Search alternatives:
man » many (Expand Search), mean (Expand Search)
Showing 1,961 - 1,980 results of 6,339 for search '(man OR main) algorithm', query time: 0.15s Refine Results
  1. 1961

    Generation of a Social Network Graph by Using Apache Spark by Y. A. Belov, S. I. Vovchok

    Published 2016-12-01
    “…We described a table containing the variables needed for the algorithm. A step-by-step generation algorithm was compiled. …”
    Get full text
    Article
  2. 1962

    Improving the Incident Management Process Based on a Use Case Approach by A. A. Mikryukov, A. V. Kuular

    Published 2021-08-01
    “…The article considers the process approach to incident management in case of technical failures and its main stages: detection, response, investigation, elimination, resolution. …”
    Get full text
    Article
  3. 1963

    The concept and content of the contract of participation in shared construction and its legal characteristics by A. E. Kolieva, G. G. Khachiev, F. G. Konova

    Published 2022-09-01
    “…It made it possible to study the theoretical, factual and legal grounds of the phenomenon of shared construction in Russia.The main results, scope of application. The article stipulates the main features of the contract of shared construction, different points of view on the definition of this kind of contracts, the algorithm of concluding a contract of shared construction and Russian judicial practice in this sphere.…”
    Get full text
    Article
  4. 1964

    Classification-based point cloud denoising and 3D reconstruction of roadways by Denghong CHEN, Ning PANG, Wen NIE, Juqiang FENG, Jiliang KAN, Jinjing ZHANG

    Published 2025-05-01
    “…The integration algorithm could automatically analyze the noise types of point cloud data and then efficiently remove noise at different scales via an adaptive mechanism, thus achieving in-depth cleaning of main point cloud data. …”
    Get full text
    Article
  5. 1965

    二维实数编码遗传算法在普通圆柱蜗杆传动优化设计中的应用 by 张艳, 黄乾贵

    Published 2005-01-01
    “…Because of low calculation efficiency and early convergence of the traditional binary scale code of genetic algorithm, genetic algorithm of the two-dimensional real number code is used to do the optimizing design to the cylindrical worm and method of choosing main parameters is presented.…”
    Get full text
    Article
  6. 1966

    ELIMINATION OF ERRORS IN CODEWORDS ACCORDING TO THE RESULTS OF PARITY CHECKING by A. S. Poljakov, V. E. Samsonov

    Published 2019-06-01
    “…An algorithm for finding wrong symbols in codewords based on using the results of checking for parity on axes and main diagonal of code plane is proposed. …”
    Get full text
    Article
  7. 1967

    Constructing network enterprise structure to create innovative products by Yu. F. Telnov, V. M. Trembach, A. V. Danilov, E. V. Yaroshenko, V. A. Kazakov, O. A. Kozlova

    Published 2019-12-01
    “…It is proposed to use a combination of QFD (Quality Function Deployment) methods for deploying the structure of a network enterprise and analyzing the types and consequences of potential FMEA (Failure Mode and Effects Analysis) inconsistencies.The main results of the study are ontology and the algorithm for forming the structure of the network enterprise. …”
    Get full text
    Article
  8. 1968

    Behavioral economics: science or exoticism? by I. N. Drogobytsky

    Published 2018-04-01
    “…Actually it is engaged and behavioral economics, the main provisions of which are considered in this article.…”
    Get full text
    Article
  9. 1969

    A Module for Calculating Pollutant Mass Emissions Produced by Traffic Flows by N. I. Kurakina, R. A. Myshko

    Published 2022-12-01
    “…Air pollution in residential zones should be comprehensively assessed using algorithmic and software support, taking the main factors of pollution into account.Aim. …”
    Get full text
    Article
  10. 1970

    Self-organized cyber physical power system blockchain architecture and protocol by Ting Yang, Feng Zhai, Jialin Liu, Meng Wang, Haibo Pen

    Published 2018-10-01
    “…In the traditional centralized data acquisition and management architecture, the security and trustworthiness completely depend on the central main server. A small mistake in the main server will result in data loss, which is irreversible and fatal. …”
    Get full text
    Article
  11. 1971

    METHODS FOR SEARCHING AND COMPARING OBJECTS WHEN APPLYING THE SUBJECT-SUBJECT APPROACH TO MANAGEMENT REVIEW by N.Yu. Zaitseva, T.V. Moiseeva

    Published 2024-10-01
    “…Among the well-known algorithms, four of the most popular fuzzy string comparison algorithms are highlighted: Hamming algorithm, Levenstein editorial distance (algorithm), Damerau–Levenstein editorial distance (algorithm) and distance (algorithm) Jaro-Winkler. …”
    Article
  12. 1972

    FEATURES OF THE DEVELOPMENT OF THE FOREIGN ECONOMIC ACTIVITY AT THE MODERN ENTERPRISE by М. О. Панченко, А. А. Капелюшна

    Published 2018-07-01
    “…It is established that the updating of the enterprise’s foreign economic activity leads to the implementation and formation of a strategy of competitive advantages at the enterprise. The enterprises’ main features on the external market of commodity circulation are singled out and the algorithm of acceptance by the enterprise of administrative decisions on an exit on the external market is constructed.…”
    Get full text
    Article
  13. 1973

    Management of water scarcity in arid areas: a case study (Ziz Watershed) by Ismail Elhassnaoui, Zineb Moumen, Manuela Tvaronavičienė, Mohamed Ouarani, Mohamed Ben-Daoud, Issam Serrari, Ikram Lahmidi, M.A.S. Wahba, Ahmed Bouziane, Driss Ouazar, Moulay Driss Hasnaoui

    Published 2021-03-01
    “…The SDGs 6 deals with water security, which refers mainly to ensure availability and sus-tainable management of water. …”
    Get full text
    Article
  14. 1974

    Keywords spotting in Russian handwritten documents based on strokes segmentation by D. D. Feoktistov, L. M. Mestetskiy, L. M. Mestetskiy

    Published 2024-12-01
    “…We propose a two-stage algorithm to solve this problem. The first stage involves classifying the strokes, which are the main elements of handwriting. …”
    Get full text
    Article
  15. 1975

    An automatic adaptive method to combine summary statistics in approximate Bayesian computation. by Jonathan U Harrison, Ruth E Baker

    Published 2020-01-01
    “…We address this problem by developing an automatic, adaptive algorithm that chooses weights for each summary statistic. …”
    Get full text
    Article
  16. 1976

    THE MATHEMATICAL MODELING ESTIMATION OF THE AORTIC VALVE STATE DURING MECHANICAL CIRCULATORY SUPPORT by I. B. Bykov, G. P. Itkin

    Published 2014-12-01
    “…This work is to research the aortic valve functioning during left ventricle bypass with non-pulsatile pump.Materials and methods. The main part of the research is author’s algorithm to estimate aortic valve state (open/closed). …”
    Get full text
    Article
  17. 1977

    Calculation of queue formation and queue length at airport check-in counters by Petr Had, Jiří Volt, Slobodan Stojić

    Published 2025-06-01
    “… This paper focuses on calculation of airport passenger queue formation and its length. The main goal of the paper is to evaluate the appropriateness of the combination of machine learning and determistic algorithm for queue length determination. …”
    Get full text
    Article
  18. 1978
  19. 1979

    A Soft-Fault Diagnosis Method for Coastal Lightning Location Networks Based on Observer Pattern by Yiming Zhang, Ping Guo

    Published 2025-07-01
    “…This paper first analyzes the main factors contributing to the error of the lightning location algorithm under this mode, proposes an observer pattern estimation algorithm (OPE) for lightning location, and defines the proportion of improvement in lightning positioning accuracy (PI) caused by the OPE algorithm. …”
    Get full text
    Article
  20. 1980

    Kernel Local Linear Discriminate Method for Dimensionality Reduction and Its Application in Machinery Fault Diagnosis by Kunju Shi, Shulin Liu, Hongli Zhang, Bo Wang

    Published 2014-01-01
    “…Lastly, kernel trick is included in KLLD algorithm to find more precise solution. The main feature of the proposed method is that it attempts to both preserve the intrinsic neighborhood geometry of the increased data and exact the discriminate information. …”
    Get full text
    Article