-
1981
Advanced hybrid machine learning based modeling for prediction of properties of ionic liquids at different temperatures
Published 2025-07-01“…The harmony search (HS) algorithm was employed as an optimization algorithm to find the best hyper-parameters combination by minimizing the error. …”
Get full text
Article -
1982
Development of a regenerative braking energy utilization device for heavy-haul electrified railways
Published 2025-03-01“…This algorithm sets clear power quality control goals, ensuring better control performance. …”
Get full text
Article -
1983
HARMONIC DRIVE SELECTION
Published 2014-03-01“…It also presents the algorithm correct choice of harmonic drive. The main objective of this study was to develop a computer program that allows the correct choice of harmonic drive by developed algorithm.…”
Get full text
Article -
1984
RATING OF THE REGION’S INVESTMENT POTENTIAL IN RUSSIAN FEDERATION: MULTIDIMENSIONAL STATISTICAL ANALYSIS
Published 2016-08-01“…Algorithm of the creation integral factor for estimation ofthe region’s investment potential is given in the article. …”
Get full text
Article -
1985
Privacy matching-based service proxy discovery scheme
Published 2016-08-01“…According to user's requirements on the proxy performance,cost and safety in proxy discovery,and the pri-vacy-preserving issue during the process of the demand private matching,a new private matching algorithm was pre-sented based on Paillier homomorphic encryption,comprehensively considered the attributes of user and agents and their priority.It included four steps:building the similarity function based on Euclidean distance,carrying on the private matching by encryption algorithm,calculating the similarity and screening the proxy chain.Proposed scheme introduced semi trusted primary proxy from the global level,which is to manage all the sub proxy's business type and the connection status,and do the main computational overhead.At the same time,Euclidean distance and Paillier homomorphic encryp-tion algorithm were combined to support the multivariate attributes with priority to match,which can effectively protect the privacy of user and sub proxy.Finally,security analysis and evaluation results show the effectiveness and safety of proposed scheme.…”
Get full text
Article -
1986
Two-hop cover-based access control scheme for wireless sensor networks
Published 2010-01-01“…In order to support randomly moving users,a THC(two-hop cover) algorithm and a two-hop cover-based ac-cess control scheme were proposed.The proposed algorithm made two-hop nodes be able to retrieve access control in-formation of user’s in time through diffusing the information periodically.The scheme based on THC algorithm,the se-curity mechanisms of Merkle hash tree and one way chain,as well as distributed access control mode,its main contribu-tion was it supports randomly moving users for the first time.The analyses and experiments have shown that the pro-posed scheme can be applied to both mobile and stationary user and have several advantages over the current access con-trol methods of low cost in computation,communication and storage,and resistance to node capture,query replay and DoS attacks.…”
Get full text
Article -
1987
Detection of Sentence Boundaries in Polish Based on Acoustic Cues
Published 2016-01-01“…In this article the authors investigated and presented the experiments on the sentence boundaries annotation from Polish speech using acoustic cues as a source of information. The main result of the investigation is an algorithm for detection of the syntactic boundaries appearing in the places of punctuation marks. …”
Get full text
Article -
1988
Generative Target Tracking Method with Improved Generative Adversarial Network
Published 2023-01-01“…In this paper, we proposed a target tracking algorithm based on the conditional adversarial generative twin networks, using the improved you only look once multitarget association algorithm to classify and detect the position of the target to be detected in the current frame, constructing a feature extraction model using generative adversarial networks (GANs) to learn the main features and subtle features of the target, and then using GANs to generate the motion trajectories of multiple targets, finally fuzing the motion and appearance information of the target to obtain the optimal match. …”
Get full text
Article -
1989
Singular wavelets on a finite interval
Published 2018-12-01“…The method includes a numerical algorithm based on the summation of a recurrent sequence of functions. …”
Get full text
Article -
1990
State regulation of the market of collective investments
Published 2020-01-01“…The essence, algorithm, main goals and tasks of state regulation of the market of collective investments in the Russian Federation at the present stage are specified. …”
Get full text
Article -
1991
Security-Constrained Multi-Stage Robust Dynamic Economic Dispatch with Bulk Storage
Published 2025-02-01“…Compared to the traditional SDDP algorithm and RDDP algorithm, the proposed RA-RDDP algorithm uses the inner relaxed approximation and outer approximation methods to approximate the upper and lower bounds of the future cost-to-go function, which overcomes the convergence issue of the traditional SDDP algorithm and solution efficiency of the RDDP algorithm. …”
Get full text
Article -
1992
Retracted: Study on Modeling Method of Forest Tree Image Recognition Based on CCD and Theodolite
Published 2020-01-01“…The image processing algorithm is designed for the image processing module, and the flow chart of the image processing algorithm is given. …”
Get full text
Article -
1993
Parameter identification of unmanned surface vehicle MMG model based on an improved extended Kalman filter
Published 2025-02-01“…ObjectivesTo construct an accurate MMG (mathematical model group) model for a water-jet propulsion unmanned surface vehicle, the traditional extended Kalman filter algorithm and improved extended Kalman filter algorithm are combined with the real-world boat data for parameter identification. …”
Get full text
Article -
1994
Analysis of complications after living-related kidney transplantation: a single-center experience
Published 2021-03-01“…The original authors' algorithm developed for the diagnosis and treatment of complications after kidney transplantation covers all postoperative complications that lead to renal transplant dysfunction. …”
Get full text
Article -
1995
The Potential Mechanism of Curcumin in Treating Oral Squamous Cell Carcinoma Based on Integrated Bioinformatic Analysis
Published 2023-01-01“…The enrichment analysis was performed by the ClusterProfiler algorithm and Metascape, respectively. Then, a protein-protein interaction network was created, and the maximal clique centrality algorithm was used to identify the top 10 hub genes. …”
Get full text
Article -
1996
-
1997
Correlation of Tracks from Different Radars in Information Processing by Attraction Method
Published 2019-06-01“…One of the main problems in the processing of tracks from different radars is the correct correlation of tracks (especially groups of tracks). …”
Get full text
Article -
1998
Numerical Simulation of Wind-Induced Vibration Response Characteristics of High-Rise Buildings with Podiums
Published 2025-04-01“…This article proposes a process algorithm based on the AR (autoregression) method to solve the time history of fluctuating wind speed and determine fluctuating wind load. …”
Get full text
Article -
1999
Rolling Force Prediction of Hot Rolling Based on GA-MELM
Published 2019-01-01“…In the hot continuous rolling process, the main factor affecting the actual thickness of strip is the rolling force. …”
Get full text
Article -
2000
Parallel Tracking and Mapping for Controlling VTOL Airframe
Published 2011-01-01“…Proposed modifications provide the position measurements necessary for the navigation solution on a UAV. The main contributions of this work include: (1) extension of the map building algorithm to enable it to be used realistically while controlling a UAV and simultaneously building the map; (2) improved performance of the SLAM algorithm for lower camera frame rates; and (3) the first known demonstration of a monocular SLAM algorithm successfully controlling a UAV while simultaneously building the map. …”
Get full text
Article