Showing 1,841 - 1,860 results of 19,511 for search '"algorithm"', query time: 0.09s Refine Results
  1. 1841

    Plant Disease Identification Based on Deep Learning Algorithm in Smart Farming by Yan Guo, Jin Zhang, Chengxin Yin, Xiaonan Hu, Yu Zou, Zhipeng Xue, Wei Wang

    Published 2020-01-01
    “…Then, images segmented based on the results of RPN algorithm contain the feature of symptoms through Chan–Vese (CV) algorithm. …”
    Get full text
    Article
  2. 1842
  3. 1843

    Robust Nonlinear Partial Least Squares Regression Using the BACON Algorithm by Abdelmounaim Kerkri, Jelloul Allal, Zoubir Zarrouk

    Published 2018-01-01
    “…The difference between QPLS2 and the regular PLS algorithm is the use of quadratic regression instead of OLS regression in the calculations of latent variables. …”
    Get full text
    Article
  4. 1844
  5. 1845

    Algorithm and mathematical model for geometric positioning of segments on aspherical composite mirror by B. Conquet, L. F. Zambrano, N. K. Artyukhina, R. V. Fiodоrtsev, A. R. Silie

    Published 2018-09-01
    “…The variant of construction of arrays through concentric rings of an equal step is offered.A sequential three-step method for distributing mosaic segments is presented when performing calculations for aligning the aspherical surface: multipath linear; multipath point; block trapezoidal.In the course of mathematical modeling an algorithm was developed to solve the problem of geometric positioning of flat hexagonal segments of a mirror telescope. …”
    Get full text
    Article
  6. 1846

    Beetle Swarm Optimization Algorithm-Based Load Control with Electricity Storage by Hengjing He, Shangli Zhou, Leping Zhang, Junhong Lin, Weile Chen, Di Wu

    Published 2020-01-01
    “…Simulation results verify the effectiveness of the algorithm.…”
    Get full text
    Article
  7. 1847

    Multimedia Image Encryption Analysis Based on High-Dimensional Chaos Algorithm by Xing Zhang

    Published 2021-01-01
    “…Compared with the traditional encryption system, encryption algorithms based on chaos are easier to implement, which makes them more suitable for large-scale data encryption. …”
    Get full text
    Article
  8. 1848

    Design and implementation algorithm of safe driver assistant system based on EOG by Zhao LYU, Xiao-pei WU, Chao ZHANG, Bing WEI

    Published 2016-07-01
    “…Experiential results re-veal that the SDAS based on the multi-class saccade signals recognition algorithm presents an excellent classification per-formance.…”
    Get full text
    Article
  9. 1849

    Routing discovery algorithm based on reliable path stability estimation in MANET by Zhi-nan LI, Xiao-dong YANG

    Published 2016-08-01
    “…A novel routing discovery algorithm for MANETs was proposed based on reliable residual path lifetime (RPL) prediction (RLE-RPLP).Correlation between residual link lifetime (RLL) of neighboring links was explicitly investigated and fully taken into account in stability estimation of multi-hop paths in the algorithm.Optimized RPL statistical proper-ties were further explored to offer a more reliable path stability metric.Simulation analysis demonstrates that the pro-posed RLE-RPLP routing discovery algorithm shows prominent superiority in improving network throughput and reduc-ing route reconstruction frequency.Moreover,compared with the existing link stability-aware routing protocol,the RLE-RPLP achieves better performance improvement in terms of throughput and routing overhead.…”
    Get full text
    Article
  10. 1850

    Strong Convergence of a Monotone Projection Algorithm in a Banach Space by Songtao Lv

    Published 2013-01-01
    “…Strong convergence of the monotone projection algorithm for monotone operators and bifunctions is obtained in a reflexive Banach space.…”
    Get full text
    Article
  11. 1851

    A Study on Iterative Algorithm for Stochastic Distribution Free Inventory Models by Jennifer Lin

    Published 2013-01-01
    “…We studied the iterative algorithm in Tung et al. (2010) to find out that their assertion is questionable. …”
    Get full text
    Article
  12. 1852

    Vehicle classification algorithm based on binary proximity sensors and neural networks by ZHANG Wei, TAN Guo-zhen, DING Nan, SHANG Yao

    Published 2008-01-01
    “…To improve the classification accuracy, a new algorithm was developed with binary proximity magnetic sen- sors and back propagation neural networks. …”
    Get full text
    Article
  13. 1853
  14. 1854

    An Improved Integrated Scheduling Algorithm with Process Sequence Time-Selective Strategy by Zhen Wang, Xiaohuan Zhang, Gang Peng

    Published 2021-01-01
    “…The integrated scheduling algorithm of process sequence time-selective strategy (ISAOPSTSS) is an advanced algorithm in the field of integrated scheduling. …”
    Get full text
    Article
  15. 1855

    Path Planning Algorithm for Manipulators in Complex Scenes Based on Improved RRT* by Xiqing Zhang, Pengyu Wang, Yongrui Guo, Qianqian Han, Kuoran Zhang

    Published 2025-01-01
    “…The effectiveness and superiority of the improved algorithm are determined by comparing it with the existing algorithms.…”
    Get full text
    Article
  16. 1856

    Joint admission control algorithm based on load transfer in heterogeneous networks by Weiwei XIA, Zhaoming DING, Lianfeng SHEN

    Published 2018-05-01
    “…A load-transfer-based joint admission control (LJAC) algorithm in heterogeneous networks was proposed.The access requirements of users were admitted based on load balancing,the dynamic load transfer of traffics in the overlapping coverage areas of heterogeneous networks were introduced,and the influence of such factors as the layout of heterogeneous networks and the vertical handoff was considered in the algorithm.The integrated system of heterogeneous networks was modeled as a multidimensional Markov chain,the steady-state probabilities were obtained and the quality of service (QoS) performance metrics were derived.Based on the Poisson point process theory,the upper bound of capacity of the heterogeneous networks satisfying QoS limitations was obtained.The admission control parameters of the integrated system of heterogeneous networks were optimized in order to maximize the resource utilization rate as well as guaranteeing the QoS of users.The simulation results demonstrate lower traffic blocking probability,lower failure probability of vertical handoff requirements,and larger system capacity gain can be achieved by using the proposed LJAC algorithm.…”
    Get full text
    Article
  17. 1857

    Multi-query based key node mining algorithm for social networks by Guodong XIN, Tengwei ZHU, Junheng HUANG, Jiayang Wei, Runxuan Liu, Wei WANG

    Published 2024-02-01
    “…Mining key nodes in complex networks has been a hotly debated topic as it played an important role in solving real-world problems.However, the existing key node mining algorithms focused on finding key nodes from a global perspective.This approach became problematic for large-scale social networks due to the unacceptable storage and computing resource overhead and the inability to utilize known query node information.A key node mining algorithm based on multiple query nodes was proposed to address the issue of key suspect mining.In this method, the known suspects were treated as query nodes, and the local topology was extracted.By calculating the critical degree of non-query nodes in the local topology, nodes with higher critical degrees were selected for recommendation.Aiming to overcome the high computational complexity of key node mining and the difficulty of effectively utilizing known query node information in existing methods, a two-stage key node mining algorithm based on multi-query was proposed to integrate the local topology information and the global node aggregation feature information of multiple query nodes.It reduced the calculation range from global to local and quantified the criticality of related nodes.Specifically, the local topology of multiple query nodes was obtained using the random walk algorithm with restart strategy.An unsupervised graph neural network model was constructed based on the graphsage model to obtain the embedding vector of nodes.The model combined the unique characteristics of nodes with the aggregation characteristics of neighbors to generate the embedding vector, providing input for similarity calculations in the algorithm framework.Finally, the criticality of nodes in the local topology was measured based on their similarity to the features of the query nodes.Experimental results demonstrated that the proposed algorithm outperformed traditional key node mining algorithms in terms of time efficiency and result effectiveness.…”
    Get full text
    Article
  18. 1858
  19. 1859

    Optimization of Cultural and Creative Product Design Based on Simulated Annealing Algorithm by Xianzhe Meng

    Published 2021-01-01
    “…This paper introduces the basic principle and application process of simulated annealing algorithm and improves the simulated annealing algorithm so that it can converge faster to get the new parameters of cultural and creative product design and make it more in line with the reality of engineering optimization. …”
    Get full text
    Article
  20. 1860

    Meta-path convolution based heterogeneous graph neural network algorithm by QIN Zhilong, DENG Kun, LIU Xingyan

    Published 2024-03-01
    “…To solve this problem, a heterogeneous graph neural network algorithm based on meta-path convolution was proposed. …”
    Get full text
    Article