Showing 4,121 - 4,140 results of 12,475 for search '"Algorithm"', query time: 0.12s Refine Results
  1. 4121

    Development of a Circular Nutrient Solution Management System Using a Cost Function by Yeong-Hyeon Shin, Insu Kim, Myongkyoon Yang, Young-Kyun Jang, Ronaldo B. Saludes, Hak-Jin Kim, Woo-Jae Cho

    Published 2024-12-01
    “…The developed algorithms adopt distinct cost functions to achieve their respective goals. …”
    Get full text
    Article
  2. 4122

    An indoor positioning method based on bluetooth array/PDR fusion using the SVD-EKF by Chenhui Li, Jie Zhen, Jianxin Wu

    Published 2025-02-01
    “…The dynamic test results in the room show that after SVD-EKF algorithm optimization, the positioning error is reduced by 0.05m, which is equivalent to the EKF algorithm. …”
    Get full text
    Article
  3. 4123

    Implementasi Algoritme Spongent sebagai Algoritme Hashing untuk Integritas pada Modul Komunikasi Lora by Ari Kusyanti, I Putu Agrahita Wiguna, Fariz Andri Bakhtiar

    Published 2023-12-01
    “…Data security can be done with hashing algorithms such as SPONGENT algorithm. The SPONGENT algorithm was chosen to ensure data integrity. …”
    Get full text
    Article
  4. 4124

    Fast Task Scheduling With Model Predictive Control Integrating a Priority-Based Heuristic by Francesco Liberati, Manuel Donsante, Chiara Maria Francesca Cirino, Andrea Tortorelli

    Published 2025-01-01
    “…This paper presents a scalable Model Predictive Control (MPC) algorithm for task scheduling and real time re-scheduling. …”
    Get full text
    Article
  5. 4125

    Spline approximation of multivalued functions in linear structures routing by D. A. Karpov, V. I. Struchenkov

    Published 2022-07-01
    “…An additional nonlinear programming algorithm was also used to optimize the parameters of the resulting spline as an initial approximation. …”
    Get full text
    Article
  6. 4126

    Theory and Numerical Analysis of Extreme Learning Machine and Its Application for Different Degrees of Defect Recognition of Hoisting Wire Rope by Zhike Zhao, Xiaoguang Zhang

    Published 2018-01-01
    “…The number change of the hidden nodes can serve as the computational updated step length of the ELM algorithm. In this paper, the improved algorithm can be called the variable step incremental extreme learning machine (VSI-ELM). …”
    Get full text
    Article
  7. 4127

    Optimal capacity planning with economic emission considerations in isolated solar-wind-diesel microgrid using combined arithmetic-golden jackal optimization by Sujoy Barua, Adel Merabet, Ahmed Al-Durra, Tarek El Fouly, Ehab F. El-Saadany

    Published 2025-01-01
    “…The results demonstrate significant cost savings using the solar-wind-diesel microgrid under the proposed combined optimization compared to the arithmetic optimization algorithm and golden jackal algorithm and conventional metaheuristic optimization based on genetic algorithms.…”
    Get full text
    Article
  8. 4128

    A Novel Fast Image Stitching Method Based on the Combination of SURF and Cell by Qing An, Xijiang Chen, Shusen Wu

    Published 2021-01-01
    “…Finally, the method uses the MSAC algorithm to perform fine matching. Then, the power function-weighted fusion algorithm is used to calculate the weight of the center point. …”
    Get full text
    Article
  9. 4129

    Segmentation of Pulmonary Vascular Trees from Thoracic 3D CT Images by Hidenori Shikata, Geoffrey McLennan, Eric A. Hoffman, Milan Sonka

    Published 2009-01-01
    “…This paper describes an algorithm for extracting pulmonary vascular trees (arteries plus veins) from three-dimensional (3D) thoracic computed tomographic (CT) images. …”
    Get full text
    Article
  10. 4130

    Adverse drug reactions in the ambulatory internal patients at the emergency department: Focus on causality assessment and drug-drug interactions by Verbič Matej Dobravc, Brvar Miran, Kos Mojca Kerec

    Published 2023-06-01
    “…A causality assessment algorithm was developed, which included Naranjo algorithm and levels of ADR recognition by the treating physician and the investigators. …”
    Get full text
    Article
  11. 4131

    FWA-SVM Network Intrusion Identification Technology for Network Security by Yaohui Zhang

    Published 2025-01-01
    “…Therefore, the study introduces the fireworks algorithm to improve it and optimize parameter selection and feature subset selection. …”
    Get full text
    Article
  12. 4132

    Emei Martial Arts Promotion Model and Properties Based on Neural Network Technology by Cheng Xing, N.E. Zainal Abidin, Yudong Tang

    Published 2022-01-01
    “…In order to enhance the effectiveness of the standard recommendation algorithm, a deep neural network-based recommendation algorithm is paired with a neural network-based recommendation algorithm that is proposed in this article. …”
    Get full text
    Article
  13. 4133

    Development and Supervision of Robo-Advisors under Digital Financial Inclusion in Complex Systems by Wensheng Dai

    Published 2021-01-01
    “…First, the traditional K-means algorithm is used to select the initial clustering center, to improve the noise and outlier processing capabilities, and to build a data mining system based on the improved algorithm. …”
    Get full text
    Article
  14. 4134

    Allocation of Interline Power Flow Controller-Based Congestion Management in Deregulated Power System by Muhammad Safdar Sial, Qinghua Fu, Talles Vianna Brugni

    Published 2022-04-01
    “…By examining the obtained results, the performance of the proposed algorithm is better than the Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) algorithms. …”
    Get full text
    Article
  15. 4135

    Dynamic Beamforming for Three-Dimensional MIMO Technique in LTE-Advanced Networks by Yan Li, Xiaodong Ji, Dong Liang, Yuan Li

    Published 2013-01-01
    “…Compared with the conventional 2D beamforming algorithm, throughput of cell edge UEs and cell center UEs can be improved by the proposed algorithm. …”
    Get full text
    Article
  16. 4136

    A Hybrid Prognostic Approach for Remaining Useful Life Prediction of Lithium-Ion Batteries by Wen-An Yang, Maohua Xiao, Wei Zhou, Yu Guo, Wenhe Liao

    Published 2016-01-01
    “…Empirical comparisons show that the proposed hybrid prognostic approach using the selective kernel ensemble-based RVM learning algorithm performs better than the hybrid prognostic approaches using the popular learning algorithms of feedforward artificial neural networks (ANNs) like the conventional backpropagation (BP) algorithm and support vector machines (SVMs). …”
    Get full text
    Article
  17. 4137

    Optimization of an Intelligent Sorting and Recycling System for Solid Waste Based on Image Recognition Technology by Haitao Chen

    Published 2021-01-01
    “…In this paper, the technique of image recognition algorithm is used to conduct an in-depth study and analysis of the intelligent classification and recycling system of solid waste and to optimize the design of its system. …”
    Get full text
    Article
  18. 4138

    Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras by Zhenlong Man, Jianmeng Liu, Fan Zhang, Xiangfu Meng

    Published 2025-02-01
    “…In order to solve the problems of key redundancy, transmission and storage security and the difficulty of realizing the one-time-secret mode in image encryption algorithm, this paper proposes a cloud dynamic public key information security scheme based on elliptic curve and primitive Pythagoras. …”
    Get full text
    Article
  19. 4139

    An efficient and resilience linear prefix approach for mining maximal frequent itemset using clustering by M. Sinthuja, S. Pravinthraja, B K Dhanalakshmi, H L Gururaj, Vinayakumar Ravi, G Jyothish Lal

    Published 2025-03-01
    “…The performance of the proposed CL-LP-MAX-tree was evaluated by comparing it with the existing FP-max algorithm. Experimentation was performed with the three different standard datasets to record evidence to prove that the proposed CL-LP-MAX-tree algorithm outperform the existing FP-max algorithm in terms of runtime and memory consumption.…”
    Get full text
    Article
  20. 4140

    An Efficient Policy-Based Scheduling and Allocation of Virtual Machines in Cloud Computing Environment by S. Supreeth, Kirankumari Patil, Shantala Devi Patil, S. Rohith, Y. Vishwanath, K. S. Venkatesh Prasad

    Published 2022-01-01
    “…Hence, for executing optimal VMS and VMA in the data center, new optimization methodologies, such as enhanced shark smell optimization algorithm (ESSOA) at the first level and Brownian movement-centered gravitation search algorithm (BMGSA) at the second level, are proposed in this work to define the policies. …”
    Get full text
    Article