Showing 461 - 480 results of 10,865 for search '(may OR main) algorithm', query time: 0.18s Refine Results
  1. 461

    Hammerstein Nonlinear Active Noise Control with the Filtered-Error LMS Algorithm by Krzysztof MAZUR, Marek PAWEŁCZYK

    Published 2013-09-01
    “…observed in classical ANC using loudspeakers. They are mainly due to vibrations of a not ideally clamped plate and use of nonlinear actuators, like MFC patches. …”
    Get full text
    Article
  2. 462

    Application of the spectral bisection algorithm for the analysis of criminal communities in social networks by K. M. Bondar, V. S. Dunin, P. B. Skripko, N. S. Khokhlov

    Published 2024-07-01
    “…The purpose of the study is to substantiate the use of one of the graph separation methods – the spectral bisection algorithm for the analysis of social networks, as well as to evaluate the possibilities of software implementation of this algorithm during the collection of evidence-based information in the investigation of crimes committed using information and telecommunications technologies.Method. …”
    Get full text
    Article
  3. 463

    Distributed energy efficient unequal clustering algorithm for wireless sensor networks by SHANG Feng-jun1, Mehran Abolhasan2, Tadeusz Wysocki3

    Published 2009-01-01
    “…A distributed energy-efficient unequal clustering (DEEUC) algorithm was proposed for wireless sensor net-works by research current routing algorithms. …”
    Get full text
    Article
  4. 464

    ALGORITHMS FOR IDENTIFICATION OF CUES WITH AUTHORS’ TEXT INSERTIONS IN BELARUSIAN ELECTRONIC BOOKS by Y. S. Hetsevich, T,. I. Okrut, B. M. Lobanov

    Published 2016-10-01
    “…The main stages of algorithms for characters’ gender identification in Belarusian electronic texts are described. …”
    Get full text
    Article
  5. 465
  6. 466

    Seismic Inversion Problem Using a Multioperator Whale Optimization Algorithm by Rui Ni, Xiaodan Liang

    Published 2022-01-01
    “…The whale optimization algorithm (WOA) is a metaheuristic algorithm based on swarm intelligence and it mimics the hunting behavior of whales. …”
    Get full text
    Article
  7. 467

    Algorithms for Effector Prediction in Plant Pathogens and Pests: Achievements and Current Challenges by César De los Santos-Briones, Karla Gisel Carreón-Anguiano, Sara E. Vila-Luna, Jewel Nicole Anna Todd, Ignacio Islas-Flores, Luis Sáenz-Carbonell, Pablo Alejandro Gamas-Trujillo, Blondy Canto-Canché

    Published 2024-10-01
    “…Future algorithms may contemplate these highlighted features and will be better equipped to identify not only canonical effectors but highly elusive non-canonical effectors as well.…”
    Get full text
    Article
  8. 468

    Formation of the pediatric electroretinogram database parameters for the development of doctor’s decisionmaking algorithm by A. E. Zhdanov, A. Yu. Dolganov, V. N. Kazaykin, V. I. Borisov, V. O. Ponomarev, L. G. Dorosinsky, A. V. Lizunov, E. Luchian, X. Bao

    Published 2022-05-01
    “…The development of automated algorithms for analyzing electroretinogram signals may simplify routine processes and improve the quality of diagnosing eye diseases. …”
    Get full text
    Article
  9. 469

    Wireless sensor indoor positioning based on an improved particle filter algorithm by Pan Feng, Danyang Qin, Guangchao Xu, Ruolin Guo, Min Zhao

    Published 2020-02-01
    “…Positioning by wireless sensor network is one of its main functions and has been widely used in many fields. …”
    Get full text
    Article
  10. 470

    Novel virtual topology configuration algorithm for IP over WDM network by LE Zi-chun, FU Ming-lei

    Published 2007-01-01
    “…The load balancing for the whole network was chosen as the optimal objective and a novel virtual topology configuration algorithm was proposed.In the proposed algorithm,the load distribution variance was chosen as a key criterion for judging the load balancing.And the definition and the computing method of the load distribution variance were introduced.In addition,the blocking probability was chosen as the main performance parameter for comparing with other algorithms.In the optical layer,the algorithm proposed was compared with the routing with load balancing heuristics(RLBH) algorithm.Similarly,in IP layer,the algorithm was compared with the fixed-path least-congestion(FPLC) algorithm.Moreover,the numerical results of the algorithm comparison were shown and discussed.The simulation results show that the performance of the algorithm is better than RLBH algorithm and FPLC algorithm on the blocking probability.…”
    Get full text
    Article
  11. 471

    Electronic Controller Automatic Test System Based on Intelligent Control Algorithm by Meiqi Li, Xu Gong

    Published 2022-01-01
    “…In order to improve the automatic test effect of the electronic controller, this paper combines the intelligent control algorithm to construct the automatic test system of the electronic controller. …”
    Get full text
    Article
  12. 472

    A Simplified Hypervolume-Based Evolutionary Algorithm for Many-Objective Optimization by Hong Ji, Cai Dai

    Published 2020-01-01
    “…Evolutionary algorithms based on hypervolume have demonstrated good performance for solving many-objective optimization problems. …”
    Get full text
    Article
  13. 473

    Traffic identification of network business based on multi-layer cascade algorithm by Feng HUANG, Yao WANG, Li HUANG, Jiming YAO, Shidong LIU

    Published 2015-12-01
    “…The contradiction between traffic demand and network bandwidth is the main problem of the current network.Traffic management is one of the effective solutions,at the same time it can improve the quality of service of the network,and network traffic identification is the basis of fine traffic management.The traffic identification method of network business based on multi-layer cascade algorithm was proposed,after the research of network traffic identification and machine learning techniques.This method can adapt to the situation of the complex network traffic flow,and can balance the contradiction between the time performance and the accuracy of the machine learning algorithm.Furthermore the cascade algorithm of this method takes the cost imbalance into account,and takes more attention to the identification of important business,so it can help enhance user experience.…”
    Get full text
    Article
  14. 474

    Implementation of Haar Cascade and Adaboost Algorithms in Photo Classification on Social Networks by Rezty Amalia Aras, Hutami Endang

    Published 2023-06-01
    “…For example, image searches on Instagram may use certain keywords, sometimes called hashtags. …”
    Get full text
    Article
  15. 475

    Research on the Multi-Armed Bandit Algorithm in Path Planning for Autonomous Vehicles by Li Jingyu

    Published 2025-01-01
    “…When applied to autonomous driving, the MAB algorithm may be able to demonstrate its advantages. …”
    Get full text
    Article
  16. 476

    Information Fusion-Based Storage and Retrieve Algorithms for WSNs in Disaster Scenarios by Zhe Xiao, Ming Huang, Jihong Shi, Wenwei Niu, Jingjing Yang

    Published 2011-10-01
    “…Sensor networks are especially useful in catastrophic or disaster scenarios such as abysmal sea, floods, fires, or earthquakes where human participation may be too dangerous. Storage technologies take a critical position for WSNs in such scenarios since the sensor nodes may themselves fail unpredictably, resulting in the loss of valuable data. …”
    Get full text
    Article
  17. 477

    Semianalytical algorithms to study longitudinal beam instabilities in double rf systems by A. Gamelin, V. Gubaidulin, M. B. Alves, T. Olsson

    Published 2025-05-01
    “…In this paper, we provide semianalytical algorithms designed to predict and analyze these instabilities with improved accuracy and robustness. …”
    Get full text
    Article
  18. 478

    Data aggregation scheduling algorithm based on twice maximum independent set by Jian XU, Geng YANG, Zheng-yu CHEN, Hai-yong WANG, Zhen YANG

    Published 2014-01-01
    “…The main task in designing a data aggregation schedule was to get a good trade-off between QoS and weighted fairness guarantee.In order to address this problem,a novel data aggregation scheduling algorithm,MISS,was proposed,which could produce a collision-free TDMA schedule for data aggregation based on twice Maximum Independent Set (MIS).In the first phase,a tree structure based on MIS was constructed,and then it was adjusted according to the energy consumption forecast of each node,forming the balanced data aggregation tree.In the second phase,the approximate maximum weighted Independent set (WMIS) was utilized of all selected links to allocate time slots for each communication link.The results of simulation demonstrate that MISS not only improves the aggregation delay and lifetime of the network,but also gives weighted fairness guarantee.…”
    Get full text
    Article
  19. 479

    Scalable PBFT-like algorithm for trust management of degree/graduation certificates by ZHANG Xuewang, LEI Zhitao, LIN Jinzhao

    Published 2024-09-01
    “…The algorithm was based on a hierarchical design using regional grouping, with a model consisting of main region and sub-region node clusters. …”
    Get full text
    Article
  20. 480

    Detecting DDoS attack based on compensation non-parameter CUSUM algorithm by YAN Fen1~3, CHEN Yi-qun3, HUANG Hao1, YIN Xin-chun3

    Published 2008-01-01
    “…An effective DDoS attack detection method on target-end network was proposed.The main goal was to detect attack in early stages with few expenditure,and record the suspicious packets in the same time.For DDoS attacks which based on TCP,many unacknowledged segments will be observed in victim end.In every time period ? …”
    Get full text
    Article