-
8801
High-Performance Multi-Object Tracking for Autonomous Driving in Urban Scenarios With Heterogeneous Embedded Boards
Published 2025-01-01“…The main objective is to exploit the high-performance capabilities of NVIDIA heterogeneous embedded platforms, which are not automatically compatible with the peculiar features of these algorithms. …”
Get full text
Article -
8802
Mathematical Model and Characteristics of the Induction Motor with a Power Supply from a Current Source
Published 2021-10-01“…The specific features of the algorithms for calculating transients, steady-state modes and static characteristics are discussed. …”
Get full text
Article -
8803
Web search results processing in an information support system for decision-making processes
Published 2024-09-01“…The proven properties of such structures provide algorithmization of information processes in the model under consideration.Conclusion. …”
Get full text
Article -
8804
A Review of Reinforcement Learning for Fixed-Wing Aircraft Control Tasks
Published 2024-01-01“…A lot of that can be attributed to the recent advancements in machine learning (ML) and deep learning (DL) as a whole, the power of deep neural networks and the incorporation of them into reinforcement learning algorithms and techniques. This marriage of deep neural networks and traditional reinforcement learning methods has enabled reinforcement learning algorithms to achieve incredible results in use-cases that were previously deemed to be too complex. …”
Get full text
Article -
8805
Digital solutions for risk management in sustainable development conditions of business ecosystems
Published 2025-06-01“…A prediction system that uses various machine learning algorithms was developed and tested. A comparative analysis of the effectiveness of various machine learning algorithms for the prediction task was conducted. …”
Get full text
Article -
8806
A new method for a priori practical identifiability.
Published 2025-01-01“…This new type of identifiability can be determined using our new algorithms, as is demonstrated by applications to various published biomedical models. …”
Get full text
Article -
8807
Analysis of disease severity and mortality prediction using machine learning during COVID-19
Published 2025-08-01“…This paper focuses on how machine learning (ML) algorithms and applications have been used to analyze disease severity and mortality prediction in COVID-19 research. …”
Get full text
Article -
8808
Remaining Useful Life Estimation through Deep Learning Partial Differential Equation Models: A Framework for Degradation Dynamics Interpretation Using Latent Variables
Published 2021-01-01“…Remaining useful life (RUL) estimation is one of the main objectives of prognostics and health management (PHM) frameworks. …”
Get full text
Article -
8809
Machine learning and company failure prediction: Evidence from South Africa
Published 2025-03-01“…Company failure prediction up to 3 years in advance was measured by applying eight fundamental machine learning techniques and the traditional logit analysis statistical method. Main findings: Two machine learning algorithms outperformed the traditional method in some years. …”
Get full text
Article -
8810
Evaluating machine and deep learning techniques in predicting blood sugar levels within the E-health domain
Published 2023-12-01“…By analysing these algorithms, the research uncovers their distinct behaviours and highlights their dissimilarities, even when their analytical underpinnings may appear similar.…”
Get full text
Article -
8811
A Novel Support Vector Machine with Globality-Locality Preserving
Published 2014-01-01“…However, the solution of the primal optimal model of SVM is susceptible for class distribution and may result in a nonrobust solution. In order to overcome this shortcoming, an improved model, support vector machine with globality-locality preserving (GLPSVM), is proposed. …”
Get full text
Article -
8812
MODELING OF RUNNING CUTTERS FOR SHAPING OF IMPROVED NONINVOLUTE TOOTH GEARS
Published 2012-05-01“…There are proposed calculation algorithms, which may be used in dataware of respective CAD/CAM systems of maintenance for tooling backup. …”
Get full text
Article -
8813
Integrated Power and Attitude Control Design of Satellites Based on a Fuzzy Adaptive Disturbance Observer Using Variable-Speed Control Moment Gyros
Published 2016-01-01“…The algorithms can simultaneously track attitude and power. …”
Get full text
Article -
8814
Search for gamma-ray spectral lines from dark-matter annihilation with the DAMPE satellite
Published 2025-01-01“…The annihilation of dark-matter particles may lead to the production of monochromatic gamma-ray emission. …”
Get full text
Article -
8815
General Construction Method and Proof for a Class of Quadratic Chaotic Mappings
Published 2025-07-01“…The importance of chaotic systems as the main pseudo-random cryptographic generator of encryption algorithms in the field of communication secrecy cannot be overstated, but in practical applications, researchers often choose to build upon traditional chaotic maps, such as the logistic map, for study and application. …”
Get full text
Article -
8816
New concept for the value function of prospect theory
Published 2024-11-01“…Additionally, we have conducted empirical studies on algorithmic trading strategies that employ different value function specifications.…”
Get full text
Article -
8817
Groundwater pollution risk assessment in typical coal-related industry agglomeration area
Published 2025-02-01“…At the same time, combined with the water quality level of groundwater sampling points in the study area, the Random Forest (RF) classification algorithm was utilized to construct the groundwater pollution risk classification prediction method, and the evaluation results were compared with those of the superposition index method. …”
Get full text
Article -
8818
On the Effectiveness of the Minimization Approach to the Query Optimization
Published 2016-04-01“…It includes minimization algorithms based on “condition absorption”, prime implicants, and a set of linear inequalities minimization technics. …”
Get full text
Article -
8819
Verifiable outsourced attribute-based encryption with access update
Published 2019-02-01“…In order to meet the secure and reliable access requirements for the encrypted data stored in the public cloud,a verifiable outsourced attribute-based encryption scheme with access update was proposed.Based on a standard KP-ABE scheme,verifiable outsourced decryption and verifiable access update for a ciphertext through novel constructions for the scheme were obtained.The verifiability of the outsourced computation ensures that the third-party service may perform algorithms honestly.The scheme has selective IND-CPA security for the original and updated ciphertexts,weak master private key security,and verification soundness in the standard model were proved,respectively.Compared with similar schemes from literatures,the proposed scheme can achieve tradeoff in the optimization of functionality,security and efficiency.…”
Get full text
Article -
8820
Influence of Smartphones and Software on Acoustic Voice Measures.
Published 2016-12-01“…The study suggests that certain smartphones may be appropriate to record daily voice measures representing the effects of vocal loading within individuals. …”
Get full text
Article