-
561
An Implicit Flux-Corrected Transport Algorithm Used for Gas Discharge Calculations
Published 2025-02-01“…An implicit flux-corrected transport (FCT) and diffusion algorithm was developed and used in many gas discharge calculations. …”
Get full text
Article -
562
Energy Efficient RANSAC Algorithm for Flat Surface Detection in Point Clouds
Published 2023-07-01“…Mobile robots control systems achieve greater efficiency through the use of robust environmental analysis algorithms based on data collected from optical sensors such as depth cameras, Light Detection and Ranging sensors (LIDARs). …”
Get full text
Article -
563
Energy-Aware Distributed Clustering Algorithm for Improving Network Performance in WSNs
Published 2014-03-01“…Many clustering algorithms have been proposed to improve energy efficiency. …”
Get full text
Article -
564
Design Secured Smart Door Lock Based on Jaro Winkler Algorithm
Published 2023-02-01“…The main purpose of design smart door lock, using Jaro Winkler algorithm is to compare the registered password security with each entered password which may contain some wrong or swapped characters. …”
Get full text
Article -
565
Analysis and Prediction of CET4 Scores Based on Data Mining Algorithm
Published 2021-01-01“…Based on the multiple linear regression algorithm, many factors affecting CET4 are analyzed. …”
Get full text
Article -
566
Edge detection of aerial images using artificial bee colony algorithm
Published 2022-06-01“…In many studies, metaheuristic algorithms have been used for obtaining better results. …”
Get full text
Article -
567
Optimization of data allocation in hierarchical memory for blocked shortest paths algorithms
Published 2021-10-01“…This paper is devoted to the reduction of data transfer between the main memory and direct mapped cache for blocked shortest paths algorithms (BSPA), which represent data by a D[M×M] matrix of blocks. …”
Get full text
Article -
568
Reputation-Based Leader Selection Consensus Algorithm with Rewards for Blockchain Technology
Published 2025-01-01“…It has the potential to transform many sectors completely. The core component of blockchain networks is the consensus algorithm because its efficiency, security, and scalability depend on it. …”
Get full text
Article -
569
Quad-Rotor Helicopter Autonomous Navigation Based on Vanishing Point Algorithm
Published 2014-01-01“…They are employed in many applications, from military operations to civilian tasks. …”
Get full text
Article -
570
Application of Immune Complement Algorithm to NSL-KDD Intrusion Detection Dataset
Published 2012-12-01“…<span>Many real world problems involve the simultaneous optimization of various and often conflicting objectives. …”
Get full text
Article -
571
The impact of algorithm awareness training on competent interaction with intelligent voice assistants
Published 2025-05-01“…Abstract Intelligent Voice Assistants (IVAs) have become integral to many users' daily lives, using advanced algorithms to automate various tasks. …”
Get full text
Article -
572
Features of modern algorithm of examination and treatment patients with endo-perio lesions
Published 2020-04-01Get full text
Article -
573
Application of DBN deep learning algorithm in anti stealing electricity system
Published 2019-02-01“…With the development of economy,the electric power demand increases gradually,but because of the relative backwardness in the automation of electricity,the phenomenon of electric stealing is common.But the traditional anti electric stealing means generally centered around how to strengthen the technical transformation of the electric energy metering device,and the management efficiency is low.The purpose of deep learning is to use the method of constructing the multi-layer neural network model.To learn the potential features of image,text,voice and other data,it also has good effect on the classification problem.The successful application of the deep learning algorithm in many complex fields provides a new effective way to solve the problem of anti stealing electricity.The structure and learning algorithm of DBN and the anti-stealing model based on DBN algorithm was mainly introduced.Finally,experiments were carried out and the results were analyzed.…”
Get full text
Article -
574
Cognitive Radio Transceivers: RF, Spectrum Sensing, and Learning Algorithms Review
Published 2014-01-01“…Sophisticated spectrum sensing algorithms that overcome main sensing challenges such as model uncertainty, hardware impairments, and wideband sensing are highlighted. …”
Get full text
Article -
575
Optimal Design of Heat Pipe Based on the Multi-object Genetic Algorithm
Published 2011-01-01“…Heat pipes have been used widely in many engineering fields due to their higher rate of heat transfer.However,the design of heat pipes often involves selection of multiple parameters and the conventional design algorithms are not efficient in optimizing these parameters simultaneously.In this paper,the thermal network model and heat transfer limit model of a typical heat pipe were built.Based on them,the optimal problem of the heat pipe is defined mathematically.Then a multi-object optimization algorithm ba...…”
Get full text
Article -
576
An Algorithm for Critical Nodes Problem in Social Networks Based on Owen Value
Published 2014-01-01Get full text
Article -
577
Review of One-Stage Universal Object Detection Algorithms in Deep Learning
Published 2025-05-01“…The general object detection algorithms under deep learning are mainly divided into one-stage object detection and two-stage object detection. …”
Get full text
Article -
578
-
579
Visual System Inspired Algorithm for Enhanced Visibility in Coronary Angiograms (VIAEVCA)
Published 2025-01-01“…We propose a novel visibility enhancement algorithm, whose main body is inspired by a line completion mechanism of the visual system, i.e., lateral interactions. …”
Get full text
Article -
580
Use of schedule theory algorithms for task planning and time management tasks
Published 2024-10-01“…At the moment, there are many algorithms for solving such tasks, but the algorithms must be customized to specific conditions, while ensuring the quality of the task and performance. …”
Get full text
Article