

    Clause complexing in research-article abstracts: Comparing human- and AI-generated texts by Leong Alvin Ping

    Published 2023-12-01
    “…Incorporating distinct grammatical features in the algorithms of AI-detection tools is crucially needed to enhance the reliability of their results. …”
    Get full text
    Article
  6. 17306

    TOC: Lightweight Event Tracing Using Online Compression for Networked Embedded Systems by Chenhong Cao, Wen Liu, Wei Dong, Jiajun Bu

    Published 2015-11-01
    “…Existing tracing approaches employ compression algorithms to reduce the trace size. However, these approaches either are inapplicable or perform poorly. …”
    Get full text
    Article
  7. 17307

    Android malware detection method based on deep neural network by Fan CHAO, Zhi YANG, Xuehui DU, Yan SUN

    Published 2020-10-01
    “…Android is increasingly facing the threat of malware attacks.It is difficult to effectively detect large-sample and multi-class malware for traditional machine learning methods such as support vector machine,method for Android malware detection and family classification based on deep neural network was proposed.Based on the comprehensive extraction of application components,Intent Filter,permissions,and data flow,the method performed an effective feature selection to reduce dimensions,and conducted a large-sample detection and multi-class classification for malware based on deep neural network.The experimental results show that the method can conduct an effective detection and classification.The accuracy of binary classification between benign and malicious Apps is 97.73%,and the accuracy of family multi-class classification can reach 93.54%,which is higher than other machine learning algorithms.…”
    Get full text
    Article
  8. 17308

    Method of anti-confusion texture feature descriptor for malware images by Yashu LIU, Zhihai WANG, Hanbing YAN, Yueran HOU, Yukun LAI

    Published 2018-11-01
    “…It is a new method that uses image processing and machine learning algorithms to classify malware samples in malware visualization field.The texture feature description method has great influence on the result.To solve this problem,a new method was presented that joints global feature of GIST with local features of LBP or dense SIFT in order to construct combinative descriptors of malware gray-scale images.Using those descriptors,the malware classification performance was greatly improved in contrast to traditional method,especially for those samples have higher similarity in the different families,or those have lower similarity in the same family.A lot of experiments show that new method is much more effective and general than traditional method.On the confusing dataset,the accuracy rate of classification has been greatly improved.…”
    Get full text
    Article
  9. 17309

    Social Media Use and Attitudes toward AI: The Mediating Roles of Perceived AI Fairness and Threat by Wenbo Li, Xia Zheng

    Published 2024-01-01
    “…A nationally representative two-wave longitudinal survey (N=5110) examined the mediating roles of perceived AI fairness and threat concerning three AI technologies: algorithms, facial recognition technology, and driverless passenger vehicles. …”
    Get full text
    Article
  10. 17310

    Research and design of hybrid scheduling system of node operating system for cyber physical systems by Xiao-zhou DU, Chen-hong CAO, Jian-zhong QIAO, Shu-kuan LIN

    Published 2013-12-01
    “…In accordance with the new characteristics of physical,internet and intelligence of CPS,a hybrid scheduling system was designed for CPS node operating system with real-time performance,flexibility,and adaptability.Based on the in-depth study of the intrinsic differences between event-driven scheduling mechanism and multithreaded one,a hybrid programming model was designed that combines collaborative multithread and hybrid stack management using adapter mechanism.A hybrid scheduling model was also designed that supports both event and thread task types.Reasonable real-time algorithms were implemented for verification.Experimental results show that the real-time per-formance of the scheduling system is obviously better than that of TinyOS,thus it is better suited for CPS than TinyOS does.…”
    Get full text
    Article
  11. 17311

    On the Use of Weighted Least Squares for Time Domain Modal Parameter Identification by Jonathan E. Cooper

    Published 2004-01-01
    “…A series of simulated tests demonstrate how the performance of conventional time domain algorithms can be improved significantly with little extra computational effort though the use of a Weighted Least Squares scheme.…”
    Get full text
    Article
  12. 17312

    Ant based approach to the optimal deployment in wireless sensor networks by LIU Wei1, CUI Li1

    Published 2009-01-01
    “…The most attractive ability of Easidesign is that it not only consider the different sink position but also guarantee the wholly connectivity between sink node and deployed sensor nodes. The algorithms key choice and pa-rameters setting to meet different practical requirements for certain applications are also studied through largely simulations. …”
    Get full text
    Article
  13. 17313

    Multi-scale crack closure measurements with digital image correlation on Haynes 230 by Stefano Beretta, Silvio Rabbolini, Angelo Di Bello, Huseyin Sehitoglu

    Published 2015-06-01
    “…Initially, full field regression algorithms were applied to extract the effective stress intensity factor ranges from the singular displacement field measured at crack tips. …”
    Get full text
    Article
  14. 17314

    SLSB-forest:approximate k nearest neighbors searching on high dimensional data by Tu QIAN, Jiangbo QIAN, Yihong DONG, Huahui CHEN

    Published 2017-09-01
    “…The study of approximate k nearest neighbors query has attracted broad attention.Local sensitive hash is one of the mainstream ways to solve this problem.Local sensitive hash and its varients have noted the following problems:the uneven distribution of hashed data in the buckets,it cannot calculate the appropriate query range (for the parameter k) to build index.To tackle the above problem,a new data struct which called SLSB-forest was presented.The SLSB-forest combined the LSH and the B-tree to maintain the amount of bucket’s data in reasonable range.Two query algorithms were proposed:fast and accurate priority search.Theory and experimental results prove that query range can dynamic change during searching approximate k nearest neighbors.…”
    Get full text
    Article
  15. 17315

    Evaluation of Texture and Shape Features for Classification of Four Paddy Varieties by Archana Chaugule, Suresh N. Mali

    Published 2014-01-01
    “…An evaluation of the classification accuracy of texture and shape features and neural network was done to classify four Paddy (rice) grains, namely, Karjat-6(K6), Ratnagiri-2(R2), Ratnagiri-4(R4), and Ratnagiri-24(R24). Algorithms were written to extract the features from the high-resolution images of kernels of four grain types and used as input features for classification. …”
    Get full text
    Article
  16. 17316

    Optical fiber eavesdropping detection method based on machine learning by Xiaolian CHEN, Yi QIN, Jie ZHANG, Yajie LI, Haokun SONG, Huibin ZHANG

    Published 2020-11-01
    “…Optical fiber eavesdropping is one of the major hidden dangers of power grid information security,but detection is difficult due to its high concealment.Aiming at the eavesdropping problems faced by communication networks,an optical fiber eavesdropping detection method based on machine learning was proposed.Firstly,seven-dimensions feature vector extraction method was designed based on the influence of eavesdropping on the physical layer of transmission.Then eavesdropping was simulated and experimental feature vectors were collected.Finally,two machine learning algorithms were used for classification detection and model optimization.Experiments show that the performance of the neural network classification is better than the K-nearest neighbor classification,and it can achieve 98.1% eavesdropping recognition rate in 10% splitting ratio eavesdropping.…”
    Get full text
    Article
  17. 17317

    A QoS-based network planning method for power fiber to the home by Shuai SHAO, Zhijun SHANG, Zhongfeng WANG, Guoliang XIN, Yueyue LI, Xiangyu KONG, Xujing PENG

    Published 2019-06-01
    “…A QoS-based network planning method for power fiber to the home was proposed.Firstly,the distribution structure of different buildings was combined to carry out targeted ODN line path design.Secondly,in the ONU packet cluster planning stage,in order to meet the QoS requirements of multi-service differentiation,the communication cost as the optimization goal was uesd,and the optimization problem model was established with the constraints of access capacity,reliability and delay.At the same time,intelligent algorithms were used to solve the optimization problem model.Finally,the optical path attenuation of the planned network was calculated to meet the actual application needs.The simulation results show that the proposed QoS-based network planning method for power fiber to the home can save network construction cost while ensuring service reliability and delay requirements.…”
    Get full text
    Article
  18. 17318

    Quantum-based wireless sensor networks: A review and open questions by Mario E Rivero-Angeles

    Published 2021-10-01
    “…Applications of quantum computing are growing at a very fast pace, for example, from quantum computers to quantum algorithms and even to the development of the quantum Internet. …”
    Get full text
    Article
  19. 17319

    Synthesis of Digital Automatic Control System for Non-Transformer Step-Up Converter of Constant Voltage by A. V. Mironovich, P. P. Primshits

    Published 2008-04-01
    “…The paper is devoted to investigation of semi-conductor pulse step-up converter of constant voltage which is operating in the boundary-continuous current mode of a choke with digital control. The algorithms that have been developed make it possible to calculate the given value of coke current and sustain its saw-shape form with the help of digital control device. …”
    Get full text
    Article
  20. 17320

    Tail Bounds for ℓ1 Norm of Gaussian Random Matrices with Applications by Xianjie Gao, Mingliang Zhang, Jinming Luo

    Published 2022-01-01
    “…Finally, we study the tail bounds for the parameter vector of some existing regularization algorithms.…”
    Get full text
    Article