Search alternatives:
man » many (Expand Search), mean (Expand Search)
Showing 1,941 - 1,960 results of 6,339 for search '(man OR main) algorithm', query time: 0.15s Refine Results
  1. 1941

    STAGES OF THE LOGBOOK SYSTEM INTRODUCTION IN A MEDICAL INSTITUTION by A.A. Stepanov

    Published 2006-02-01
    “…The article advances arguments for an active introduction of the logbook system in medical institutions. The main algorithm of the logbook committee establishment, its role in the work of a medical institution, its main functions and powers are briefly set forth. …”
    Get full text
    Article
  2. 1942

    Features of the Development Strategy Customer Relationship Management by I. M. Gurova

    Published 2017-07-01
    “…Purpose: in the current economic situation one of the main conditions of competitiveness of the company is its customer focus. …”
    Get full text
    Article
  3. 1943

    Macrostructural Analysis of the Dynamics of the Two-Sector Economy by O. S. Sukharev, E. N. Voronchikhina

    Published 2024-08-01
    “…The purpose of the study is the formation of an algorithm for macrostructural analysis of the two-sector Russian economy with the identification of the main patterns and relationships of their joint dynamics — contribution to the overall growth rate, price dynamics, and the definition of a model for further development.   …”
    Get full text
    Article
  4. 1944

    Intelligent tuning method for service scheduling in electric power communication networks based on operational risk and QoS guarantee. by Yang Yu, YueLin Jiang, Zeng Dou, Li Cong, Wei Huang, Qiang Zhang, Yang Hu, YanJun Bi

    Published 2025-01-01
    “…Simulation results from an actual power business communication network demonstrate that the algorithm outputs the main and alternate paths with the lowest risk costs. …”
    Get full text
    Article
  5. 1945

    Weighted determination algoritm of boundary pixels by D. V. Zaerko, V. A. Lipnitski

    Published 2021-01-01
    “…The main target is creating of effective filled algorithm for border pixels which are close to code colour to relation pixels for used in convolution matrix. …”
    Get full text
    Article
  6. 1946

    Multiobjective optimization of suspension bridges via coupled modeling and dual population multiobjective particle swarm optimization by Peiling Yang, Jianhua Deng, Anli Wang

    Published 2025-07-01
    “…The algorithm divides the population into two parts, using the non-dominated sorting genetic algorithm II (NSGA-II) and the multi-objective particle swarm optimization algorithm (MOPSO) for solving, with improvements to enhance the algorithm’s performance. …”
    Get full text
    Article
  7. 1947

    Application of Heuristic Methods for Polymer Synthesis Process Optimization by Eldar Miftakhov, Svetlana Mustafina, Andrey Akimov

    Published 2024-01-01
    “…To address the task of finding optimal synthesis conditions, a genetic algorithm has been proposed, and the main stages of its implementation using software development tools have been defined. …”
    Get full text
    Article
  8. 1948

    Stability and Convergence Analysis for Set-Valued Extended Generalized Nonlinear Mixed Variational Inequality Problems and Generalized Resolvent Dynamical Systems by Iqbal Ahmad, Zahoor Ahmad Rather, Rais Ahmad, Ching-Feng Wen

    Published 2021-01-01
    “…For illustration, a comparison of our three-step iterative algorithm with Ishikawa-type algorithm and Mann-type algorithm is shown.…”
    Get full text
    Article
  9. 1949

    Antistray, Learning Smart: Creating Indoor Positioning Learning Environment for Augmenting Self-Regulated Learning by Tien-Chi Huang

    Published 2014-04-01
    “…Meanwhile, the algorithm is able to eliminate the anomalous RSSI signals, which is the main reason for improving the positioning accuracy. …”
    Get full text
    Article
  10. 1950

    Ternary polynomial based key management scheme for wireless sensor network by Zhi-tao GUAN, Yue XU, Jun WU

    Published 2013-12-01
    “…A ternary polynomial based key management (KMTP) scheme was proposed,which is effective in cluster based wireless sensor networks.Firstly,the base station will give each node one unique identi ier to ensure the validity of the node.Then,algorithm of the inner-cluster and inter-cluster key pre-distribution based on the ternary polynomial of the same order was stated,which can ensure the value of the cracking threshold is bigger than the number of nodes of a clus-ter and all clusters separately,which means it's very hard to be cracked even all nodes of a cluster or all clusters are com-promised.To assure the communication security,inter-cluster multi-hop routing mechanism was designed based on con-structing secure conjunct neighbor table.Finally,the updating parameter and the updating authentication number were in-troduced in rekeying phase.The analysis shows that the proposed scheme can meet the security requirement of key man-agement,and it also has less computation cost and storage cost than the existing schemes.…”
    Get full text
    Article
  11. 1951

    Computer, Computer Science, and Computational Thinking: Relationship between the Three Concepts by Pinaki Chakraborty

    Published 2024-01-01
    “…Computer science covers all phenomenon related to computers and consists primarily of man-made laws governing building, programming, and using computers. …”
    Get full text
    Article
  12. 1952

    An Efficient Processing of Join Queries for Sensor Networks Using Column-Oriented Databases by Kyung-Chang Kim

    Published 2013-10-01
    “…The performance analysis show that our proposed algorithm based on column-oriented databases outperforms existing algorithms in processing binary equi-join (BEJ) queries for sensor networks.…”
    Get full text
    Article
  13. 1953

    THE MODEL OF MANAGEMENT OF TRANSPORT FLOWS IN MODERN CONDITIONS by E. A. Safronov, K. E. Safronov, E. S. Semenova

    Published 2017-08-01
    “…Thus solves the following main tasks: justification of the indicators and criteria of the system of transport service of the population of the city is the development of algorithm of calculation and download of UDS city. …”
    Get full text
    Article
  14. 1954

    On a modified Bernstein operators approximation method for computational solution of Volterra integral equation by Khursheed J. Ansari, Fuat Usta

    Published 2025-01-01
    “…Abstract The main feature of this paper is an application of the modified Bernstein operator in the approximate and numerical solution of integral equations. …”
    Get full text
    Article
  15. 1955

    Discussion on Disaster Remote Sensing Application Service Based on Ground Information Port by Qiao HU, Zuoya ZHENG, Gang LIU, Linyao QIU, Yanfeng WU

    Published 2020-12-01
    “…Aim at the problems of large volume and low degree of sharing of remote sensing data, high complexity of algorithm model and single function of disaster response application system, the main functions and technical framework of GIP, as well as the advantages and potential of GIP in platform, algorithm and application system was introduced.It provided a reference for further mining the research of new intelligent processing algorithm and processing mode for multi-source, high-dimensional, heterogeneous and complex associated earth observation data in other application fi elds with GIP, so as to promote the service ability and form a new information service mode and industrial chain of the GIP.…”
    Get full text
    Article
  16. 1956

    Particle Filter Tracking without Dynamics by Jaime Ortegon-Aguilar, Eduardo Bayro-Corrochano

    Published 2007-01-01
    “…Our approach can tackle unexpected discontinuities and changes in the direction of the motion. The main goal of the paper is to track people from laboratories, but it has applications in surveillance, mainly in controlled environments.…”
    Get full text
    Article
  17. 1957

    Optimizing demand charge of data center base on PE method by Yan HUANG, Peng WANG, Gao-hui XIE

    Published 2016-03-01
    “…Demand charge and energy charge are the two main components of data center electricity cost,previous re-searches have not take demand charge into consideration.PEDC algorithm was proposed by modeling time slot,work-load,service quality constraint and response time constraint.With PEDC algorithm peak power was decreased by partial execution on the condition of service quality constrai and response time constraint.PE method was executed in the heavy loaded time slots to reduce peak power so as to ize demand charge.Energy charge and total charge were also optimized.By comparing with four algorithms and with accurately predicted,PEDC algorithm can reduce elec-tricity cost by 5.9%~12.7% and improve cluster utilization 1.32 times.…”
    Get full text
    Article
  18. 1958

    Filtering Data of High-Resolution Terrestrial Laser Scanner and Effects of Filtrations on the Landslide Monitoring by Mustafa Zeybek, İsmail Şanlıoğlu, Aşır Genç

    Published 2015-08-01
    “…Point cloud filtering algorithm has automatically obtained two filtered data as the ground and the non-ground. …”
    Get full text
    Article
  19. 1959

    Very-Large-Scale Integration-Friendly Method for Vital Activity Detection with Frequency-Modulated Continuous Wave Radars by Krzysztof Ślot, Piotr Łuczak, Paweł Kapusta, Sławomir Hausman, Arto Rantala, Jacek Flak

    Published 2025-03-01
    “…The second one classifies a sequence of the produced descriptors using a recurrent neural network composed of gated recurrent units. To ensure the algorithm’s implementation feasibility, an analog VLSI circuit comprising its main functional blocks has been designed, manufactured, and tested, providing constraints for neural model derivation. …”
    Get full text
    Article
  20. 1960

    RESEARCH OF METHODS TO SUPPORT DATA MIGRATION BETWEEN RELATIONAL AND DOCUMENT DATA STORAGE MODELS by Mariia Peretiatko, Mariia Shirokopetleva, Natalya Lesna

    Published 2022-06-01
    “…Conclusions: because of the work, the main methods of migration support for different data storage models are analyzed, with the help of relational algebra, set theory a mathematical model is built, and an algorithm for transforming a relational data model into a document-oriented data model is taken into account. …”
    Get full text
    Article