Showing 4,681 - 4,700 results of 6,037 for search 'main algorithm', query time: 0.20s Refine Results
  1. 4681
  2. 4682

    A Dataset of Real and Synthetic Speech in Ukrainian by Khrystyna Lipianina-Honcharenko, Hennadii Bohuta, Adam Ivaniush, Mariana Soia

    Published 2025-05-01
    “…The dataset contains a unique collection of audio recordings that include both real and synthesized Ukrainian speech, providing unprecedented opportunities for improving machine learning algorithms aimed at speech recognition and analysis. …”
    Get full text
    Article
  3. 4683

    Professional Evolution of School Teacher on Basis of Advanced Pedagogical Experience by N. L. Sokolova

    Published 2018-09-01
    “…The study of the problems associated with the introduction of the relevant innovations in the educational process determines the main indicators and evaluation criteria of the reviewed work.…”
    Get full text
    Article
  4. 4684

    Some Elements of Operational Modal Analysis by Rune Brincker

    Published 2014-01-01
    “…This paper gives an overview of the main components of operational modal analysis (OMA) and can serve as a tutorial for research oriented OMA applications. …”
    Get full text
    Article
  5. 4685

    Research on Architecture of LEO Satellite Internet of Things and Key Technologies by Xiaojin DING, Tao HONG, Rui LIU, Wentao PENG, Gengxin ZHANG

    Published 2021-12-01
    “…First, we analyzed the composition and demand characteristics of LEO satellite IoTs, and designed an architecture of LEO satellite IoTs.Second, to extracted characteristics of electromagnetic environment and channel, we studied electromagnetic environment and channel sensing methods through constructing neural network model.Then, we investigated an active terminal-identifi cation method for detecting active terminals.Finally, considered multiple-input multiple-output as the main approach to improved the capacity of terrestrial mobile communication systems, we explored a pair of algorithms of mining satellite spatial resources for realizing the collision mitigation and capacity improvement of LEO IoT terminals.Simulation results showed that the designed method sofmining spatial-domain resources could mitigated eff ectively signal collisions among IoT terminals, and improved signifi cantly the concurrent accessing number of LEO satellite IoT terminals.…”
    Get full text
    Article
  6. 4686

    Research on Architecture of LEO Satellite Internet of Things and Key Technologies by Xiaojin DING, Tao HONG, Rui LIU, Wentao PENG, Gengxin ZHANG

    Published 2021-12-01
    “…First, we analyzed the composition and demand characteristics of LEO satellite IoTs, and designed an architecture of LEO satellite IoTs.Second, to extracted characteristics of electromagnetic environment and channel, we studied electromagnetic environment and channel sensing methods through constructing neural network model.Then, we investigated an active terminal-identifi cation method for detecting active terminals.Finally, considered multiple-input multiple-output as the main approach to improved the capacity of terrestrial mobile communication systems, we explored a pair of algorithms of mining satellite spatial resources for realizing the collision mitigation and capacity improvement of LEO IoT terminals.Simulation results showed that the designed method sofmining spatial-domain resources could mitigated eff ectively signal collisions among IoT terminals, and improved signifi cantly the concurrent accessing number of LEO satellite IoT terminals.…”
    Get full text
    Article
  7. 4687

    DEVELOPING THE METHODICAL THINKING OF PROSPECTIVE RUSSIAN LANGUAGE TEACHERS by T. S. Tabachenko

    Published 2015-03-01
    “…The author considers the main characteristics of methodical thinking, its content and structure including the set of cognitive components. …”
    Get full text
    Article
  8. 4688

    Efficient Probabilistic Evaluation and Sensitivity Analysis of Load Supply Capability for Renewable-Energy-Based Power Systems by Jie Zhang, Kaixiang Fu, Weizhi Huang, Yilin Zhang, Qing Sun, Yuan Chi, Junjie Tang

    Published 2025-05-01
    “…In renewable energy generation, uncertainties mainly refer to power output fluctuations caused by the intermittency, variability, and forecasting errors of wind and photovoltaic power. …”
    Get full text
    Article
  9. 4689

    Balancing Performance and Portability: A Study on CsI(Tl) Crystal Sizes for Real-Time Gamma-Ray Spectrum and Dose Monitoring by Nikolaos Voulgaris, Hikari Nishimura, Shingo Tamaki, Sachie Kusaka, Isao Murata

    Published 2024-07-01
    “…The monitor consists mainly of a CsI(Tl) scintillator and a multi-pixel photon counter (MPPC). …”
    Get full text
    Article
  10. 4690

    Performance Investigation of Underwater Wireless Optical Communication System Using M -ary OAMSK Modulation Over Oceanic Turbulence by Wei Wang, Ping Wang, Tian Cao, Hongxin Tian, Yan Zhang, Lixin Guo

    Published 2017-01-01
    “…With Blahut–Arimoto algorithm, the channel capacity for this UWOC system is obtained. …”
    Get full text
    Article
  11. 4691
  12. 4692

    FLUX – Software to Calculate the Synchrotron Radiation Characteristics by P.I. Gladkikh, I.A. Knyaz', A.S. Mazmanishvili, A.A. Shcherbakov

    Published 2015-03-01
    “…In this paper, the main characteristics of quantum flow of synchrotron radiation (SR) of relativistic electron beam in the storage ring NSC KIPT with maximal energy of 225 MeV are represented. …”
    Get full text
    Article
  13. 4693

    Exploring the VAK model to predict student learning styles based on learning activity by Ahmed Rashad Sayed, Mohamed Helmy Khafagy, Mostafa Ali, Marwa Hussien Mohamed

    Published 2025-03-01
    “…Multiple tests were performed by different machine learning classifiers, mainly in predicting learning style and recommending an assessment methodology. …”
    Get full text
    Article
  14. 4694

    Methodology for assessing the severity of diffuse peritonitis and prognosis of relaparotomy by B. V. Sigua, V. P. Zemlyanoy, S. V. Petrov, V. A. Ignatenko, P. A. Kotkov

    Published 2021-08-01
    “…Based on the achieved data, score-prognostic scale for assessing the severity of peritonitis was developed, which allowed to formulate an algorithm of surgical tactics, which was used in the treatment of 109 patients. …”
    Get full text
    Article
  15. 4695

    Hierarchical Clustering Approach With Distribution Similarity Strategy for Multi-Class Botnet Labeling in Real-World Traffic by Ta-Chun Lo, Che-Hsien Lin, Jyh-Biau Chang, Ce-Kuen Shieh

    Published 2025-01-01
    “…The experimental results demonstrate that the proposed hierarchical clustering approach outperforms a single-class clustering algorithm, enabling an additional 7% of the traffic to be labeled. …”
    Get full text
    Article
  16. 4696

    Enhancing DeepLabv3+ Convolutional Neural Network Model for Precise Apple Orchard Identification Using GF-6 Remote Sensing Images and PIE-Engine Cloud Platform by Guining Gao, Zhihan Chen, Yicheng Wei, Xicun Zhu, Xinyang Yu

    Published 2025-05-01
    “…This study enhanced the DeepLabv3+ model to achieve superior performance in apple orchard identification by incorporating ResNet, optimizing the algorithm, and adjusting hyperparameter configuration using the PIE-Engine cloud platform. …”
    Get full text
    Article
  17. 4697

    Secret key generation for reconfigurable intelligent surface‐assisted MISO multi‐user system by Kexin Liu, Mingliang Li, Kaizhi Huang, Zheng Wan, Qinlong Li, Xiaoli Sun, Xiaoming Xu, Liang Jin

    Published 2024-12-01
    “…Then, the difference convex‐successive convex approximation based alternating optimization algorithm is proposed to solve this optimization problem. …”
    Get full text
    Article
  18. 4698

    Fault Kinematics of the 2022 Delingha Mw 5.6 and Mw 5.7 Earthquakes Revealed by InSAR Observations by Xuening Wang, Donglin Wu, Lian Liu, Chenglong Li, Yongliang Bai, Xing Huang

    Published 2024-11-01
    “…We then utilized a Bayesian inversion algorithm to delineate the fault geometries of the two events, and further resolved their coseismic fault slip. …”
    Get full text
    Article
  19. 4699

    Detecting unknown vulnerabilities in smart contracts using opcode sequences by Peiqiang Li, Guojun Wang, Xiaofei Xing, Xiangbin Li, Jinyao Zhu

    Published 2024-12-01
    “…We then use machine learning algorithms to detect unknown vulnerabilities based on the similarity principle. …”
    Get full text
    Article
  20. 4700

    Enhancing Software Defect Prediction Using Ensemble Techniques and Diverse Machine Learning Paradigms by Ayesha Siddika, Momotaz Begum, Fahmid Al Farid, Jia Uddin, Hezerul Abdul Karim

    Published 2025-07-01
    “…In supervised learning, we mainly experimented with several algorithms, including random forest, k-nearest neighbors, support vector machines, logistic regression, gradient boosting, AdaBoost classifier, quadratic discriminant analysis, Gaussian training, decision tree, passive aggressive, and ridge classifier. …”
    Get full text
    Article