Showing 2,021 - 2,040 results of 2,763 for search '(cooperation OR composition) algorithm', query time: 0.14s Refine Results
  1. 2021

    Predictive Study on the Cutting Energy Efficiency of Dredgers Based on Specific Cutting Energy by Junlang Yuan, Ke Yang, Taiwei Yang, Haoran Xu, Ting Xiong, Shidong Fan

    Published 2025-03-01
    “…Subsequently, five machine learning algorithms, such as RF and XGBoost, are used in combination with a grid search to find the optimal hyperparameters, and Lasso is used as the meta-learner to integrate the prediction results. …”
    Get full text
    Article
  2. 2022

    Multi-Objective Optimal Scheduling of Water Transmission and Distribution Channel Gate Groups Based on Machine Learning by Yiying Du, Chaoyue Zhang, Rong Wei, Li Cao, Tiantian Zhao, Wene Wang, Xiaotao Hu

    Published 2025-06-01
    “…The NSGA-II multi-objective optimisation algorithm is used to minimise the water distribution error and the water level deviation before the gate as the objective function in order to achieve global optimisation of the regulation of the complex canal system. …”
    Get full text
    Article
  3. 2023

    A Novel High-Precision Workpiece Self-Positioning Method for Improving the Convergence Ratio of Optical Components in Magnetorheological Finishing by Yiang Zhang, Pengxiang Wang, Chaoliang Guan, Meng Liu, Xiaoqiang Peng, Hao Hu

    Published 2025-06-01
    “…Further, based on these thresholds, a hybrid self-positioning method combining machine vision and a probing module is proposed. A composite data acquisition method using both a camera and probe is designed, and a stepwise global optimization model is constructed by integrating a synchronous iterative localization algorithm with the Non-dominated Sorting Genetic Algorithm II (NSGA-II). …”
    Get full text
    Article
  4. 2024

    Pion pair production in e + e − annihilation at next-to-leading order matched to Parton Shower by Ettore Budassi, Carlo M. Carloni Calame, Marco Ghilardi, Andrea Gurgone, Guido Montagna, Mauro Moretti, Oreste Nicrosini, Fulvio Piccinini, Francesco P. Ucci

    Published 2025-05-01
    “…In order to contribute to an improved theoretical description and simulation of energy scan experiments, we present a calculation of the e + e − → π + π −(γ) hadronic channel at next-to-leading order matched to a Parton Shower algorithm in QED and sQED. According to the recent advances in the literature, particular attention is paid to the treatment of the pion composite structure in loop diagrams beyond the commonly used factorised sQED approach, as well as to the modelling of multiple photon radiation through the Parton Shower algorithm. …”
    Get full text
    Article
  5. 2025

    Big data and data science in global governance: anticipating future needs and applications in the UN and beyond by Lanxin Li, Jiarou Wang, Xi Wang, Peng Peng, Jiaying Shen, Haining Zhu, Ziyang Zhang

    Published 2025-08-01
    “…We assess technical, ethical, and organizational challenges, including data quality inconsistencies, interoperability issues, privacy concerns, algorithmic bias, and resource constraints that impede the full integration of big data into governance systems. …”
    Get full text
    Article
  6. 2026

    Comparing Grid Model Fitting Methodologies for Low-temperature Atmospheres: Markov Chain Monte Carlo versus Random Forest Retrieval by Anna Lueber, Adam J. Burgasser

    Published 2025-01-01
    “…Here, we compare two grid model fitting approaches: a Markov Chain Monte Carlo (MCMC) algorithm interpolating across spectral fluxes, and a random forest retrieval (RFR) algorithm trained on a grid model set. …”
    Get full text
    Article
  7. 2027

    Optimization of Parameters of Two-Beam Laser Twelding of Quartz Raw Materials by V. A. Emelyanov, E. B. Shershnev, Y. V. Nikitjuk, S. I. Sokolov, I. Y. Aushev

    Published 2023-01-01
    “…The optimization of two-beam laser cleaning of quartz raw materials was performed using the MOGA genetic algorithm in the ANSYS Work-bench program. Using the face-centered version of the central compositional plan of the experiment, a regression model of two-beam cleaning of quartz raw materials was obtained. …”
    Get full text
    Article
  8. 2028

    RESEARCH EMERGENCY TRANSIENTS IN POWER SYSTEMS 6 - 10 KV WITH THE THYRISTOR SWITCHES by Yuri Dyomin, Oleg Kirkorov

    Published 2022-05-01
    “…The conditions and the algorithms of thyristor switches to improve the reliability of power supply system 6 - 10 kV (SES) in emergency conditions: when power interruptions and short circuits (a short circuit). …”
    Get full text
    Article
  9. 2029

    How Cybersecurity Leadership Became the New Critical Managerial Competency in Healthcare Administration by Ebone McCoy

    Published 2025-07-01
    “…Ethical implications of increased digitalization in healthcare are addressed, including patient privacy concerns, data ownership issues, and potential algorithmic bias in AI-driven solutions. The study emphasizes the need for a balanced approach that leverages technological advancements while maintaining the human-centric nature of healthcare delivery. …”
    Get full text
    Article
  10. 2030

    A graphical modelling approach to the dissection of highly correlated transcription factor binding site profiles. by Robert Stojnic, Audrey Qiuyan Fu, Boris Adryan

    Published 2012-01-01
    “…Here, we develop a novel computational method, the Neighbourhood Consistent PC (NCPC) algorithms, which deal with these scenarios much more effectively than existing methods do. …”
    Get full text
    Article
  11. 2031

    Production monitoring and machine tracking in underground mines based on a collision avoidance system: A case study by Artur Skoczylas, Natalia Duda-Mróz, Wioletta Koperska, Paweł Stefaniak, Paweł Śliwiński

    Published 2025-07-01
    “…Consequently, the development of validation algorithms, including error correction and adaptive filtering, was imperative. …”
    Get full text
    Article
  12. 2032

    Defense strategies selection based on attack-defense evolutionary game model by Jian-ming HUANG, Heng-wei ZHANG, Jin-dong WANG, Shi-rui HUANG

    Published 2017-01-01
    “…Due to that the current network security researches based on game theory mostly use the completely rationality assumption,which is not consistent with the facts.Under the bounded rationality constraint of network attack-defense,attack-defense evolutionary game model and a method to solve evolutionary stable equilibrium based on the non-cooperative evolutionary game theory was proposed.The optimal defense strategy selection algorithm was designed based on the analysis of the evolutionary stable strategy.The effectiveness of the model and method proposed is verified by simulation results,through which some evolution conclusions of offensive behavior on the premise of limited rationality were drawn.…”
    Get full text
    Article
  13. 2033

    The phenomenon of digital paternalism as a factor in the transformation of state youth policy by  S. V. Polyakov

    Published 2025-06-01
    “…Its essential characteristics are highlighted: delegation of paternalistic functions to digital platforms, masking of state presence, adaptation to youth digital culture, and creation of an illusion of free choice. Based on the cooperation between government structures and the VKontakte social network, specific mechanisms for implementing the new model are identified: integration of state services into digital platforms, gamification of state initiatives, algorithmic promotion of content, and creation of «trendy» youth movements with state support. …”
    Get full text
    Article
  14. 2034

    An Entropy Based Anomaly Traffic Detection Approach in SDN by Mingxin Wang, Huachun Zhou, Jia Chen, Hongke Zhang

    Published 2015-09-01
    “…The attacks can be detected based on the entropy variation of the identifier and locate the type of attack with the classification algorithm. As the anomaly patterns were detected, the security center would cooperate with the central controller to install the flow table to alleviate the influence of the attack. …”
    Get full text
    Article
  15. 2035

    Danger theory inspired intrusion detection model for wireless sensor networks by Rong-rong FU, Kang-feng ZHENG, Tian-liang LU, Yi-xian YANG

    Published 2012-09-01
    “…According to the challenges of intrusion detection technique for wireless sensor networks,a danger theory in-spired intrusion detection model was proposed by taking advantage of the working principle of artificial immune system.Due to the distributed and cooperative mechanism,the proposed model shows more advantages in detection performance and energy consumption than methods adopt promiscuous to get global knowledge.The simulation results show that compared to traditional Watchdog algorithm with single threshold and self-nonself(SNS)model,the model inspired by danger theory can provide highest correct detection rate and lowest false detection rate.Moreover,the model can also decrease the energy consumption of the system.…”
    Get full text
    Article
  16. 2036

    An Entropy Based Anomaly Traffic Detection Approach in SDN by Mingxin Wang, Huachun Zhou, Jia Chen, Hongke Zhang

    Published 2015-09-01
    “…The attacks can be detected based on the entropy variation of the identifier and locate the type of attack with the classification algorithm. As the anomaly patterns were detected, the security center would cooperate with the central controller to install the flow table to alleviate the influence of the attack. …”
    Get full text
    Article
  17. 2037

    METAL CHIP HEATING PROCESS INVESTIGATION (Part 3) by O. M. Dyakonov

    Published 2008-04-01
    “…The numerical solution algorithm of mathematical model of metal chip heating process in continuous muffle furnace and computer calculation program that allow to determine the heat- and mass transfer parameters have been worked out. …”
    Get full text
    Article
  18. 2038

    Artificial intelligence applied to the study of human milk and breastfeeding: a scoping review by Sergio Agudelo-Pérez, Daniel Botero-Rosas, Laura Rodríguez-Alvarado, Julián Espitia-Angel, Lina Raigoso-Díaz

    Published 2024-12-01
    “…Observational and qualitative studies evaluating AI in the analysis of breastfeeding patterns and human milk composition have been conducted. A thematic analysis was employed to categorize and synthesize the data. …”
    Get full text
    Article
  19. 2039
  20. 2040

    A spike is a spike: On the universality of spike features in four epilepsy models by Armen Sargsyan, Pablo M. Casillas‐Espinosa, Dmitri Melkonian, Terence J. O'Brien, Gilles vanLuijtelaar

    Published 2024-12-01
    “…This fact may be used for the development of universal algorithms for seizure detection applicable to different rat models of epilepsy. …”
    Get full text
    Article