-
1741
The concept and content of the contract of participation in shared construction and its legal characteristics
Published 2022-09-01“…It made it possible to study the theoretical, factual and legal grounds of the phenomenon of shared construction in Russia.The main results, scope of application. The article stipulates the main features of the contract of shared construction, different points of view on the definition of this kind of contracts, the algorithm of concluding a contract of shared construction and Russian judicial practice in this sphere.…”
Get full text
Article -
1742
Classification-based point cloud denoising and 3D reconstruction of roadways
Published 2025-05-01“…The integration algorithm could automatically analyze the noise types of point cloud data and then efficiently remove noise at different scales via an adaptive mechanism, thus achieving in-depth cleaning of main point cloud data. …”
Get full text
Article -
1743
二维实数编码遗传算法在普通圆柱蜗杆传动优化设计中的应用
Published 2005-01-01“…Because of low calculation efficiency and early convergence of the traditional binary scale code of genetic algorithm, genetic algorithm of the two-dimensional real number code is used to do the optimizing design to the cylindrical worm and method of choosing main parameters is presented.…”
Get full text
Article -
1744
ELIMINATION OF ERRORS IN CODEWORDS ACCORDING TO THE RESULTS OF PARITY CHECKING
Published 2019-06-01“…An algorithm for finding wrong symbols in codewords based on using the results of checking for parity on axes and main diagonal of code plane is proposed. …”
Get full text
Article -
1745
Constructing network enterprise structure to create innovative products
Published 2019-12-01“…It is proposed to use a combination of QFD (Quality Function Deployment) methods for deploying the structure of a network enterprise and analyzing the types and consequences of potential FMEA (Failure Mode and Effects Analysis) inconsistencies.The main results of the study are ontology and the algorithm for forming the structure of the network enterprise. …”
Get full text
Article -
1746
A Module for Calculating Pollutant Mass Emissions Produced by Traffic Flows
Published 2022-12-01“…Air pollution in residential zones should be comprehensively assessed using algorithmic and software support, taking the main factors of pollution into account.Aim. …”
Get full text
Article -
1747
Self-organized cyber physical power system blockchain architecture and protocol
Published 2018-10-01“…In the traditional centralized data acquisition and management architecture, the security and trustworthiness completely depend on the central main server. A small mistake in the main server will result in data loss, which is irreversible and fatal. …”
Get full text
Article -
1748
METHODS FOR SEARCHING AND COMPARING OBJECTS WHEN APPLYING THE SUBJECT-SUBJECT APPROACH TO MANAGEMENT REVIEW
Published 2024-10-01“…Among the well-known algorithms, four of the most popular fuzzy string comparison algorithms are highlighted: Hamming algorithm, Levenstein editorial distance (algorithm), Damerau–Levenstein editorial distance (algorithm) and distance (algorithm) Jaro-Winkler. …”
Article -
1749
FEATURES OF THE DEVELOPMENT OF THE FOREIGN ECONOMIC ACTIVITY AT THE MODERN ENTERPRISE
Published 2018-07-01“…It is established that the updating of the enterprise’s foreign economic activity leads to the implementation and formation of a strategy of competitive advantages at the enterprise. The enterprises’ main features on the external market of commodity circulation are singled out and the algorithm of acceptance by the enterprise of administrative decisions on an exit on the external market is constructed.…”
Get full text
Article -
1750
Keywords spotting in Russian handwritten documents based on strokes segmentation
Published 2024-12-01“…We propose a two-stage algorithm to solve this problem. The first stage involves classifying the strokes, which are the main elements of handwriting. …”
Get full text
Article -
1751
An automatic adaptive method to combine summary statistics in approximate Bayesian computation.
Published 2020-01-01“…We address this problem by developing an automatic, adaptive algorithm that chooses weights for each summary statistic. …”
Get full text
Article -
1752
THE MATHEMATICAL MODELING ESTIMATION OF THE AORTIC VALVE STATE DURING MECHANICAL CIRCULATORY SUPPORT
Published 2014-12-01“…This work is to research the aortic valve functioning during left ventricle bypass with non-pulsatile pump.Materials and methods. The main part of the research is author’s algorithm to estimate aortic valve state (open/closed). …”
Get full text
Article -
1753
Calculation of queue formation and queue length at airport check-in counters
Published 2025-06-01“… This paper focuses on calculation of airport passenger queue formation and its length. The main goal of the paper is to evaluate the appropriateness of the combination of machine learning and determistic algorithm for queue length determination. …”
Get full text
Article -
1754
A Soft-Fault Diagnosis Method for Coastal Lightning Location Networks Based on Observer Pattern
Published 2025-07-01“…This paper first analyzes the main factors contributing to the error of the lightning location algorithm under this mode, proposes an observer pattern estimation algorithm (OPE) for lightning location, and defines the proportion of improvement in lightning positioning accuracy (PI) caused by the OPE algorithm. …”
Get full text
Article -
1755
Kernel Local Linear Discriminate Method for Dimensionality Reduction and Its Application in Machinery Fault Diagnosis
Published 2014-01-01“…Lastly, kernel trick is included in KLLD algorithm to find more precise solution. The main feature of the proposed method is that it attempts to both preserve the intrinsic neighborhood geometry of the increased data and exact the discriminate information. …”
Get full text
Article -
1756
Advanced hybrid machine learning based modeling for prediction of properties of ionic liquids at different temperatures
Published 2025-07-01“…The harmony search (HS) algorithm was employed as an optimization algorithm to find the best hyper-parameters combination by minimizing the error. …”
Get full text
Article -
1757
Development of a regenerative braking energy utilization device for heavy-haul electrified railways
Published 2025-03-01“…This algorithm sets clear power quality control goals, ensuring better control performance. …”
Get full text
Article -
1758
HARMONIC DRIVE SELECTION
Published 2014-03-01“…It also presents the algorithm correct choice of harmonic drive. The main objective of this study was to develop a computer program that allows the correct choice of harmonic drive by developed algorithm.…”
Get full text
Article -
1759
RATING OF THE REGION’S INVESTMENT POTENTIAL IN RUSSIAN FEDERATION: MULTIDIMENSIONAL STATISTICAL ANALYSIS
Published 2016-08-01“…Algorithm of the creation integral factor for estimation ofthe region’s investment potential is given in the article. …”
Get full text
Article -
1760
Privacy matching-based service proxy discovery scheme
Published 2016-08-01“…According to user's requirements on the proxy performance,cost and safety in proxy discovery,and the pri-vacy-preserving issue during the process of the demand private matching,a new private matching algorithm was pre-sented based on Paillier homomorphic encryption,comprehensively considered the attributes of user and agents and their priority.It included four steps:building the similarity function based on Euclidean distance,carrying on the private matching by encryption algorithm,calculating the similarity and screening the proxy chain.Proposed scheme introduced semi trusted primary proxy from the global level,which is to manage all the sub proxy's business type and the connection status,and do the main computational overhead.At the same time,Euclidean distance and Paillier homomorphic encryp-tion algorithm were combined to support the multivariate attributes with priority to match,which can effectively protect the privacy of user and sub proxy.Finally,security analysis and evaluation results show the effectiveness and safety of proposed scheme.…”
Get full text
Article