Search alternatives:
many » may (Expand Search)
Showing 1,841 - 1,860 results of 9,662 for search '(many OR main) algorithm', query time: 0.21s Refine Results
  1. 1841

    Аlgorithm of fast computation of local image histograms on video card1 by Ph. S. Trotski, B. A. Zalesky

    Published 2019-03-01
    “…An algorithm of parallel computation of image histograms of different types, including brightness and oriented gradient ones, on video cards of various types is presented. …”
    Get full text
    Article
  2. 1842

    The Investigation of E-Business Trends by Using Social Network Analysis Technique during 1980 to 2015 by seyed mohammad jafar jalali, Elahe Mahizadeh

    Published 2016-10-01
    “…In this regard, 4697 articles extracted and burst detection algorithm was used to analyze…”
    Get full text
    Article
  3. 1843

    INTESTINE DISEASE DIAGNOSIS SYSTEM USING CERTAINTY FACTOR METHOD by Chandra - Kirana, Harrizki Arie Pradana, Rahmat - Sulaiman

    Published 2019-05-01
    “…Inside the human body there are many important organs, one of which is the intestine. …”
    Get full text
    Article
  4. 1844
  5. 1845

    ANALYSIS OF THE EFFECTIVENESS OF DEMAND DATA PATTERNS AND LOTTING TECHNIQUES BASED ON EXPERIMENTAL DESIGN by Evan Nugraha, Rini Mulyani Sari

    Published 2025-08-01
    “…Lot sizing technique has been extensively analyzed by experts, as ordering costs, holding costs, and lot sizes have a significant impact on the total ordering cost. One of the many lot sizing techniques is the Groff algorithm, which is rarely used. …”
    Get full text
    Article
  6. 1846

    STEGO TRANSFORMATION OF SPATIAL DOMAIN OF COVER IMAGE ROBUST AGAINST ATTACKS ON EMBEDDED MESSAGE by Kobozeva A., Lebedeva O., Kostyrka O.

    Published 2014-04-01
    “…One of the main requirements to steganografic algorithm to be developed is robustness against disturbing influences, that is, to attacks against the embedded message. …”
    Get full text
    Article
  7. 1847

    Analysis of Basic Compounds in a Network Intrusion Detection System using NSL-KDD Data by Naglaa Ibrahim, Hana Usman

    Published 2013-03-01
    “…The increasing of security attacks  and unauthorized intrusion have made network security one of the main  subjects that should be considered in present data communication environment. …”
    Get full text
    Article
  8. 1848

    Research of the Finite State Machine with Programmable Logic as a Part of Digital Information and Control System Based on FPGA by Barkalov A., Titarenko L., Zeleneva I., Hrushko S.

    Published 2019-06-01
    “…The purpose of this research is to determine the effective way of implementation of the control algorithm, as an important functional part of information and control computer systems. …”
    Get full text
    Article
  9. 1849

    Solving Three-Stage Operating Room Scheduling Problems with Uncertain Surgery Durations by Yang-Kuei Lin, Chin Soon Chong

    Published 2025-06-01
    “…To solve this problem, we propose a Genetic Algorithm for Robust Scheduling (GARS), which evaluates solutions using a scenario-based robustness criterion derived from multiple sampled instances. …”
    Get full text
    Article
  10. 1850
  11. 1851

    Investigating Feed-Forward Back-Propagation Neural Network with Different Hyperparameters for Inverse Kinematics of a 2-DoF Robotic Manipulator: A Comparative Study by Rania Bouzid, Jyotindra Narayan, Hassène Gritli

    Published 2024-06-01
    “…Three different training optimizers are considered, namely the Levenberg-Marquardt (LM) algorithm, the Bayesian Regularization (BR) algorithm, and the Scaled Conjugate Gradient (SCG) algorithm. …”
    Get full text
    Article
  12. 1852

    Reconstruction of Three-Dimensional Object from Two-Dimensional Images by Utilizing Distance Regularized Level Algorithm and Mesh Object Generation by Samera Shams Hussei, Sukaina Sh Altyar, Lubab Ahmed Tawfeeq, Eman S. Harba

    Published 2020-07-01
    “…Three-dimensional (3D) reconstruction from images is a most beneficial method of object regeneration by using a photo-realistic way that can be used in many fields. For industrial fields, it can be used to visualize the cracks within alloys or walls. …”
    Get full text
    Article
  13. 1853

    A model adapted to predict blast vibration velocity at complex sites: An artificial neural network improved by the grasshopper optimization algorithm by Yong Fan, Guangdong Yang, Yong Pei, Xianze Cui, Bin Tian

    Published 2025-06-01
    “…Many factors complicate the blasting vibration velocity at complex sites because of their nonlinear relationships. …”
    Get full text
    Article
  14. 1854

    Research on the application of data mining based on digital economy in customer segmentation management by Zhang Chenglin

    Published 2025-01-01
    “…After understanding the development trend of digital economy, this paper mainly discusses the application of data mining based on digital economy in customer segmentation management according to the research situation of customer segmentation management at home and abroad, and finally verifies the application advantages of the model algorithm according to the data obtained by a regional logistics enterprise.…”
    Get full text
    Article
  15. 1855

    A Smooth Jump Point Search Algorithm for Mobile Robots Path Planning Based on a Two-Dimensional Grid Model by Zhen Yang, Junli Li, Liwei Yang, Hejiang Chen

    Published 2022-01-01
    “…To address the problems of the traditional A∗ algorithm in solving paths with many expansion nodes, high memory overhead, low operation efficiency, and many path corners, this paper improved the traditional A∗ algorithm by combining jump point search strategy and adaptive arc optimization strategy. …”
    Get full text
    Article
  16. 1856

    Novel method for joint parameter estimation based on FPSD in wideband bistatic MIMO radar system by Li LI, Tian-shuang QIU

    Published 2014-06-01
    “…A novel algorithm to jointly estimate parameters based on the fractional power spectrum density (FPSD) was proposed in wideband bistatic MIMO radar system. …”
    Get full text
    Article
  17. 1857
  18. 1858

    Algorithmic management and human-centered task design: a conceptual synthesis from the perspective of action regulation and sociomaterial systems theory by Carsten Röttgen, Britta Herbig, Tobias Weinmann, Andreas Müller

    Published 2024-09-01
    “…This paper aims to explain potential psychological effects of algorithmic management (AM) on human-centered task design and with that also workers’ mental well-being. …”
    Get full text
    Article
  19. 1859

    A self-adaptive viscosity-type inertial algorithm for common solutions of generalized split variational inclusion and paramonotone equilibrium problem by Yali Zhao, Qixin Dong, Xiaoqing Huang

    Published 2025-02-01
    “…Under the assumption of generalized monotonicity of the related mappings, the strong convergence of the iterative algorithm was established. The results presented here improve and generalize many results in this area.…”
    Get full text
    Article
  20. 1860

    Hybridization of deep learning models with crested porcupine optimizer algorithm-based cybersecurity detection on industrial IoT for smart city environments by Sarah A. Alzakari, Mohammed Aljebreen, Mashael M. Asiri, Wahida MANSOURI, Sultan Alahmari, Mohammed Alqahtani, Shaymaa Sorour, Wafi Bedewi

    Published 2025-08-01
    “…Smart cities have attracted extensive coverage from multidisciplinary studies, and many artificial intelligence (AI) solutions have been designed. …”
    Get full text
    Article