-
2581
An Algorithm for Correcting Levels of Useful Signals on Interpretation of Eddy-Current Defectograms
Published 2021-03-01“…Examples of the algorithm’s operation on real eddy-current data are given.…”
Get full text
Article -
2582
A coverage algorithm based on D-S theory for directional sensor networks
Published 2016-09-01“…The proposed algorithm uses fewer nodes to achieve the target coverage and meet the required overall coverage level. …”
Get full text
Article -
2583
Analysis Algorithm of Biomedical Signals in Remote Monitoring Systems of Human Health
Published 2023-03-01“…The article considers the problems of adaptation of existing and development of new diagnostic algorithms and methods of remote monitoring of the physiological state of a person in relation to the Internet of Things technology. …”
Get full text
Article -
2584
Therapeutic eyelids hygiene in the algorithms of prevention and treatment of ocular surface diseases
Published 2016-07-01“…The first part of the article presents the treatment and prevention algorithms for dysfunction of the meibomian glands, as well as demodectic blepharitis.…”
Get full text
Article -
2585
Cycle Polling Algorithm Optimization andSimulation Research of MVB Network
Published 2013-01-01“…The MVB master realized the real-time scheduling on periodicdata with preset period pollingtable.This article focused on thebad performance of information load uniformity based on the period pollingtable in tradition way. …”
Get full text
Article -
2586
Use of schedule theory algorithms for task planning and time management tasks
Published 2024-10-01“…In this article, we propose a hybrid algorithm that combines elements of evolutionary and greedy approaches to solve the problems of schedule theory. …”
Get full text
Article -
2587
INTERACTIVE ALGORITHM FOR SELECTION OF LINEAR OBJECTS ON AERIAL PHOTOGRAPHS AND SATELLITE IMAGES
Published 2016-10-01“…The developed parallel program implementation allowed to reduce the execution time of the algorithm by several orders. Estimates of execution time of versions of the algorithm, which are intended for video cards, are given in the article.…”
Get full text
Article -
2588
When algorithmic management was new: Engineered standards and the managerial prerogative in Australia
Published 2025-05-01“…In this article we analyse the significance for critical logistics studies of a neglected chapter in industrial relations history, the introduction of so-called ‘Engineered Standards’ into the Australian food and groceries sector in the late 1980s and early 1990s. …”
Get full text
Article -
2589
Consensus-based sparse signal reconstruction algorithm for wireless sensor networks
Published 2016-09-01“…This article presents a distributed Bayesian reconstruction algorithm for wireless sensor networks to reconstruct the sparse signals based on variational sparse Bayesian learning and consensus filter. …”
Get full text
Article -
2590
Constructive algorithms for forming compound cubic Bezier curves in space and on plane
Published 2022-04-01“…The article considers two graph-analytical algorithms. …”
Get full text
Article -
2591
An Algorithm of Decomposing the Trend and Cyclical Components of FDI Inflows: the Case of Ukraine
Published 2020-10-01Get full text
Article -
2592
Didactic potential of using systems for visualization of algorithms in the process of teaching programming
Published 2019-05-01“…The article is devoted to the didactic potential on the use of the visualizer of algorithms as software, which graphically demonstrates the work of algorithms for processing input data. …”
Get full text
Article -
2593
Application of modified genetic algorithms for solving evolutionary problems of the theory of schedules
Published 2023-08-01“…Objective. The article proposes ways to modify genetic algorithms used to automate the process of scheduling.Method. …”
Get full text
Article -
2594
GravCPA: Controller Placement Algorithm Based on Traffic Gravitation in SDN
Published 2022-01-01“…The simulation experiments show the effectiveness of the proposed algorithm and the time complexity guarantee for large-scale networks.…”
Get full text
Article -
2595
A Hybrid Security Algorithm AES and Blowfish for Authentication in Mobile Applications
Published 2018-05-01“…Tus, the security of authentication in the mobile application needs to be improved to avoid a hacker attack. This article presents an authentication in the mobile application to the server using a hybrid of cryptographic algorithm Advanced Encryption Standard (AES) and Blowfish. …”
Get full text
Article -
2596
Wireless sensor indoor positioning based on an improved particle filter algorithm
Published 2020-02-01“…In order to solve this problem, this article proposes an improved particle filter algorithm, which introduces the idea of residual analysis to improve reliability. …”
Get full text
Article -
2597
Micromedia News Dissemination Impact Assessment Integrated with Personalized Recommendation Algorithm
Published 2021-01-01“…Therefore, it is necessary to innovate methods for evaluating the effects of new media news dissemination. This article mainly combines personalized recommendation algorithms to evaluate the effectiveness of news dissemination. …”
Get full text
Article -
2598
Application of Artificial Intelligence with Ant Colony Algorithm in construction projects schedule
Published 2018-11-01“…In this article, the methods of solving and characteristics of issuesThe timing of the projects and the work done in this area has been studied and compared. …”
Get full text
Article -
2599
The algorithm for applying the process maturity model to improve business processes in organization
Published 2023-09-01“…An algorithm for applying these models is developed. Theoretical principles for the development of the algorithm are represented. …”
Get full text
Article -
2600
Improved simultaneous localization and mapping algorithm combined with semantic segmentation model
Published 2021-04-01“…In order to reduce the influence of dynamic objects, this article proposes an improved simultaneous localization and mapping algorithm combined with semantic segmentation model. …”
Get full text
Article