Search alternatives:
articles » article (Expand Search)
Showing 4,181 - 4,200 results of 64,512 for search 'articles algorithm', query time: 0.29s Refine Results
  1. 4181

    NEURAL NETWORK ALGORITHM SAFE OVERFLIGHT AERIAL OBSTACLES AND PROHIBITED LAND AREAS by D. A. Mikhaylin

    Published 2017-09-01
    “…The article presents the algorithm of safe flying around obstacles when making en route flight of manned and unmanned aircraft. …”
    Get full text
    Article
  2. 4182

    A fault detection and location algorithm for the LVDC interconnection network in rural area by Chengwei Liu, Joan Marc Rodriguez‐Bernuz, Di Liu, Saizhao Yang, Yitong Li, Qiteng Hong, Adrià Junyent‐Ferré

    Published 2024-12-01
    “…To solve this problem, this article proposes a fault detection and location algorithm without requiring extra sensors and DCCBs in lines. …”
    Get full text
    Article
  3. 4183

    Improved whale optimization algorithm and its application in heterogeneous wireless sensor networks by Yinggao Yue, Hairong You, Shuxin Wang, Li Cao

    Published 2021-05-01
    “…Aiming at the problems of node redundancy and network cost increase in heterogeneous wireless sensor networks, this article proposes an improved whale optimization algorithm coverage optimization method. …”
    Get full text
    Article
  4. 4184

    The Construction of an Universal Linearized Control Flow Graph for Static Code Analysis of Algorithms by V. A. Bitner, N. V. Zaborovsky

    Published 2013-04-01
    “…That fact was demonstrated by the example code of the Peterson mutual execution algorithm for 2 threads.…”
    Get full text
    Article
  5. 4185
  6. 4186

    Robust Hybrid Control Algorithm for Tuning the Altitude and Attitude of Unmanned Aerial Vehicle by Bohang Wang, Daobo Wang

    Published 2020-01-01
    “…In this article, a new and novel robust hybrid control algorithm is designed for tuning the parameters of unmanned aerial vehicle (UAV). …”
    Get full text
    Article
  7. 4187

    Simulation of automatic intrusion detection in university networks by using neural network algorithms by Houdun Xu

    Published 2025-09-01
    “…With the rapid development of computers and the Internet, university networks are facing more and more network intrusion threats, and it is necessary to develop an automatic detection method based on neural network algorithms. This article collects a large amount of network intrusion data from universities and obtains data on normal network traffic for comparison. …”
    Get full text
    Article
  8. 4188
  9. 4189

    Critical Algorithmic Mediation: Rethinking Cultural Transmission and Education in the Age of Artificial Intelligence by Fulgencio Sánchez-Vera

    Published 2025-07-01
    “…The article examines the historical role of media in cultural transmission, the epistemic effects of algorithmic infrastructures, and the emergence of algorithmic hegemony as a regime of symbolic power. …”
    Get full text
    Article
  10. 4190

    Evolution of Cleft Lip and Palate Surgery and the Pursuit for Consensus on Standardized Algorithms of Care by Priyanka Naidu, MBChB, MS, Alexander T. Plonkowski, MBBS, MRes, Caroline A. Yao, MD, MS, William P. Magee, III, MD, DDS

    Published 2025-03-01
    “…Unlike many other surgical conditions, there is no gold-standard algorithm of care for CLP. Several international consortiums, including Eurocleft, Americleft, and Scandcleft, aimed to investigate the ideal cleft care protocol. …”
    Get full text
    Article
  11. 4191

    Research of neural network algorithms for recognizing railway infrastructure objects in video images by E.V. Medvedeva, A.A. Perevoshchikova

    Published 2025-06-01
    “…The article describes the development of two neural network algorithms for recognizing objects of the railway infrastructure in video images. …”
    Get full text
    Article
  12. 4192

    Defining Algorithmic Ideology: Using Ideology Critique to Scrutinize Corporate Search Engines by Astrid Mager

    Published 2014-02-01
    “…This article conceptualizes “algorithmic ideology” as a valuable tool to understand and critique corporate search engines in the context of wider socio-political developments. …”
    Get full text
    Article
  13. 4193

    Energy and channel transmission management algorithm for resource harvesting body area networks by Zhigang Chen, Lin Guo, Deyu Zhang, Xuehan Chen

    Published 2018-02-01
    “…Simulation results demonstrate the effectiveness of the proposed algorithm.…”
    Get full text
    Article
  14. 4194

    A multi-greedy spectrum auction algorithm for cognitive small cell networks by Feng Zhao, Bo Liu, Hongbin Chen

    Published 2017-06-01
    “…Compared with the Vickrey–Clarke–Groves algorithm, simulation results show the higher utility and spectrum allocation efficiency of the proposed algorithm.…”
    Get full text
    Article
  15. 4195

    Multi scenario chaotic transient search optimization algorithm for global optimization technique by Ibrahim Mohamed Diaaeldin, Hany M. Hasanien, Mohammed H. Qais, Saad Alghuwainem, Othman A. M. Omar

    Published 2025-02-01
    “…In this article, a metaheuristic, physics-based algorithm called chaotic transient search optimization (CTSO) algorithm is developed to solve 23 benchmark functions, including uni- and multi-modal optimization functions. …”
    Get full text
    Article
  16. 4196

    A novel Smishing defense approach based on meta-heuristic optimization algorithms by Mohammad Alshinwan, Osama A. Khashan, Zakwan Alarnaout, Salam Salameh Shreem, Ahmed Younes Shdefat, Nader Abdel Karim

    Published 2025-05-01
    “…This paper introduces an approach for detecting SMS phishing based on machine learning algorithms. The suggested system incorporates feature extraction, oversampling, and selection and classification optimization algorithms. …”
    Get full text
    Article
  17. 4197

    An Intelligent Audio Encryption and Compression Algorithm Inspired by the Encoding of Various Biological Sequences by Mohammad Nassef

    Published 2025-01-01
    “…Biological sequences retain huge amount of information which present new horizon over legacy encryption algorithms in terms of encoding capacity. This article introduces an intelligent audio encryption and compression framework, namely Audio-to-Peptide (A2P), that mimics the successive generation of biological sequences to successively encrypt and compress sequences of frames in raw WAV audio files. …”
    Get full text
    Article
  18. 4198

    Computerised Method of Multiparameter Optimisation of Predictive Control Algorithms for Asynchronous Electric Drives by Grygorii Diachenko, Serhii Semenov, Katarzyna Marczak, Gernot Schullerus, Ivan Laktionov

    Published 2025-07-01
    “…This article addresses the problem of increasing the energy efficiency of electromechanical systems driven by asynchronous electric drives. …”
    Get full text
    Article
  19. 4199

    A Ultra-Low Cost and Accurate AMC Algorithm and Its Hardware Implementation by Yuqin Zhao, Tiantai Deng, Bill Gavin, Edward A. Ball, Luke Seed

    Published 2025-01-01
    “…To address the challenges of speed and accuracy, this article presents a low-cost, and accurate AMC algorithm and its FPGA implementation that can achieve both fast and accurate results at the same time. …”
    Get full text
    Article
  20. 4200

    Calculation of the steady-state mode of the electric network using a genetic algorithm by V. I. Polischuk, V. A. Tkachenko, A. O. Shepelev

    Published 2025-03-01
    “…Introduction. This article discusses the application of evolutionary optimization methods in problems of calculating the steady-state mode of an electrical network, in particular, genetic algorithms.Goal. …”
    Get full text
    Article