Showing 1,741 - 1,760 results of 6,037 for search 'main algorithm', query time: 0.13s Refine Results
  1. 1741

    The concept and content of the contract of participation in shared construction and its legal characteristics by A. E. Kolieva, G. G. Khachiev, F. G. Konova

    Published 2022-09-01
    “…It made it possible to study the theoretical, factual and legal grounds of the phenomenon of shared construction in Russia.The main results, scope of application. The article stipulates the main features of the contract of shared construction, different points of view on the definition of this kind of contracts, the algorithm of concluding a contract of shared construction and Russian judicial practice in this sphere.…”
    Get full text
    Article
  2. 1742

    Classification-based point cloud denoising and 3D reconstruction of roadways by Denghong CHEN, Ning PANG, Wen NIE, Juqiang FENG, Jiliang KAN, Jinjing ZHANG

    Published 2025-05-01
    “…The integration algorithm could automatically analyze the noise types of point cloud data and then efficiently remove noise at different scales via an adaptive mechanism, thus achieving in-depth cleaning of main point cloud data. …”
    Get full text
    Article
  3. 1743

    二维实数编码遗传算法在普通圆柱蜗杆传动优化设计中的应用 by 张艳, 黄乾贵

    Published 2005-01-01
    “…Because of low calculation efficiency and early convergence of the traditional binary scale code of genetic algorithm, genetic algorithm of the two-dimensional real number code is used to do the optimizing design to the cylindrical worm and method of choosing main parameters is presented.…”
    Get full text
    Article
  4. 1744

    ELIMINATION OF ERRORS IN CODEWORDS ACCORDING TO THE RESULTS OF PARITY CHECKING by A. S. Poljakov, V. E. Samsonov

    Published 2019-06-01
    “…An algorithm for finding wrong symbols in codewords based on using the results of checking for parity on axes and main diagonal of code plane is proposed. …”
    Get full text
    Article
  5. 1745

    Constructing network enterprise structure to create innovative products by Yu. F. Telnov, V. M. Trembach, A. V. Danilov, E. V. Yaroshenko, V. A. Kazakov, O. A. Kozlova

    Published 2019-12-01
    “…It is proposed to use a combination of QFD (Quality Function Deployment) methods for deploying the structure of a network enterprise and analyzing the types and consequences of potential FMEA (Failure Mode and Effects Analysis) inconsistencies.The main results of the study are ontology and the algorithm for forming the structure of the network enterprise. …”
    Get full text
    Article
  6. 1746

    A Module for Calculating Pollutant Mass Emissions Produced by Traffic Flows by N. I. Kurakina, R. A. Myshko

    Published 2022-12-01
    “…Air pollution in residential zones should be comprehensively assessed using algorithmic and software support, taking the main factors of pollution into account.Aim. …”
    Get full text
    Article
  7. 1747

    Self-organized cyber physical power system blockchain architecture and protocol by Ting Yang, Feng Zhai, Jialin Liu, Meng Wang, Haibo Pen

    Published 2018-10-01
    “…In the traditional centralized data acquisition and management architecture, the security and trustworthiness completely depend on the central main server. A small mistake in the main server will result in data loss, which is irreversible and fatal. …”
    Get full text
    Article
  8. 1748

    METHODS FOR SEARCHING AND COMPARING OBJECTS WHEN APPLYING THE SUBJECT-SUBJECT APPROACH TO MANAGEMENT REVIEW by N.Yu. Zaitseva, T.V. Moiseeva

    Published 2024-10-01
    “…Among the well-known algorithms, four of the most popular fuzzy string comparison algorithms are highlighted: Hamming algorithm, Levenstein editorial distance (algorithm), Damerau–Levenstein editorial distance (algorithm) and distance (algorithm) Jaro-Winkler. …”
    Article
  9. 1749

    FEATURES OF THE DEVELOPMENT OF THE FOREIGN ECONOMIC ACTIVITY AT THE MODERN ENTERPRISE by М. О. Панченко, А. А. Капелюшна

    Published 2018-07-01
    “…It is established that the updating of the enterprise’s foreign economic activity leads to the implementation and formation of a strategy of competitive advantages at the enterprise. The enterprises’ main features on the external market of commodity circulation are singled out and the algorithm of acceptance by the enterprise of administrative decisions on an exit on the external market is constructed.…”
    Get full text
    Article
  10. 1750

    Keywords spotting in Russian handwritten documents based on strokes segmentation by D. D. Feoktistov, L. M. Mestetskiy, L. M. Mestetskiy

    Published 2024-12-01
    “…We propose a two-stage algorithm to solve this problem. The first stage involves classifying the strokes, which are the main elements of handwriting. …”
    Get full text
    Article
  11. 1751

    An automatic adaptive method to combine summary statistics in approximate Bayesian computation. by Jonathan U Harrison, Ruth E Baker

    Published 2020-01-01
    “…We address this problem by developing an automatic, adaptive algorithm that chooses weights for each summary statistic. …”
    Get full text
    Article
  12. 1752

    THE MATHEMATICAL MODELING ESTIMATION OF THE AORTIC VALVE STATE DURING MECHANICAL CIRCULATORY SUPPORT by I. B. Bykov, G. P. Itkin

    Published 2014-12-01
    “…This work is to research the aortic valve functioning during left ventricle bypass with non-pulsatile pump.Materials and methods. The main part of the research is author’s algorithm to estimate aortic valve state (open/closed). …”
    Get full text
    Article
  13. 1753

    Calculation of queue formation and queue length at airport check-in counters by Petr Had, Jiří Volt, Slobodan Stojić

    Published 2025-06-01
    “… This paper focuses on calculation of airport passenger queue formation and its length. The main goal of the paper is to evaluate the appropriateness of the combination of machine learning and determistic algorithm for queue length determination. …”
    Get full text
    Article
  14. 1754

    A Soft-Fault Diagnosis Method for Coastal Lightning Location Networks Based on Observer Pattern by Yiming Zhang, Ping Guo

    Published 2025-07-01
    “…This paper first analyzes the main factors contributing to the error of the lightning location algorithm under this mode, proposes an observer pattern estimation algorithm (OPE) for lightning location, and defines the proportion of improvement in lightning positioning accuracy (PI) caused by the OPE algorithm. …”
    Get full text
    Article
  15. 1755

    Kernel Local Linear Discriminate Method for Dimensionality Reduction and Its Application in Machinery Fault Diagnosis by Kunju Shi, Shulin Liu, Hongli Zhang, Bo Wang

    Published 2014-01-01
    “…Lastly, kernel trick is included in KLLD algorithm to find more precise solution. The main feature of the proposed method is that it attempts to both preserve the intrinsic neighborhood geometry of the increased data and exact the discriminate information. …”
    Get full text
    Article
  16. 1756

    Advanced hybrid machine learning based modeling for prediction of properties of ionic liquids at different temperatures by Saud Bawazeer

    Published 2025-07-01
    “…The harmony search (HS) algorithm was employed as an optimization algorithm to find the best hyper-parameters combination by minimizing the error. …”
    Get full text
    Article
  17. 1757

    Development of a regenerative braking energy utilization device for heavy-haul electrified railways by KANG Dejian, XIE Baozhen, FENG Wenjie, HU Liang, ZHAO Tongxi, LIN Zhenli, LUO Rui

    Published 2025-03-01
    “…This algorithm sets clear power quality control goals, ensuring better control performance. …”
    Get full text
    Article
  18. 1758

    HARMONIC DRIVE SELECTION by Piotr FOLĘGA

    Published 2014-03-01
    “…It also presents the algorithm correct choice of harmonic drive. The main objective of this study was to develop a computer program that allows the correct choice of harmonic drive by developed algorithm.…”
    Get full text
    Article
  19. 1759

    RATING OF THE REGION’S INVESTMENT POTENTIAL IN RUSSIAN FEDERATION: MULTIDIMENSIONAL STATISTICAL ANALYSIS by Victor V. Nikitin, Alexander A. Nazarov, Dmitry V. Bobin

    Published 2016-08-01
    “…Algorithm of the creation integral factor for estimation ofthe region’s investment potential is given in the article. …”
    Get full text
    Article
  20. 1760

    Privacy matching-based service proxy discovery scheme by Kui GENG, Sheng WAN, Feng-hua LI, Yuan-yuan HE, Han-yi WANG

    Published 2016-08-01
    “…According to user's requirements on the proxy performance,cost and safety in proxy discovery,and the pri-vacy-preserving issue during the process of the demand private matching,a new private matching algorithm was pre-sented based on Paillier homomorphic encryption,comprehensively considered the attributes of user and agents and their priority.It included four steps:building the similarity function based on Euclidean distance,carrying on the private matching by encryption algorithm,calculating the similarity and screening the proxy chain.Proposed scheme introduced semi trusted primary proxy from the global level,which is to manage all the sub proxy's business type and the connection status,and do the main computational overhead.At the same time,Euclidean distance and Paillier homomorphic encryp-tion algorithm were combined to support the multivariate attributes with priority to match,which can effectively protect the privacy of user and sub proxy.Finally,security analysis and evaluation results show the effectiveness and safety of proposed scheme.…”
    Get full text
    Article