Showing 161 - 180 results of 10,865 for search '(may OR main) algorithm', query time: 0.21s Refine Results
  1. 161

    Influence maximization algorithm based on social network by Xuan WANG, Yu ZHANG, Junfeng ZHOU, Ziyang CHEN

    Published 2022-08-01
    “…The influence maximization (IM) problem asks for a group of seed users in a social network under a given propagation model, so that the information spread is maximized through these users.Existing algorithms have two main problems.Firstly, these algorithms were difficult to be applied in large-scale social networks due to limited expected influence and high time complexity.Secondly, these algorithms were limited to specific propagation models and could only solve the IM problem under a single type of social network.When they were used in different types of networks, the effect was poor.In this regard, an efficient algorithm (MTIM) based on two classic propagation models and reverse influence sampling (RIS) was proposed.To verify the effectiveness of MTIM, experiments were conducted to compare MTIM with greedy algorithms such as IMM, TIM and PMC, and heuristic algorithms such as OneHop and Degree Discount on four real social networks.The results show that MTIM can return a <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow><mo>(</mo> <mrow> <mn>1</mn><mo>−</mo><mfrac> <mn>1</mn> <mtext>e</mtext> </mfrac> <mo>−</mo><mi>ε</mi></mrow> <mo>)</mo></mrow></math></inline-formula> approximate solution, effectively expand the expected influence and significantly improve the efficiency.…”
    Get full text
    Article
  2. 162

    Video watermarking algorithm for resisting collusion attacks by LIU Shao-hui, HAN Lu, YAO Hong-xun

    Published 2010-01-01
    “…Moreover the mechanism of JND(just-noticeable distortion) was used to adjust the embedding strength of proposed algorithm. These components may be then used as building blocks to construct a self-adaptive content dependent spread spectrum watermark solution. …”
    Get full text
    Article
  3. 163

    Exploring ischemic stroke based on the ferroptosis perspective: ECH1 may serve as a new biomarker and therapeutic target by Rendong Qu, Yiyan Zhang, Haojia Zhang, Ke Li, Boning Zhang, Hongxuan Tong, Tao Lu

    Published 2025-08-01
    “…Using differential expression analysis and machine learning algorithms, 12 potential hub genes were successfully screened. …”
    Get full text
    Article
  4. 164

    Video watermarking algorithm for resisting collusion attacks by LIU Shao-hui, HAN Lu, YAO Hong-xun

    Published 2010-01-01
    “…Moreover the mechanism of JND(just-noticeable distortion) was used to adjust the embedding strength of proposed algorithm. These components may be then used as building blocks to construct a self-adaptive content dependent spread spectrum watermark solution. …”
    Get full text
    Article
  5. 165

    On routing algorithms in the internet of vehicles: a survey by Arundhati Sahoo, Asis Kumar Tripathy

    Published 2023-12-01
    “…Our study comprehensively reviews diverse routing algorithms and their associated assessment methodologies. …”
    Get full text
    Article
  6. 166

    Exact Algorithms for the Satellite Image Selection Problem by Swat Sylwester, Antczak Maciej, Zok Tomasz, Blazewicz Jacek, Musial Jedrzej

    Published 2025-06-01
    “…These algorithms show quality and efficiency compared with existing approaches and are expected to benefit various industrial applications.…”
    Get full text
    Article
  7. 167

    A Calibration Algorithm for Microelectromechanical Inertial Sensors by Nguyen Trong Yen, Nguyen Quoc Khanh, Ha Manh Thang

    Published 2022-09-01
    “…Systematic errors of microelectromechanical (MEMS) inertial sensors, such as those related to zero drift, scale factor, and nonorthogonality of sensitive axes, are the main sources of errors in strapdown inertial navigation systems (SINS). …”
    Get full text
    Article
  8. 168
  9. 169

    Pharmacotherapy algorithm for post-traumatic stress disorder by A. V. Vasileva, T. A. Karavaeva, D. S. Radionov

    Published 2023-10-01
    “…Improvement of existing and development of new pharmacotherapy algorithms is an important component of care provided to patients with PTSD. …”
    Get full text
    Article
  10. 170

    A New MDL-based Clustering Algorithm by Zdravko Markov

    Published 2025-05-01
    “…The Minimum Description Length (MDL) principle is commonly used to evaluate machine learning models. In clustering, it may be used to assess the overall quality of data clustering or in the implementation of clustering algorithms for guiding the search for possible clusterings. …”
    Get full text
    Article
  11. 171
  12. 172

    Classical and Quantum Algorithms for Characters of the Symmetric Group by Sergey Bravyi, David Gosset, Vojtech Havlicek, Louis Schatzki

    Published 2025-08-01
    “…Here we describe a matrix product state (MPS) algorithm for characters of S_{n}. The algorithm computes an MPS encoding all irreducible characters of a given permutation. …”
    Get full text
    Article
  13. 173

    Personalized-Template-Guided Intelligent Evolutionary Algorithm by Dongni Hu, Xuming Han, Minghan Gao, Yali Chu, Ting Zhou

    Published 2025-08-01
    “…Existing heuristic algorithms are based on inspiration sources and have not yet done a good job of basing themselves on optimization principles to minimize and utilize historical information, which may lead to low efficiency, accuracy, and stability of the algorithm. …”
    Get full text
    Article
  14. 174

    Improving Quantum Optimization Algorithms by Constraint Relaxation by Tomasz Pecyna, Rafał Różycki

    Published 2024-09-01
    “…Current quantum optimization algorithms, most of which are hybrid variational-Hamiltonian-based algorithms, struggle to present quantum devices due to noise and decoherence. …”
    Get full text
    Article
  15. 175

    Elite leader dwarf mongoose optimization algorithm by Anping Lin, Yong Liao, Chengfeng Peng, Xiang Li, Xing Zhang

    Published 2025-07-01
    “…Abstract Dwarf mongoose optimization algorithm (DMOA) is a recently proposed meta-heuristics, it attracts widely attention due to its effectiveness in solving complex optimization. …”
    Get full text
    Article
  16. 176

    Review on algorithms of dealing with depressions in grid DEM by Yi-Jie Wang, Cheng-Zhi Qin, A-Xing Zhu

    Published 2019-04-01
    “…Lastly, we discuss a possible design for an optimal depression-processing algorithm which may be developed in the future.…”
    Get full text
    Article
  17. 177

    Algorithms for Making Managerial Decisions in the Digital Economy by V. A. Chernov

    Published 2022-04-01
    “…Such decisions could become an algorithm for artificial intelligence of digital technologies, which determines the relevance of the study. …”
    Get full text
    Article
  18. 178

    EVALUATION OF ITERATIVE ALGORITHMS FOR TOMOGRAPHY IMAGE RECONSTRUCTION by Alexandre F. Velo, Alexandre G. Alvarez, Margarida Mizue Hamada, Carlos Henrique de Mesquita

    Published 2019-02-01
    “…Thus, the algorithm to reconstruct the images has to meet these requirements. …”
    Get full text
    Article
  19. 179

    Big data technology for teaching quality monitoring and improvement in higher education - joint K-means clustering algorithm and Apriori algorithm by Yang Li, Haiyu Zhang

    Published 2024-12-01
    “…In order to cope with these challenges, the study proposes a research method of big data technology based on joint K-mean clustering algorithm and association rule mining algorithm. The study first analyzes the teaching quality monitoring and evaluation indexes using the K-mean algorithm. …”
    Get full text
    Article
  20. 180

    Differential Protection of Main Transformer of Doubly-Fed Wind Farm Based on Current Synthesized Vector Trajectory Characteristics by Xupeng SONG, Xiaoyang YANG, Zhengzhen FAN

    Published 2025-02-01
    “…During the fault ride-through process of the doubly-fed wind farms, the short-circuit current provided by the wind farm side exhibits frequency deviation, which leads to errors in the Fourier algorithm based phasor extraction. Additionally, the second harmonic restraint element may act incorrectly, leading to longterm blockage of the differential protection. …”
    Get full text
    Article