Search alternatives:
many » may (Expand Search)
Showing 461 - 480 results of 9,662 for search '(many OR main) algorithm', query time: 0.17s Refine Results
  1. 461

    Intelligent Obstacle Avoidance Algorithm for Mobile Robots in Uncertain Environment by Liwei Guan, Yu Lu, Zhijie He, Xi Chen

    Published 2022-01-01
    “…In a nondeterministic environment, a mobile robot intelligent obstacle avoidance algorithm based on an improved fuzzy neural network with self-learning is firstly proposed. …”
    Get full text
    Article
  2. 462

    Microwave Brain Lesion Detection and Localization Using Classification Algorithms by H. Şahintürk, R. Kıymaz, B. Aslanyürek, H.G. Süngülü

    Published 2025-06-01
    “…This paper contributes to the literature on microwave brain lesion localization by comparing several machine learning algorithms rather than proposing a single algorithm. …”
    Get full text
    Article
  3. 463

    Research and Application of Signal Acquisition Algorithm for Beidou Navigation System by Xinmiao Liao, Ling Lin, Xingqi Jiang

    Published 2024-01-01
    “…To address this issue, research proposed combining the fast Fourier transform algorithm with an improved time-domain parallel signal capture method, and applying the method to field programmable gate array simulation applications. …”
    Get full text
    Article
  4. 464

    Adaptor signature scheme based on ISRSAC digital signature algorithm by Yanshuo ZHANG, Ning LIU, Yuqi YUAN, Yatao YANG

    Published 2023-03-01
    “…The adapter signature scheme can provide good properties of atomic exchange in the block chain, and has been widely used in practice.A new adapter signature scheme was constructed based on a digital signature algorithm for improved security of RSA cryptosystem (ISRSAC).After proving that the proposed scheme satisfied the correctness of the pre-signature, unforgeability, adaptability of the pre-signature, extractability of the evidence and the security of the signature scheme, it was compared with the adapter signature scheme based on the SM2 digital signature algorithm, the Schnorr-based adapter signature scheme and the ECDSA-based adapter signature scheme.And these schemes were analyzed in terms of time overhead and main calculation amount.The analysis results show that the proposed scheme is similar to other schemes in terms of time overhead, but the proposed scheme expands the application scenarios of ISRSAC algorithm in the current environment, and through the combination of ISRSAC algorithm and adapter signature technology, the selection of adapter signature is more flexible and can have a wider range of applications.…”
    Get full text
    Article
  5. 465

    Associative Parallel Algorithm for Dynamic Update of the Shortest Paths Tree by A. S. Nepomniaschaya

    Published 2013-04-01
    “…To this end, we provide the data structure and its building along with the STAR–machine that simulates the run of associative (content–addressable) parallel systems with simple single–bit processing elements and vertical processing. The associative algorithm is represented on the STAR–machine as the main procedure DeleteArcSPT that uses some auxiliary procedures. …”
    Get full text
    Article
  6. 466

    Comparison of Classification Algorithms with Bag of Words Feature in Sentiment Analysis by Fenilinas Adi Artanto

    Published 2025-07-01
    “…Although there have been many studies on sentiment analysis, there is still a lack of studies focusing on cultural sentiment such as humor in the Italian brainroot anomaly. …”
    Get full text
    Article
  7. 467

    Stochastic Block-Coordinate Gradient Projection Algorithms for Submodular Maximization by Zhigang Li, Mingchuan Zhang, Junlong Zhu, Ruijuan Zheng, Qikun Zhang, Qingtao Wu

    Published 2018-01-01
    “…We prove that the estimates of all nodes generated by the algorithm converge to some stationary points with probability 1. …”
    Get full text
    Article
  8. 468

    Parallel clustering algorithm for large-scale biological data sets. by Minchao Wang, Wu Zhang, Wang Ding, Dongbo Dai, Huiran Zhang, Hao Xie, Luonan Chen, Yike Guo, Jiang Xie

    Published 2014-01-01
    “…The affinity propagation algorithm outperforms many other classical clustering algorithms and is widely applied into the biological researches. …”
    Get full text
    Article
  9. 469

    A congestion prediction method based on trajectory mining algorithm by Liu Dongjiang, Li Leixiao, Li Jie

    Published 2025-01-01
    “…Almost all these methods are based on traffic flow prediction algorithm. In these methods, historical traffic flow data is used while performing prediction. …”
    Get full text
    Article
  10. 470

    Robust reinforcement learning algorithm based on pigeon-inspired optimization by Mingying ZHANG, Bing HUA, Yuguang ZHANG, Haidong LI, Mohong ZHENG

    Published 2022-10-01
    “…Reinforcement learning(RL) is an artificial intelligence algorithm with the advantages of clear calculation logic and easy expansion of the model.Through interacting with the environment and maximizing value functions on the premise of obtaining little or no prior information, RL can optimize the performance of strategies and effectively reduce the complexity caused by physical models .The RL algorithm based on strategy gradient has been successfully applied in many fields such as intelligent image recognition, robot control and path planning for automatic driving.However, the highly sampling-dependent characteristics of RL determine that the training process needs a large number of samples to converge, and the accuracy of decision making is easily affected by slight interference that does not match with the simulation environment.Especially when RL is applied to the control field, it is difficult to prove the stability of the algorithm because the convergence of the algorithm cannot be guaranteed.Considering that swarm intelligence algorithm can solve complex problems through group cooperation and has the characteristics of self-organization and strong stability, it is an effective way to be used for improving the stability of RL model.The pigeon-inspired optimization algorithm in swarm intelligence was combined to improve RL based on strategy gradient.A RL algorithm based on pigeon-inspired optimization was proposed to solve the strategy gradient in order to maximize long-term future rewards.Adaptive function of pigeon-inspired optimization algorithm and RL were combined to estimate the advantages and disadvantages of strategies, avoid solving into an infinite loop, and improve the stability of the algorithm.A nonlinear two-wheel inverted pendulum robot control system was selected for simulation verification.The simulation results show that the RL algorithm based on pigeon-inspired optimization can improve the robustness of the system, reduce the computational cost, and reduce the algorithm’s dependence on the sample database.…”
    Get full text
    Article
  11. 471

    Comparative analysis of dehazing algorithms on real-world hazy images by Chaobing Zheng, Wenjian Ying, Qingping Hu

    Published 2025-03-01
    “…Neural augmentation algorithms, however, effectively combine the strengths of both approaches, offering a better overall solution. …”
    Get full text
    Article
  12. 472

    An intelligent algorithm to fast and accurately detect chaotic correlation dimension by Mengyan Shen, Miaomiao Ma, Zhicheng Su, Xuejun Zhang

    Published 2025-05-01
    “…Therefore, it is necessary to propose a fast and intelligent algorithm to solve the above problem. This study implies the distinct windows tracking technique and fuzzy C‐means clustering algorithm to accurately identify the scaling range and estimate the correlation dimension values. …”
    Get full text
    Article
  13. 473

    Examining the Efficiency of Learning-Based Algorithms in the Process of Declaring Customs by Mustafa Günerkan, Ender Şahinaslan, Önder Şahınaslan

    Published 2022-12-01
    “…Regarding the K-Fold method, which assumes K to be equal to 10, similar success rates were obtained for the Decision Tree (75.84%) and Bagging (75.83%) algorithms. These results reveal the use of machine learning algorithms to be an effective method for detecting notification errors. …”
    Get full text
    Article
  14. 474

    A Comparison of Four Classification Algorithms for Facial Expression Recognition by Hivi I. Dino, Maiwan B. Abdulrazzaq

    Published 2020-06-01
    “…This paper provides a comparison approach for FER based on three feature selection methods which are correlation, gain ration, and information gain for determining the most distinguished features of face images using multi-classification algorithms which are multilayer perceptron, Naïve Bayes, decision tree, and K-nearest neighbor (KNN). …”
    Get full text
    Article
  15. 475

    Nowcasting of rainfall based on extrapolation and evolution algorithms. Preliminary results by Mateusz Giszterowicz, Katarzyna Ośródka, Jan Szturc

    Published 2018-12-01
    “…The paper gives an overview of algorithms used in the SNAR model and provides preliminary results.…”
    Get full text
    Article
  16. 476

    Collaborative Spectrum Sensing Optimisation Algorithms for Cognitive Radio Networks by Kamran Arshad, Muhammad Ali Imran, Klaus Moessner

    Published 2010-01-01
    “…The main challenge for a cognitive radio is to detect the existence of primary users reliably in order to minimise the interference to licensed communications. …”
    Get full text
    Article
  17. 477

    Identification of Grass Weed Species Using YOLO5 Algorithm by Charlene Grace Rabulan, John Alfred Gascon, Noel Linsangan

    Published 2025-05-01
    “…The developed system detects and identifies the four main types of weeds, contributing to the improvement of weed control management.…”
    Get full text
    Article
  18. 478

    Mass public opinion: algorithmic colonisation and synthetisation of the public sphere by Carlos Saura García, Patrici Calvo

    Published 2024-12-01
    “…This paper examines the strategic change in the manipulation of public opinion through algorithmic colonisation, technological imperialism, data generation and the creation of synthetic content. …”
    Get full text
    Article
  19. 479

    A trajectory data publishing algorithm satisfying local suppression by Xiaohui Li, Yuliang Bai, Yajun Wang, Bo Li

    Published 2021-02-01
    “…The main contributions of this article include as follows: (1) introducing privacy protection method in trajectory data release, (2) performing effective local suppression judgment on the points in the minimum violation sequence of the trajectory data set, and (3) proposing a differential privacy protection algorithm based on local suppression. …”
    Get full text
    Article
  20. 480