Showing 1,401 - 1,420 results of 2,363 for search 'integration construction algorithm', query time: 0.15s Refine Results
  1. 1401

    A KeyBERT-Enhanced Pipeline for Electronic Information Curriculum Knowledge Graphs: Design, Evaluation, and Ontology Alignment by Guanghe Zhuang, Xiang Lu

    Published 2025-07-01
    “…This paper proposes a KeyBERT-based method for constructing a knowledge graph of the electronic information curriculum system, aiming to enhance the structured representation and relational analysis of educational content. …”
    Get full text
    Article
  2. 1402

    A Novel Open Circuit Fault Diagnosis for a Modular Multilevel Converter with Modal Time-Frequency Diagram and FFT-CNN-BIGRU Attention by Ziyuan Zhai, Ning Wang, Siran Lu, Bo Zhou, Lei Guo

    Published 2025-06-01
    “…To solve this problem, an intelligent diagnosis method is proposed to integrate the modal time–frequency diagram and FFT-CNN-BiGRU-Attention. …”
    Get full text
    Article
  3. 1403

    Research and application of a novel grey multivariable model in port scale prediction under the impact of Free Trade Zone by Yuyu Sun, Yuchen Zhang, Zhiguo Zhao

    Published 2024-07-01
    “…First, fractional-order accumulative generation operation (AGO) is introduced, which integrates the policy impact effect. Second, the heuristic grey wolf optimization (GWO) algorithm is used to determine the optimal nonlinear parameters. …”
    Get full text
    Article
  4. 1404

    Machine learning enables legal risk assessment in internet healthcare using HIPAA data by Shixian Liu, Hailing Liu, Siyu Fan, Leming Song, Zeyu Wang

    Published 2025-08-01
    “…Each algorithm has its strengths and limitations depending on the specific legal risk assessment task. …”
    Get full text
    Article
  5. 1405
  6. 1406

    Application of time series database technology in coal mine safety monitoring system by Hongliang ZHANG

    Published 2025-08-01
    “…In the informationization construction of coal mine safety production, the real-time collection, storage, and analysis of massive time-series data is a key technical bottleneck that restricts the efficiency improvement of safety monitoring systems. …”
    Get full text
    Article
  7. 1407

    Identification and validation of genes related to stem cells and telomere maintenance mechanisms as biomarkers for breast cancer by Shuang Zhen, Lifeng Huang, Qiannan Zhu, Rui Chen, Jue Wang, Xiaoming Zha

    Published 2025-07-01
    “…Biomarker candidates were identified using the least absolute shrinkage and selection operator (LASSO) algorithm, followed by pathway enrichment and immunological analyses. …”
    Get full text
    Article
  8. 1408

    STRATEGICITY AS A BASIC PRINCIPLE OF PROFESSIONAL AND PEDAGOGICAL ACTIVITY by Olha O. Lilik

    Published 2020-12-01
    “…It was found that strategies for solving professional problems within pedagogical activities are divided into algorithmic and heuristic. The algorithmic strategy is based on a certain algorithm as a set of rules that provide a single correct solution. …”
    Get full text
    Article
  9. 1409

    Developing an environmental equity index for urban heat wave event by Xiaohui Ma, Li Zhang, Xiaochun Yang, Yue Fan, Fukuda Hiroatsu, Jiahao Zhang, Luyao Li

    Published 2025-02-01
    “…A multi-source data integration approach and a synthetic population algorithm are used to construct a method to calculate environmental equity indices with 100∗100 m spatial resolution. …”
    Get full text
    Article
  10. 1410

    Data-driven predictive model of coal permeability based on microscopic fracture structure characterization by Tianhao Yan, Xiaomeng Xu, Jiafeng Liu, Yihuai Zhang, Muhammad Arif, Xiaowei Xu, Qiang Wang

    Published 2025-07-01
    “…This paper presents a novel integrated approach that leverages the intrinsic relationship between microscopic fracture structure and permeability to construct a predictive model for coal permeability. …”
    Get full text
    Article
  11. 1411

    Adaptive Neural Network Iterative Sliding Mode Course Tracking Control for Unmanned Surface Vessels by Chunbo Zhao, Huaran Yan, Deyi Gao, Renqiang Wang, Qinrong Li

    Published 2022-01-01
    “…The RBF neural network control technology and adaptive control technology are integrated into the control algorithm, and the iterative sliding mode heading tracking controller of the unmanned surface ship adaptive-neural network is designed. …”
    Get full text
    Article
  12. 1412

    A Hierarchical Reinforcement Learning Framework for Multi-Agent Cooperative Maneuver Interception in Dynamic Environments by Qinlong Huang, Yasong Luo, Zhong Liu, Jiawei Xia, Ming Chang, Jiaqi Li

    Published 2025-06-01
    “…At the low level, an improved prioritized experience replay multi-agent deep deterministic policy gradient algorithm (PER-MADDPG) is designed, integrating curriculum learning and prioritized experience replay mechanisms to effectively enhance the interception success rate against complex maneuvering targets. …”
    Get full text
    Article
  13. 1413

    Event-Triggered MFAILC Bipartite Formation Control for Multi-Agent Systems Under DoS Attacks by Han Li, Lixia Fu, Wenchao Wu

    Published 2025-02-01
    “…Subsequently, the proposed DoS attack compensation algorithm and the dynamic event-triggered mechanism are integrated with the model-free adaptive iterative learning control algorithm to design a controller, which is further extended from fixed-topology systems to time-varying topology systems. …”
    Get full text
    Article
  14. 1414

    Node optimization coverage method under link model in passive monitoring system of three-dimensional wireless sensor network by Zhanjun Hao, Nanjiang Qu, Xiaochao Dang, Jiaojiao Hou

    Published 2019-08-01
    “…Based on the genetic algorithm, the particle swarm optimization algorithm which integrates the idea of simulated annealing is regarded as an important operator of the genetic algorithm, which can converge to the optimal solution quickly. …”
    Get full text
    Article
  15. 1415

    Adaptation of k-means to automated forecasting of poorly structured time series of economic dynamics by Dunskaia Lada, Popova Elena

    Published 2025-02-01
    “…We confirmed that use and integration of well-known clustering methods into the linear cellular automaton algorithm allows to identify patterns and improve the quality of the forecast. …”
    Get full text
    Article
  16. 1416

    Design of Instrumentation and Control Components of Power Distribution Systems by Y. A. Klimenko, Y. E. Lvovich, A. P. Preobrazhensky

    Published 2024-03-01
    “…Universal models and algorithms are required to implement processes in power components and identify their optimal parameters. …”
    Get full text
    Article
  17. 1417
  18. 1418

    Software and Hardware Control System for Implementing the Balance Error Scoring System by Oksana Blavt, Gennadii Iedynak, Lesia Galamanzhuk, Tetyana Helzhynska, Yurii Kachurak, Yulia Mykhalskа, Liubov Levandovska, Rostyslav Tymkovych

    Published 2025-05-01
    “…The result of our scientific research was the development of software and hardware control system for the implementation of BESS based on the integration of hardware and data processing algorithms. …”
    Get full text
    Article
  19. 1419

    Building Surface Defect Detection Based on Improved YOLOv8 by Xiaoxia Lin, Yingzhou Meng, Lin Sun, Xiaodong Yang, Chunwei Leng, Yan Li, Zhenyu Niu, Weihao Gong, Xinyue Xiao

    Published 2025-05-01
    “…To address these issues, an improved version of the You Only Look Once (YOLOv8) algorithm is proposed for building surface defect detection. …”
    Get full text
    Article
  20. 1420

    Towards Secure IoT Authentication System Based on Fog Computing and Blockchain Technologies to Resist 51% and Hijacking Cyber-Attacks by Muwafaq Jawad, Ali A. Yassin, Hamid Ali Abed Al-asadi, Zaid Ameen Abduljabbar, Vincent Omollo Nyangares, Zaid Alaa Hussien, Husam A. Neamah

    Published 2025-04-01
    “…To address these challenges, we propose a novel four-phase authentication scheme comprising setup, registration, authentication, and secret construction phases. Our scheme integrates chaotic-based public key cryptosystems, a Light Encryption Device (LED) with a 3-D Lorenz chaotic map algorithm, and blockchain-based fog computing technologies to enhance both efficiency and scalability. …”
    Get full text
    Article