-
341
Fruit size prediction of tomato cultivars using machine learning algorithms
Published 2025-01-01“…We aimed to develop a method for early prediction of tomato fruit size at harvest with machine learning algorithm, and three machine learning models (Ridge Regression, Extra Tree Regrreion, CatBoost Regression) were compared using the PyCaret package for Python. …”
Get full text
Article -
342
Receiver Diversity Combining Using Evolutionary Algorithms in Rayleigh Fading Channel
Published 2014-01-01“…In this paper, an imperialistic competitive algorithm (ICA) is proposed and compared with two other evolutionary based algorithms, namely, particle swarm optimization (PSO) and genetic algorithm (GA), for diversity combining of signals travelling across the imperfect channels. …”
Get full text
Article -
343
APPLICATION OF ARTIFICIAL INTELLEGENCE ALGORITHMS TO CONTROL THE USE OF FLOOD-PRONE AREAS
Published 2021-06-01“…The analysis of satellite images, being a laborious task, can be automated through the use of specially trained convolutional neural networks of semantic segmentation based on the algorithm proposed in this article. In this work, on the previously identified flooding zones, using remote sensing data, development objects are automatically determined (segmented) for different times and, by combining information at different times, an assessment of the intensity of this construction in the inter-flood period is made. …”
Article -
344
Analysis of constant modulus blind equalization algorithms base on "data reuse"
Published 2009-01-01Subjects: Get full text
Article -
345
STUDY ON NEUTRON – GAMMA PULSE SHAPE DISCRIMINATION ALGORITHMS FOR SCINTILLATION DETECTOR
Published 2016-09-01“…The four neutron - gamma pulsed shape discrimination algorithms for the model NE213 scintillation detector by using digital signal processing were developed. …”
Get full text
Article -
346
High accuracy channel estimation algorithms for multi-cell joint detection
Published 2008-01-01“…The conventional channel estimation algorithm used in the current TD-SCDMA system can not be expanded to multi-cell joint detection for its low channel estimation accuracy for adjacent cells. …”
Get full text
Article -
347
Optimization of Depth Map Intra Coding Algorithms Based on Machine Learning
Published 2025-01-01“…Building on existing research, this study aims to develop a 3D video coding algorithm based on VVC that lowers the complexity of the encoding procedure. …”
Get full text
Article -
348
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
Published 2023-03-01“…Abstract In this survey, the authors review the main quantum algorithms for solving the computational problems that serve as hardness assumptions for cryptosystem. …”
Get full text
Article -
349
FDK-Type Algorithms with No Backprojection Weight for Circular and Helical Scan CT
Published 2012-01-01“…The efficient algorithms are compared with the FDK algorithm, Hu's algorithm, T-FDK, and Zhu et al.'…”
Get full text
Article -
350
Assessment Method of Multipath Mitigation Performance for GNSS Antenna with Receiver Algorithms
Published 2017-01-01“…The model analyzes effects caused by inclined reflective surfaces and multipath mitigating algorithms in receivers. A method to assess multipath mitigation performance is put forward by analyzing pseudorange code phase errors caused by multipath signals after signal processing. …”
Get full text
Article -
351
Research on algorithms of data encryption scheme that supports homomorphic arithmetical operations
Published 2015-01-01“…An efficient homomorphic encryption scheme called CESIL was proposed to meet the requirements of operating on encrypted data when protecting users' privacy in computing services.CESIL included key generation algorithm,encryption algorithm,decryption algorithm and calculation algorithm.In CESIL,a polynomial coefficient vector ring was established by defining addition and multiplication using polynomial ring; by using ideal lattice,the vector ring was partitioned into many residue classes to produce a quotient ring and its representative set; the plaintext was encrypted by mapping it to a representative and replacing the representative with another element in the same residue class.The features of operations in quotient ring ensured CESIL operate on encrypted data.Furthermore,the fast Fourier transform (FFT) algorithm was used to increase the efficiency and decrease the length of key.Theoretical analysis and experimental results show that CESIL is semantically secure,and can do addition and multiplication operations on encrypted data homomorphically in a specific scope.Comparing to some existing homomorphic encryption schemes,the CESIL runs efficiently,and has shorter length in key and ciphertext.Thus,the CESIL fits the practical applications better.…”
Get full text
Article -
352
Biobjective Optimization Algorithms Using Neumann Series Expansion for Engineering Design
Published 2018-01-01“…In this paper, two novel algorithms are designed for solving biobjective optimization engineering problems. …”
Get full text
Article -
353
Optimal Scheduling for Retrieval Jobs in Double-Deep AS/RS by Evolutionary Algorithms
Published 2013-01-01“…Three types of evolutionary algorithms, the Genetic Algorithm (GA), the Immune Genetic Algorithm (IGA), and the Particle Swarm Optimization (PSO) algorithm, are implemented to obtain the optimal assignments. …”
Get full text
Article -
354
Efficient Algorithms for Optimal 4-Bit Reversible Logic System Synthesis
Published 2013-01-01“…We mainly absorb the ideas of our 3-bit synthesis algorithms based on hash table and present the efficient algorithms which can construct almost all optimal 4-bit reversible logic circuits with many types of gates and at mini-length cost based on constructing the shortest coding and the specific topological compression; thus, the lossless compression ratio of the space of n-bit circuits reaches near 2×n!. …”
Get full text
Article -
355
Inexact Exponential Penalty Function with the Augmented Lagrangian for Multiobjective Optimization Algorithms
Published 2024-01-01“…This paper uses an augmented Lagrangian method based on an inexact exponential penalty function to solve constrained multiobjective optimization problems. Two algorithms have been proposed in this study. The first algorithm uses a projected gradient, while the second uses the steepest descent method. …”
Get full text
Article -
356
A Complication of Negative Resistance Circuits Generated by Two Novel Algorithms
Published 2002-01-01“…There are two algorithms to generate a negative-resistance device which exhibits either a type-N shaped V-1 characteristic similar to a tunnel diode, or a type-S shaped V-1 characteristic similar to a four layered pnpn diode. …”
Get full text
Article -
357
Variational Quantum Algorithms for the Allocation of Resources in a Cloud/Edge Architecture
Published 2024-01-01“…In this article, we explore the possibility of solving this problem with variational quantum algorithms, which can become a viable alternative to classical algorithms in the near future. …”
Get full text
Article -
358
Implementation of Haar Cascade and Adaboost Algorithms in Photo Classification on Social Networks
Published 2023-06-01“…Results: Two of her classification algorithms, Haar Cascade and Adaboost, were used in this study. …”
Get full text
Article -
359
Short-Term Prediction of Electronic Transformer Error Based on Intelligent Algorithms
Published 2020-01-01Get full text
Article -
360
Algorithms for the Shortest Path Improvement Problems under Unit Hamming Distance
Published 2013-01-01“…Some strongly polynomial time algorithms are designed for the problems on some special arborescent networks. …”
Get full text
Article