Showing 3,181 - 3,200 results of 6,037 for search 'main algorithm', query time: 0.14s Refine Results
  1. 3181

    Height of Hydraulic Fracture Zone Based on PSO_LSSVM Model by Hebin Zhang, Tingting Wang, Bin Wu, Haijun Feng

    Published 2025-06-01
    “…To achieve its effective prediction, this study selects four main control parameters for prediction, including the proportion coefficient of hard rock in the overlying strata, the inclination distance of the working face, and the thickness and depth of mining. …”
    Get full text
    Article
  2. 3182

    Artificial intelligence in predicting pathogenic microorganisms’ antimicrobial resistance: challenges, progress, and prospects by Yan Li, Xiaoyan Cui, Xiaoyan Yang, Guangqia Liu, Juan Zhang

    Published 2024-11-01
    “…Subsequently, we highlight the main AI and ML models used in resistance prediction, including but not limited to Support Vector Machines, Random Forests, and Deep Learning networks. …”
    Get full text
    Article
  3. 3183

    Disturbance Observer-Based Continuous Finite-Time Sliding Mode Control against Matched and Mismatched Disturbances by Ngo Phong Nguyen, Hyondong Oh, Yoonsoo Kim, Jun Moon

    Published 2020-01-01
    “…The proposed DOBCSMC consists of three main features: (i) the nonlinear finite-time disturbance observer to obtain a fast and accurate estimation of matched and mismatched disturbances, (ii) the nonlinear sliding surface to ensure high precision in the steady-state phase of the controlled output, and (iii) the continuous supertwisting algorithm to guarantee finite-time convergence of the controlled output and reduce the chattering under the effect of matched and mismatched disturbances. …”
    Get full text
    Article
  4. 3184

    Collaborative Relay Beamforming Based on Minimum Power for M2M Devices in Multicell Systems by Xiaoning Zhang, Da Wang, Lin Bai, Chen Chen

    Published 2013-12-01
    “…We minimize the transmit power of the base stations (BSs) and relays to save the power of M2M devices, while guaranteeing the receive signal-to-interference-and-noise ratio (SINR) of the destination devices. The main contribution of this paper is that we propose an iterative algorithm to jointly optimize the BS and relay beamforming weights with minimizing the BS and relay power under the receive SINR constraints in the perfect channel state information (CSI). …”
    Get full text
    Article
  5. 3185

    Determination of stresses and forces arising during the technological process of stretching small-section pipes through a roller die using a mandrel tool by V. V. Timofeev, E. V. Patraev, I. V. Trifanov

    Published 2024-01-01
    “…The influence of the geometry and materials of the workpieces on the main technological parameters is definitely determined. …”
    Get full text
    Article
  6. 3186

    Proposing a New Method for Customer Segmentation Based on Their Level of Loyalty and Defining Appropriate Strategies for Each Segment by Samira KHodabandehlou, Ali Akbar Niknafs

    Published 2016-03-01
    “…The obtained data have been analyzed using Clementine 14.2 software application using MLP and RBF neural networks as well as the K-means algorithm. The results of the study show that the proposed method provides the highest level of accuracy for predicting the customers’ loyalty. …”
    Get full text
    Article
  7. 3187

    Robustness evaluation of commercial liveness detection platform by Pengcheng WANG, Haibin ZHENG, Jianfei ZOU, Ling PANG, Hu LI, Jinyin CHEN

    Published 2022-02-01
    “…Liveness detection technology has become an important application in daily life, and it is used in scenarios including mobile phone face unlock, face payment, and remote authentication.However, if attackers use fake video generation technology to generate realistic face-swapping videos to attack the living body detection system in the above scenarios, it will pose a huge threat to the security of these scenarios.Aiming at this problem, four state-of-the-art Deepfake technologies were used to generate a large number of face-changing pictures and videos as test samples, and use these samples to test the online API interfaces of commercial live detection platforms such as Baidu and Tencent.The test results show that the detection success rate of Deepfake images is generally very low by the major commercial live detection platforms currently used, and they are more sensitive to the quality of images, and the false detection rate of real images is also high.The main reason for the analysis may be that these platforms were mainly designed for traditional living detection attack methods such as printing photo attacks, screen remake attacks, and silicone mask attacks, and did not integrate advanced face-changing detection technology into their liveness detection.In the algorithm, these platforms cannot effectively deal with Deepfake attacks.Therefore, an integrated live detection method Integranet was proposed, which was obtained by integrating four detection algorithms for different image features.It could effectively detect traditional attack methods such as printed photos and screen remakes.It could also effectively detect against advanced Deepfake attacks.The detection effect of Integranet was verified on the test data set.The results show that the detection success rate of Deepfake images by proposed Integranet detection method is at least 35% higher than that of major commercial live detection platforms.…”
    Get full text
    Article
  8. 3188

    Afocal Mirror Systems with Small Axial Dimensions by N. K. Artioukhina, L. Peroza

    Published 2020-03-01
    “…A study was made of systems in which the diameter of the aperture diaphragm in the primary mirror is modified, which leads to a more compact system.A calculation algorithm of new the systems is proposed, with correction of the image curvature. …”
    Get full text
    Article
  9. 3189

    Improving Legibility of Motor Current Spectrum for Broken Rotor Bars Fault Diagnostics by Asad Bilal, Vaimann Toomas, Kallaste Ants, Rassõlkin Anton, Belahcen Anouar, Iqbal M. Naveed

    Published 2019-09-01
    “…The results are further validated by implementing the algorithm on the data measured in the laboratory environment including the grid fed harmonics.…”
    Get full text
    Article
  10. 3190

    Features of laboratory tests for diagnosis of rubella in pregnant women by T. D. Grigor’eva, M. A. Belopolskaya, S. S. Vashukova, N. G. Makarova, N. V. Andreeva

    Published 2014-10-01
    “…These women represent a risk group for the rubella disease.Objectives: The goals of the presented work are to analyze the cases of anti-rubella IgM detection in pregnant women, and to develop an algorithm for management of such patients.Materials and Methods: Screening has been performed by ELISA test systems company Radim (Italy). …”
    Get full text
    Article
  11. 3191

    METHODOLOGY AND RESULTS OF MOBILE OBJECT PURSUIT PROBLEM SOLUTION WITH TWO-STAGE DYNAMIC SYSTEM by M. A. Kiselev

    Published 2017-05-01
    “…The experience of developing unmanned fighting vehicles indicates that the main challenge in this field reduces itself to creating the systems which can replace the pilot both as a sensor and as the operator of the flight. …”
    Get full text
    Article
  12. 3192

    Single-Glazed Vacuum Tube Collector with SnAl<sub>2</sub>O<sub>3</sub> Selective Flat Absorber Plate and Gravity Single-Stage Direct Water Flow: A Comprehensive Geometric Optimizat... by Aleksandar Nešović, Robert Kowalik

    Published 2025-02-01
    “…The thermal performance with the geometric optimization (absorber width and glass tube thickness) of the presented solar collector type was determined using the specially designed iterative calculation algorithm (phase 1) and the double multi-criteria analysis (phase 2). …”
    Get full text
    Article
  13. 3193
  14. 3194

    Efficient Methodology for Power Management Optimization of Hybrid-Electric Aircraft by Giuseppe Palaia, Karim Abu Salem, Erasmo Carrera

    Published 2025-03-01
    “…This paper presents an effective simplified model to optimize the mission power management supply for hybrid-electric aircraft in the conceptual design phase. The main aim is to show that, by using simplified representations of the aircraft dynamics, it is possible to achieve reliable results and identify trends useful for early-stage design, avoiding the use of more expensive and advanced methods. …”
    Get full text
    Article
  15. 3195

    Full Envelope Control of Over-Actuated Fixed-Wing Vectored Thrust eVTOL by Emmanuel Enenakpogbe, James F. Whidborne, Linghai Lu

    Published 2024-11-01
    “…The aircraft-level controller consists of a main inner loop classical nonlinear dynamic inversion controller and an outer loop proportional–integral linear controller. …”
    Get full text
    Article
  16. 3196

    Opportunities for Improving Financial Provision of Social Insurance Institutions in the Russian Federation by Yu. P. Kalmykov

    Published 2022-09-01
    “…The main methods of the study include the method of content-analysis, tabular and graphical methods, analysis and synthesis as universal methods of scientific knowledge, as well as methods of effectiveness assessment. …”
    Get full text
    Article
  17. 3197

    Grassland biome fragmentation analysis using sentinal-2 images and support vector machine learning model in South Africa by Andisani Netsianda, Paidamwoyo Mhangara, Eskinder Gidey

    Published 2024-12-01
    “…Mining, agriculture, and human settlement are the main characters. Given the paucity of research on the threatened ecosystem, the support vector machine learning algorithm (SVM) is employed to investigate fragmentation from 2016 to 2023. …”
    Get full text
    Article
  18. 3198

    NEURAL NETWORKS OF THE FINAL RING BASED ON THE REDUCTION SCHEME OF THE POSITION-MODULAR-CODE TRANSFORMATION by N. I. Chervyakov, A. A. Kolyada, N. A. Kolyada, V. A. Kuchukov, S. U. Protasenia

    Published 2018-06-01
    “…The article studies the problem of creating a neural network of modular computing structures for highperformance expressions in the field of information security. The main attention is paid to the reduction technology of position-modular transformation of scalable integers, which serves as the basis for constructing the so-called neural networks of the finite ring (NNFR). …”
    Get full text
    Article
  19. 3199

    Insights into Optimal Schemes of Radial Network Arch Pedestrian Bridge by Rimantas Belevičius, Dainius Rusakevičius, Saulius Valentinavičius

    Published 2022-01-01
    “…The main objective of the article is to find the optimal ranges of the cardinal topological, shape, and dimensional parameters that fully describe the constructional scheme of pedestrian radial network arch bridges of moderate spans. …”
    Get full text
    Article
  20. 3200

    Wartime Journalism: the Communicative Position of the Media Text Author by Natalia S. Tsvetova

    Published 2023-10-01
    “…The aim of the article is to identify axiological trends in the evolution of the media space that guide the modernization of modern public communication processes, which are quite clearly manifested in the communicative position of the author of the media text. The analytical algorithm was formed in line with communicative linguistics, linguistics of speech, i. e. …”
    Get full text
    Article