Showing 17,541 - 17,560 results of 19,511 for search '"algorithm"', query time: 0.10s Refine Results
  1. 17541

    Maximum Likelihood Inference for Univariate Delay Differential Equation Models with Multiple Delays by Ahmed A. Mahmoud, Sarat C. Dass, Mohana S. Muthuvalu, Vijanth S. Asirvadam

    Published 2017-01-01
    “…The maximum likelihood estimator is obtained based on adaptive grid and Newton-Raphson algorithms. Our methodology estimates correctly the delay parameters as well as other unknown parameters (such as the initial starting values) of the dynamical system based on simulation data. …”
    Get full text
    Article
  2. 17542

    Pareto Optimality Conditions and Duality for Vector Quadratic Fractional Optimization Problems by W. A. Oliveira, A. Beato-Moreno, A. C. Moretti, L. L. Salles Neto

    Published 2014-01-01
    “…These conditions might be useful to determine termination criteria in the development of algorithms.…”
    Get full text
    Article
  3. 17543

    Recommendation system for billing offers in retail business CRM of a lending agency by Alexander A. Kovalev, A.V. Mezhuev

    Published 2024-10-01
    “…The architecture and algorithms for developing of this system are proposed, taking into account the specifics of banking data and business processes. …”
    Get full text
    Article
  4. 17544

    Design and digital transition. New design-driven challenges for techno-social innovation by Salvatore Di Dio, Benedetto Inzerillo, Francesco Monterosso, Dario Russo

    Published 2022-12-01
    “… How can it be possible to work salvifically on an asphyxiated society that is being dragged down by turbo-capitalism, the ‘soft tyranny’ of algorithms and ‘data-cracy’ and marked by hegemonic and centralised socio-technical systems? …”
    Get full text
    Article
  5. 17545

    Grad Ready: Enhancing graduate readiness through intelligent mobile application by Hanan ALOTAIBI, Shireen S. SAIFUDDIN

    Published 2024-12-01
    “…It is an intelligent mobile app that bridges the gap between academic knowledge and the professional skill requirements for computer science graduates using matching algorithms to enable companies to target and recruit them. …”
    Get full text
    Article
  6. 17546

    Multi‐Model Ensembles for Upper Atmosphere Models by S. Elvidge, S. R. Granados, M. J. Angling, M. K. Brown, D. R. Themens, A. G. Wood

    Published 2023-03-01
    “…Abstract Multi‐model ensembles (MMEs) are used to improve the forecasts of thermospheric neutral densities. A variety of algorithms for constructing the model weights for the MMEs are described and have been implemented including: performance weighting, independence weighting, and non‐negative least squares. …”
    Get full text
    Article
  7. 17547

    Hybrid Quantum Cycle Generative Adversarial Network for Small Molecule Generation by Matvei Anoshin, Asel Sagingalieva, Christopher Mansell, Dmitry Zhiganov, Vishal Shete, Markus Pflitsch, Alexey Melnikov

    Published 2024-01-01
    “…The new hybrid quantum machine learning algorithms, as well as the achieved scores of pharmacokinetic properties, contribute to the development of fast and accurate drug discovery processes.…”
    Get full text
    Article
  8. 17548

    MODERN ARCHITECTURE BOARD INFORMATION AND CONTROL SYSTEMS OF HEAVY VEHICLES by V. V. Filinov, S. A. Mikaeva, M. S. Rodyukov, A. V. Filinova

    Published 2017-06-01
    “…Therefore, MN and MAN carry different information about the physical and mechanical properties of steels, and the parameters of their signals in interrelation can be used to construct new algorithms for monitoring and diagnosing the physical and mechanical properties of articles made of ferromagnetic materials, for example, the stressed state of the critical products from these steels. …”
    Get full text
    Article
  9. 17549

    Development and Evaluation of Customized Bike Saddle Pads Using Innovative Design for AM Approaches and Suitable Additive Manufacturing Processes by Sebastian Geyer, Jonas Schwemmer, Christian Hölzl

    Published 2025-01-01
    “…Design for additive manufacturing (DfAM) has made significant advancements in recent years, with development focusing on pivotal aspects such as topology optimization (TO), generative design (GD), lattice structures, and AI-based algorithms. This paper puts forth a proposed methodology for the development of customizable bike saddle pads for manufacturing with AM. …”
    Get full text
    Article
  10. 17550

    TV-Based Caring Videophone System for the Elderly in the Smart Home Environment by Jingshuang Shen, Chongyang Zhang, Chuanwen Jiang

    Published 2013-01-01
    “…Based on Support Vector Machine (SVM) algorithms, an evaluation model is also developed with the data collected from the embedded multimedia device. …”
    Get full text
    Article
  11. 17551

    A Novel Approximation Method for Solving Ordinary Differential Equations Using the Representation of Ball Curves by Abdul Hadi Bhatti, Sharmila Karim, Ala Amourah, Ali Fareed Jameel, Feras Yousef, Nidal Anakira

    Published 2025-01-01
    “…To achieve minimal error and higher accuracy in approximate solutions, researchers have focused on developing algorithms using various numerical techniques. This study proposes the application of Ball curves, specifically the Said–Ball curve, for estimating solutions to higher-order ODEs. …”
    Get full text
    Article
  12. 17552

    Layered Capacity-Based Relay-and-Antenna Joint Selection for MIMO-AF-Multiple-Relay Systems in Correlated Channels by Chia-Chang Hu, Jheng-Siang Li, Bo-Liang Wu

    Published 2012-01-01
    “…Finally, simulations are conducted to compare the channel capacity of the proposed two-layered antenna selection technique with other existing antenna selection algorithms for half-duplex AF-MIMO multiple-relay systems.…”
    Get full text
    Article
  13. 17553

    Sarcasm Text Detection on News Headlines Using Novel Hybrid Machine Learning Techniques by Neha Singh, Umesh Chandra Jaiswal

    Published 2024-06-01
    “…To identify humorous news headlines, this article assessed vectorization algorithms and several machine learning models. The recommended hybrid technique using the bag-of-words and TF-IDF feature vectorization models is compared experimentally to other machine learning approaches. …”
    Get full text
    Article
  14. 17554

    Active Disturbance Rejection Synchronization of Morris-Lecar Neurons by Wei Wei, Yanjie Shao, Min Zuo

    Published 2018-01-01
    “…Numerous reported synchronization algorithms are designed on the basis of neural model, but they have deficiencies like relatively complex and poor robustness and are difficult to be realized. …”
    Get full text
    Article
  15. 17555

    Modern aspects of diagnostics and treatment of <i>H. pylori</i> infection from standpoint of stomach cancer prophylaxis by A. A. Sheptulin, T. L. Lapina

    Published 2015-03-01
    “…According to conclusion of the majority of publications and data of meta-analyses, nowadays both bismuth-based and bismuth-free quadrotherapy are considered as the most effective treatment algorithms.Conclusion. For estimation of role of H. pylori infection in development of various diseases, and to improve management of patients further studies are required.…”
    Get full text
    Article
  16. 17556

    Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X by Yinghui ZHANG, Jiale QIAN, Jin CAO, Dong ZHENG

    Published 2023-08-01
    “…Aiming at the efficiency issue of handover authentication for a large number of vehicles in the 5G-V2X scenario, a secure and efficient group handover authentication protocol based on trajectory prediction was proposed.Firstly, the effect of completing key agreement protocol in advance was achieved by predicting vehicle trajectories.Secondly, vehicles with mobility relevance were treated as the same group through user grouping algorithms, and then all vehicles within the group were batch verified using certificateless aggregation signature technology.In addition, to address the vulnerability of aggregated signature technology to DoS attacks, a binary search method was used to quickly locate malicious users and improve the efficiency of group handover authentication protocol.Finally, the security analysis of the protocol was conducted using the formal verification tool Scyther, and compared with the existing optimal protocol, the computational efficiency is improved by 30%.…”
    Get full text
    Article
  17. 17557

    Interferon-free therapy of chronic hepatitis C: replacement of medications or new treatment paradigm? by S. N. Batskikh

    Published 2014-10-01
    “…New variants of the AVT providing combined application of agents with direct antiviral action (without interferon and ribavirin), will allow to simplify algorithms principally, decrease terms and improve efficacy of treatment in all categories of patients. …”
    Get full text
    Article
  18. 17558

    A Real-Time Facial Expression Recognition System for Online Games by Ce Zhan, Wanqing Li, Philip Ogunbona, Farzad Safaei

    Published 2008-01-01
    “…To meet the specific requirements of such a system, a number of algorithms are studied, improved, and extended. In particular, Viola and Jones face-detection method is extended to detect small-scale key facial components; and fixed facial landmarks are used to reduce the computational load with little performance degradation in the recognition accuracy.…”
    Get full text
    Article
  19. 17559

    Virtual assistant robot for physical training exercises supervision by Robinson Jimenez-Moreno, Anny Astrid Espitia Cubillos, Esperanza Rodríguez Carmona

    Published 2024-11-01
    “…To do this, deep learning algorithms such as convolutional networks and short- and long-term memory networks are used to recognize voice commands and the user's video actions. …”
    Get full text
    Article
  20. 17560

    Video Denoising Based on a Spatiotemporal Kalman-Bilateral Mixture Model by Chenglin Zuo, Yu Liu, Xin Tan, Wei Wang, Maojun Zhang

    Published 2013-01-01
    “…Experimental results show that the performance of our proposed method is competitive when compared with state-of-the-art video denoising algorithms based on both peak signal-to-noise-ratio and structural similarity evaluations.…”
    Get full text
    Article