-
1841
Аlgorithm of fast computation of local image histograms on video card1
Published 2019-03-01“…An algorithm of parallel computation of image histograms of different types, including brightness and oriented gradient ones, on video cards of various types is presented. …”
Get full text
Article -
1842
The Investigation of E-Business Trends by Using Social Network Analysis Technique during 1980 to 2015
Published 2016-10-01“…In this regard, 4697 articles extracted and burst detection algorithm was used to analyze…”
Get full text
Article -
1843
INTESTINE DISEASE DIAGNOSIS SYSTEM USING CERTAINTY FACTOR METHOD
Published 2019-05-01“…Inside the human body there are many important organs, one of which is the intestine. …”
Get full text
Article -
1844
Marine-Derived Peptides from <i>Phaeodactylum tricornutum</i> as Potential SARS-CoV-2 Mpro Inhibitors: An <i>In Silico</i> Approach
Published 2025-05-01“…In this study, peptides of 10–30 kDa derived from the marine diatom <i>Phaeodactylum tricornutum</i> were identified as potential inhibitors of SARS-CoV-2 main protease (Mpro), a key enzyme in viral replication. …”
Get full text
Article -
1845
ANALYSIS OF THE EFFECTIVENESS OF DEMAND DATA PATTERNS AND LOTTING TECHNIQUES BASED ON EXPERIMENTAL DESIGN
Published 2025-08-01“…Lot sizing technique has been extensively analyzed by experts, as ordering costs, holding costs, and lot sizes have a significant impact on the total ordering cost. One of the many lot sizing techniques is the Groff algorithm, which is rarely used. …”
Get full text
Article -
1846
STEGO TRANSFORMATION OF SPATIAL DOMAIN OF COVER IMAGE ROBUST AGAINST ATTACKS ON EMBEDDED MESSAGE
Published 2014-04-01“…One of the main requirements to steganografic algorithm to be developed is robustness against disturbing influences, that is, to attacks against the embedded message. …”
Get full text
Article -
1847
Analysis of Basic Compounds in a Network Intrusion Detection System using NSL-KDD Data
Published 2013-03-01“…The increasing of security attacks and unauthorized intrusion have made network security one of the main subjects that should be considered in present data communication environment. …”
Get full text
Article -
1848
Research of the Finite State Machine with Programmable Logic as a Part of Digital Information and Control System Based on FPGA
Published 2019-06-01“…The purpose of this research is to determine the effective way of implementation of the control algorithm, as an important functional part of information and control computer systems. …”
Get full text
Article -
1849
Solving Three-Stage Operating Room Scheduling Problems with Uncertain Surgery Durations
Published 2025-06-01“…To solve this problem, we propose a Genetic Algorithm for Robust Scheduling (GARS), which evaluates solutions using a scenario-based robustness criterion derived from multiple sampled instances. …”
Get full text
Article -
1850
-
1851
Investigating Feed-Forward Back-Propagation Neural Network with Different Hyperparameters for Inverse Kinematics of a 2-DoF Robotic Manipulator: A Comparative Study
Published 2024-06-01“…Three different training optimizers are considered, namely the Levenberg-Marquardt (LM) algorithm, the Bayesian Regularization (BR) algorithm, and the Scaled Conjugate Gradient (SCG) algorithm. …”
Get full text
Article -
1852
Reconstruction of Three-Dimensional Object from Two-Dimensional Images by Utilizing Distance Regularized Level Algorithm and Mesh Object Generation
Published 2020-07-01“…Three-dimensional (3D) reconstruction from images is a most beneficial method of object regeneration by using a photo-realistic way that can be used in many fields. For industrial fields, it can be used to visualize the cracks within alloys or walls. …”
Get full text
Article -
1853
A model adapted to predict blast vibration velocity at complex sites: An artificial neural network improved by the grasshopper optimization algorithm
Published 2025-06-01“…Many factors complicate the blasting vibration velocity at complex sites because of their nonlinear relationships. …”
Get full text
Article -
1854
Research on the application of data mining based on digital economy in customer segmentation management
Published 2025-01-01“…After understanding the development trend of digital economy, this paper mainly discusses the application of data mining based on digital economy in customer segmentation management according to the research situation of customer segmentation management at home and abroad, and finally verifies the application advantages of the model algorithm according to the data obtained by a regional logistics enterprise.…”
Get full text
Article -
1855
A Smooth Jump Point Search Algorithm for Mobile Robots Path Planning Based on a Two-Dimensional Grid Model
Published 2022-01-01“…To address the problems of the traditional A∗ algorithm in solving paths with many expansion nodes, high memory overhead, low operation efficiency, and many path corners, this paper improved the traditional A∗ algorithm by combining jump point search strategy and adaptive arc optimization strategy. …”
Get full text
Article -
1856
Novel method for joint parameter estimation based on FPSD in wideband bistatic MIMO radar system
Published 2014-06-01“…A novel algorithm to jointly estimate parameters based on the fractional power spectrum density (FPSD) was proposed in wideband bistatic MIMO radar system. …”
Get full text
Article -
1857
-
1858
Algorithmic management and human-centered task design: a conceptual synthesis from the perspective of action regulation and sociomaterial systems theory
Published 2024-09-01“…This paper aims to explain potential psychological effects of algorithmic management (AM) on human-centered task design and with that also workers’ mental well-being. …”
Get full text
Article -
1859
A self-adaptive viscosity-type inertial algorithm for common solutions of generalized split variational inclusion and paramonotone equilibrium problem
Published 2025-02-01“…Under the assumption of generalized monotonicity of the related mappings, the strong convergence of the iterative algorithm was established. The results presented here improve and generalize many results in this area.…”
Get full text
Article -
1860
Hybridization of deep learning models with crested porcupine optimizer algorithm-based cybersecurity detection on industrial IoT for smart city environments
Published 2025-08-01“…Smart cities have attracted extensive coverage from multidisciplinary studies, and many artificial intelligence (AI) solutions have been designed. …”
Get full text
Article