-
281
Intelligent Recommendation Algorithm of Multimedia English Distance Education Resources Based on User Model
Published 2022-01-01“…Firstly, the algorithm considers the score difference caused by different user scoring habits when expressing preferences and adopts the decoupling normalization method to normalize the user scoring data; secondly, considering the forgetting shift of user interest with time, the forgetting function is used to simulate the forgetting law of score, and the weight of time forgetting is introduced into user score to improve the accuracy of recommendation; finally, the similarity calculation is improved when calculating the nearest neighbor set. …”
Get full text
Article -
282
The interaction between temperature and precipitation on the potential distribution range of Betula ermanii in the alpine treeline ecotone on the Changbai Mountain
Published 2024-01-01“…The low temperature-determined alpine treeline is expected to shift upwards in response to global warming. However, little is known about how temperature interacts with other important factors to influence the distribution range of tree species within and beyond the alpine treeline ecotone. …”
Get full text
Article -
283
Weak Edge Detection Algorithm for Medical Images Based on Full Convolution Neural Network
Published 2021-06-01“…A weak edge detection algorithm for complex medical images based on full convolution neural network is proposed. …”
Get full text
Article -
284
Mixed Far-Field and Near-Field Source Localization Algorithm via Sparse Subarrays
Published 2018-01-01“…Based on a dual-size shift invariance sparse linear array, this paper presents a novel algorithm for the localization of mixed far-field and near-field sources. …”
Get full text
Article -
285
SCAN-C: a lightweight cryptographic algorithm to secure CAN communications in modern vehicles
Published 2025-07-01“…We propose a lightweight cryptographic algorithm SCAN-C with a unique architecture to secure data communication over the CAN bus in contemporary vehicles. …”
Get full text
Article -
286
A Mathematical Survey of Image Deep Edge Detection Algorithms: From Convolution to Attention
Published 2025-07-01Get full text
Article -
287
Improved QT-Opt Algorithm for Robotic Arm Grasping Based on Offline Reinforcement Learning
Published 2025-05-01“…This study proposes an improved QT-Opt algorithm for robotic arm grasping based on offline reinforcement learning. …”
Get full text
Article -
288
Enhancing the Process of AES: A Lightweight Cryptography Algorithm AES for Ad-hoc Environments
Published 2022-12-01“…Therefore, an AES lightweight algorithm is proposed, which is one of the complicated encryption algorithms. …”
Get full text
Article -
289
ISAR Autofocus Imaging Algorithm for Maneuvering Targets Based on Phase Retrieval and Keystone Transform
Published 2019-01-01“…Finally, the Doppler frequency shifts of scatterers will be time invariant in the phase of the received signal. …”
Get full text
Article -
290
Green vehicle routing optimization based on dynamic constraint selection co-evolutionary algorithm
Published 2025-05-01“…The algorithm treats the complete problem model as a complex task and introduces a shift crowding distance calculation that considers both individual distribution and convergence information when solving this complex task, effectively balancing the convergence and diversity of solutions. …”
Get full text
Article -
291
Efficient detection technique in a MIMO system using the received signal compensation algorithm
Published 2025-07-01“…The results were obtained for three configurations of multiple input multiple output antennas with binary phase-shift keying (BPSK) modulation via MATLAB 2020 software. …”
Get full text
Article -
292
Identifying Climate Change Impacts On Hydrological Behavior On Large-Scale With Machine Learning Algorithms
Published 2022-10-01“…Clusters corresponding to different types of water regime can be obtained by utilizing contemporary clustering algorithms. The study shows that over the past 40 years, the southern types of water regimes have noticeably shifted to the north.…”
Get full text
Article -
293
Parameter Justification of a Signal Recognition Algorithm Based on Detection at Two Intermediate Frequencies
Published 2023-11-01“…The influence of the parameters of functional blocks and received signals on the efficiency of the developed algorithm was investigated. For chirp, simple pulse, binary, and quadrature phase shift keying signals, the following parameters are recommended: a pulse duration of 5…20 μs; a chirp rate of 0.8…24 MHz/μs; a code duration of 0.5…1 μs. …”
Get full text
Article -
294
Robert Rosen’s Relational Biology Theory and His Emphasis on Non-Algorithmic Approaches to Living Systems
Published 2024-11-01“…This paper examines the use of algorithms and non-algorithmic models in mathematics and science, especially in biology, during the past century by summarizing the gradual development of a conceptual rationale for non-algorithmic models in biology. …”
Get full text
Article -
295
Evaluating soiling effects to optimize solar photovoltaic performance using machine learning algorithms
Published 2025-04-01“…Fossil fuel environmental issues and escalating costs have prompted a global shift towards renewable energy sources like solar photovoltaic. …”
Get full text
Article -
296
The method of high-speed digital data transfer over unsteady optic channel with using M-ary amplitude-shift keying for phased array antenna radar stations
Published 2015-06-01“…The algorithms frame and symbol synchronization are concerned. …”
Get full text
Article -
297
Design and Simulation of Cascaded SVG Control System
Published 2011-01-01“…A set of high voltage reactive power compensation device is designed on the basis of principle analyzing of SVG and carrier phase-shifted SPWM of multilevel inverter, and verifies its control algorithm. …”
Get full text
Article -
298
Encryption Of Speech Signal With Multiple Secret Keys
Published 2016-05-01“… In this paper, we proposed an encryption system for speech signals based on circular shifts in row and column. This cryptosystem uses three secret keys. …”
Get full text
Article -
299
Time-Varying Modal Parameters Identification by Subspace Tracking Algorithm and Its Validation Method
Published 2018-01-01“…In order to improve the quality of the identified results as well as sifting and validating the real modal parameters, a post-process procedure based on density-based spatial clustering of applications with noise (DBSCAN) algorithm is introduced. …”
Get full text
Article -
300
An innovative genetic algorithm-based master schedule to optimize job shop scheduling problem
Published 2024-12-01“…Compared with some benchmark methods such as priority rules-based approaches, branch and bound algorithm (B&B), and shifting bottleneck algorithm (SB), the proposed GA-MS shows an outstanding performance concerning the tested datasets. …”
Get full text
Article