Search alternatives:
man » many (Expand Search), mean (Expand Search)
Showing 261 - 280 results of 6,339 for search '(man OR main) algorithm', query time: 0.16s Refine Results
  1. 261

    Improved cell search algorithm for 5G NR by Baojiang DONG, Chen PENG, He LU

    Published 2021-02-01
    “…The era of 5G NR has higher requirements for speed, capacity and user experience.In 5G NR physical layer, cell search is an indispensable process.Cell search mainly includes primary synchronization signal (PSS) detection algorithm and secondary synchronization signal (SSS) detection algorithm.The traditional PSS detection algorithm and SSS detection algorithm can’t satisfy the basic requirements of 5G NR.In order to solve this problem, an improved PSS detection algorithm based on the traditional M-segment cross-correlation detection algorithm was proposed.When the channel environment is bad, the traditional SSS detection algorithm will also fail.The improved SSS detection algorithm proposed can solve this problem.Finally, the traditional algorithm and the improved algorithm were compared and analyzed.The simulation results show that the detection performance of the proposed algorithm is significantly improved, and the detection efficiency and overall performance are also improved.…”
    Get full text
    Article
  2. 262

    Local Community Detection Algorithm Based on Minimal Cluster by Yong Zhou, Guibin Sun, Yan Xing, Ranran Zhou, Zhixiao Wang

    Published 2016-01-01
    “…The algorithm mainly includes two phases. First it detects the minimal cluster and then finds the local community extended from the minimal cluster. …”
    Get full text
    Article
  3. 263

    Understanding the Impact of Algorithmic Discrimination on Unethical Consumer Behavior by Binbin Sun, Shan Pei, Qingjin Wang, Xuelei Meng

    Published 2025-04-01
    “…Existing research has mainly focused on anthropomorphic characteristics of AI and unethical consumer behavior (UCB). …”
    Get full text
    Article
  4. 264

    A Bat Algorithm with Mutation for UCAV Path Planning by Gaige Wang, Lihong Guo, Hong Duan, Luo Liu, Heqi Wang

    Published 2012-01-01
    “…Original bat algorithm (BA) is used to solve the UCAV path planning problem. …”
    Get full text
    Article
  5. 265

    A comparison of various imputation algorithms for missing data. by Jürgen Kampf, Iryna Dykun, Tienush Rassaf, Amir Abbas Mahabadi

    Published 2025-01-01
    “…Among the remaining algorithms, in most situations we tested, predictive mean matching performed best.…”
    Get full text
    Article
  6. 266

    Lightweight coal miners and manned vehicles detection model based on deep learning and model compression techniques: A case study of coal mines in Guizhou region by Beijing XIE, Heng LI, Zheng LUAN, Zhen LEI, Xiaoxu LI, Zhuo LI

    Published 2025-02-01
    “…Intelligent recognition of coal mine workers and manned vehicles (coal mine pedestrian-vehicles) is an important component of video surveillance systems and a key task in the development of coal mine intelligence. …”
    Get full text
    Article
  7. 267

    A Novel Main-Lobe Cancellation Method Based on a Single Notch Space Filter and Optimized Correlation Analysis Strategy by Jiazhi Zhang, Xin Zhang, Weibo Deng, Liang Guo, Qiang Yang

    Published 2019-01-01
    “…Then, an improved main-lobe cancellation (IMLC) method based on single notch space filter and correlation analysis is proposed to get training data which contains precise clutter information. …”
    Get full text
    Article
  8. 268

    Active Privacy-Preserving, Distributed Edge–Cloud Orchestration–Empowered Smart Residential Mains Energy Disaggregation in Horizontal Federated Learning by Yu-Hsiu Lin, Yung-Yao Chen, Shih-Hao Wei

    Published 2025-01-01
    “…In this study, a distributed horizontal federated learning (HFL)–based energy management framework that implements an active privacy-preserving and edge–cloud collaborative computing–based energy disaggregation algorithm for smart mains energy disaggregation to energy-efficient smart houses/buildings is proposed, and its preliminary implementation, in which active two-stage energy disaggregation considering edge–cloud collaborative computing for autonomous AI modeling is achieved under HFL preserving user data privacy, is demonstrated. …”
    Get full text
    Article
  9. 269

    Impacts of Ground Slope on Main Performance Figures of Solar Chimney Power Plants: A Comprehensive CFD Research with Experimental Validation by Erdem Cuce, Pinar Mert Cuce, Harun Sen, K. Sudhakar, Umberto Berardi, Ugur Serencam

    Published 2021-01-01
    “…In this study, the impacts of the different slope angles of the ground, where the solar radiation is absorbed through the collector, on the main performance parameters of the system are numerically analysed through a reliable CFD software ANSYS FLUENT. …”
    Get full text
    Article
  10. 270

    MODELING OF A DUPLEX MILLER AND CONDITIONS OF FORMATION OF TREATMENT OF WHEEL PAIRS OF MAIN ELECTRIC CARDS, DUAL CARS, ELECTRO SECTIONS by Victor Shapovalov, Alexandr Permyakov, Alexander Klochko

    Published 2019-09-01
    “…The subject matter of the research in the article is the process of restoring the quality and accuracy of the working surface of the wheelsets of the main electric locomotives, electric sections. The purpose of the work is to develop a modeling method for a special shaped cutter with increased productivity, designed to process the profile of locomotive railway wheels taking into account the shaping processes, which is based on the theory of modeling the high-speed milling process through the shaping efficiency coefficient. …”
    Get full text
    Article
  11. 271
  12. 272

    Sorting algorithm acceleration based on CPU-FPGA heterogeneous system by Kou Yuanbo, Qiu Zeyu, Wang Liang, Huang Jianqiang

    Published 2022-01-01
    “…Traditional sorting methods are mainly implemented in software serial mode, including bubble sorting, selective sorting and so on. …”
    Get full text
    Article
  13. 273

    Algorithms for Automatic Detection and Location of Infrasound Events in the PSDL System by Asming Vladimir Ernestovich, Fedorov Andrey Viktorovich

    Published 2024-12-01
    “…The paper presents a description of an automated system and the algorithms implemented in it for detection, association and location of low-frequency acoustic events based on infrasound array data. …”
    Get full text
    Article
  14. 274

    Cloud removal from satellite imagery based on SUSAN algorithm by LU Li1, WANG Yong-tao1, TIAN Jin-wen1, LIU Jian1

    Published 2006-01-01
    “…A new image fusion scheme that could automate remove the cloud covers in the main image was proposed based on SUSAN algorithm.First,the corners were found both in the main image and the reference image based on SUSAN algorithm,and then the matched corners were found using probabilistic relaxation algorithm to register the ref-erence image to the main image.Finally,a cloud-removed image was obtained by fusion.The performance of the pro-posed scheme is demonstrated experimentally.…”
    Get full text
    Article
  15. 275

    Algorithmic Collusion: Corporate Accountability and the Application of Art. 101 TFEU by Maria Giacalone

    Published 2025-01-01
    “…Two different scenarios are discussed: the Predictable Agent and the Digital Eye, where algorithms operate either under human control or in an autonomous man-ner. …”
    Get full text
    Article
  16. 276

    Basic principals of the tiltrotors flight control system architecture and algorithms by M. I. Myasnikov, I. R. Ilyin

    Published 2024-11-01
    “…This study describes the main structure and algorithm development principles of flight control systems for tiltrotor aircraft using the example of rotary-wing aircraft V-22 Osprey and AW609. …”
    Get full text
    Article
  17. 277

    Research on reconfigurable service carrying network active protection algorithms by Ning QI, Bin-qiang WANG, Zhi-ming WANG

    Published 2012-08-01
    “…To construct reconfigurable service carrying network (RSCN) in reconfigurable flexible network (RFNet) infrastructure could provide traffic specific communication services for different end users.This could effectively solve the puzzle faced by traditional Internet infrastructure.Because of the blight of network failure,active protection problems of RSCN were discussed.Mathematics model of RSCN active protection issues were established.To avoid enormous influence because of important resource failure,a resource stress factor (RSF) awareness main link construction algorithm named RSF-aware MLCA was proposed.To improve success running ratio and reduce network link failure loss of RSCN,a RSCN protection link construction algorithm named RPLCA was implemented.Considering of the two sub-algorithms,RSCN active protection algorithm named RAPA was designed.The efficiency of algorithms was evaluated by emulation experiments according to RSCN success running ratio and main link utilization ratio and average network link failure loss under several scenarios.…”
    Get full text
    Article
  18. 278

    Research on reconfigurable service carrying network active protection algorithms by Ning QI, Bin-qiang WANG, Zhi-ming WANG

    Published 2012-08-01
    “…To construct reconfigurable service carrying network (RSCN) in reconfigurable flexible network (RFNet) infrastructure could provide traffic specific communication services for different end users.This could effectively solve the puzzle faced by traditional Internet infrastructure.Because of the blight of network failure,active protection problems of RSCN were discussed.Mathematics model of RSCN active protection issues were established.To avoid enormous influence because of important resource failure,a resource stress factor (RSF) awareness main link construction algorithm named RSF-aware MLCA was proposed.To improve success running ratio and reduce network link failure loss of RSCN,a RSCN protection link construction algorithm named RPLCA was implemented.Considering of the two sub-algorithms,RSCN active protection algorithm named RAPA was designed.The efficiency of algorithms was evaluated by emulation experiments according to RSCN success running ratio and main link utilization ratio and average network link failure loss under several scenarios.…”
    Get full text
    Article
  19. 279

    Identifying people based on the palm of the hand using the details algorithm by Bashar Abdel Sattar Younis, Maha Abdurrahman Hasso

    Published 2023-01-01
    “… The palm print Contains main and secondary lines has many important features, which make it one of the important characteristics of biometric with possessing high acceptance by users for recognition. …”
    Get full text
    Article
  20. 280

    Interactive Visualization of the Printed Circuits Tracing Algorithms for Educational Purposes by D. O. Petrov

    Published 2023-02-01
    “…The main difference between the developed module and the software of similar purpose is the possibility of step-by-step annotated execution of various algorithms for tracing printed conductors with the possibility of changing the order of routing user-specified conductors. …”
    Get full text
    Article