Showing 1,761 - 1,780 results of 6,037 for search 'main algorithm', query time: 0.11s Refine Results
  1. 1761

    Two-hop cover-based access control scheme for wireless sensor networks by DU Zhi-qiang1, SHEN Yu-long1, MA Jian-feng1, ZHOU Li-hua1

    Published 2010-01-01
    “…In order to support randomly moving users,a THC(two-hop cover) algorithm and a two-hop cover-based ac-cess control scheme were proposed.The proposed algorithm made two-hop nodes be able to retrieve access control in-formation of user’s in time through diffusing the information periodically.The scheme based on THC algorithm,the se-curity mechanisms of Merkle hash tree and one way chain,as well as distributed access control mode,its main contribu-tion was it supports randomly moving users for the first time.The analyses and experiments have shown that the pro-posed scheme can be applied to both mobile and stationary user and have several advantages over the current access con-trol methods of low cost in computation,communication and storage,and resistance to node capture,query replay and DoS attacks.…”
    Get full text
    Article
  2. 1762

    Detection of Sentence Boundaries in Polish Based on Acoustic Cues by Magdalena IGRAS, Bartosz ZIÓŁKO

    Published 2016-01-01
    “…In this article the authors investigated and presented the experiments on the sentence boundaries annotation from Polish speech using acoustic cues as a source of information. The main result of the investigation is an algorithm for detection of the syntactic boundaries appearing in the places of punctuation marks. …”
    Get full text
    Article
  3. 1763

    Generative Target Tracking Method with Improved Generative Adversarial Network by Yongping Yang, Hongshun Chen

    Published 2023-01-01
    “…In this paper, we proposed a target tracking algorithm based on the conditional adversarial generative twin networks, using the improved you only look once multitarget association algorithm to classify and detect the position of the target to be detected in the current frame, constructing a feature extraction model using generative adversarial networks (GANs) to learn the main features and subtle features of the target, and then using GANs to generate the motion trajectories of multiple targets, finally fuzing the motion and appearance information of the target to obtain the optimal match. …”
    Get full text
    Article
  4. 1764

    Singular wavelets on a finite interval by V. M. Romanchak

    Published 2018-12-01
    “…The method includes a numerical algorithm based on the summation of a recurrent sequence of functions. …”
    Get full text
    Article
  5. 1765

    State regulation of the market of collective investments by Y. N. Radzievskaya

    Published 2020-01-01
    “…The essence, algorithm, main goals and tasks of state regulation of the market of collective investments in the Russian Federation at the present stage are specified. …”
    Get full text
    Article
  6. 1766

    Security-Constrained Multi-Stage Robust Dynamic Economic Dispatch with Bulk Storage by Li Dai, Renshi Ye, Dahai You, Xianggen Yin

    Published 2025-02-01
    “…Compared to the traditional SDDP algorithm and RDDP algorithm, the proposed RA-RDDP algorithm uses the inner relaxed approximation and outer approximation methods to approximate the upper and lower bounds of the future cost-to-go function, which overcomes the convergence issue of the traditional SDDP algorithm and solution efficiency of the RDDP algorithm. …”
    Get full text
    Article
  7. 1767

    Retracted: Study on Modeling Method of Forest Tree Image Recognition Based on CCD and Theodolite by Yeqiong Shi, Sainan Wang, Shuna Zhou, M. M. Kamruzzaman

    Published 2020-01-01
    “…The image processing algorithm is designed for the image processing module, and the flow chart of the image processing algorithm is given. …”
    Get full text
    Article
  8. 1768

    Parameter identification of unmanned surface vehicle MMG model based on an improved extended Kalman filter by Pengbo SUN, Zaopeng DONG, Wei LIU, Jinliang SHENG, Zhihao LI

    Published 2025-02-01
    “…ObjectivesTo construct an accurate MMG (mathematical model group) model for a water-jet propulsion unmanned surface vehicle, the traditional extended Kalman filter algorithm and improved extended Kalman filter algorithm are combined with the real-world boat data for parameter identification. …”
    Get full text
    Article
  9. 1769

    Analysis of complications after living-related kidney transplantation: a single-center experience by F. A. Khadjibaev, V. Kh. Sharipova, P. K. Sultanov

    Published 2021-03-01
    “…The original authors' algorithm developed for the diagnosis and treatment of complications after kidney transplantation covers all postoperative complications that lead to renal transplant dysfunction. …”
    Get full text
    Article
  10. 1770
  11. 1771

    Correlation of Tracks from Different Radars in Information Processing by Attraction Method by U. A. Aparovich, A. V. Shevchenko

    Published 2019-06-01
    “…One of the main problems in the processing of tracks from different radars is the correct correlation of tracks (especially groups of tracks). …”
    Get full text
    Article
  12. 1772

    Numerical Simulation of Wind-Induced Vibration Response Characteristics of High-Rise Buildings with Podiums by Guangbiao Jiang, Zeyan Chen, Hongxi Qin, Linlei Dong, Ao Tang

    Published 2025-04-01
    “…This article proposes a process algorithm based on the AR (autoregression) method to solve the time history of fluctuating wind speed and determine fluctuating wind load. …”
    Get full text
    Article
  13. 1773

    Rolling Force Prediction of Hot Rolling Based on GA-MELM by Jingyi Liu, Xinxin Liu, Ba Tuan Le

    Published 2019-01-01
    “…In the hot continuous rolling process, the main factor affecting the actual thickness of strip is the rolling force. …”
    Get full text
    Article
  14. 1774

    Parallel Tracking and Mapping for Controlling VTOL Airframe by Michal Jama, Dale Schinstock

    Published 2011-01-01
    “…Proposed modifications provide the position measurements necessary for the navigation solution on a UAV. The main contributions of this work include: (1) extension of the map building algorithm to enable it to be used realistically while controlling a UAV and simultaneously building the map; (2) improved performance of the SLAM algorithm for lower camera frame rates; and (3) the first known demonstration of a monocular SLAM algorithm successfully controlling a UAV while simultaneously building the map. …”
    Get full text
    Article
  15. 1775

    Method for Changepoint Detection With Sample Size Accumulation During Radio Equipment Operation by Solomentsev Oleksandr, Zaliskyi Maksym, Herasymenko Tetyana, Petrova Yuliia

    Published 2020-01-01
    “…The main element for monitoring is technical condition of radio equipment. …”
    Get full text
    Article
  16. 1776

    A Novel Method for Target Navigation and Mapping Based on Laser Ranging and MEMS/GPS Navigation by Jianhua Cheng, Rene Landry, Daidai Chen, Dongxue Guan

    Published 2014-01-01
    “…The detailed error analysis shows that attitude error of MEMS/GPS is the main error source which dominated the accuracy of the algorithm. …”
    Get full text
    Article
  17. 1777

    ECCT: An Efficient-Cooperative ADHOC MAC for Cluster-Based TDMA System in VANETs by VanDung Nguyen, S. M. Ahsan Kazmi, Choong Seon Hong

    Published 2015-08-01
    “…In addition, they also increase spatial reuse in VANETs and efficient control for the network topology. The main concern in the clustering algorithm is the cluster stability. …”
    Get full text
    Article
  18. 1778
  19. 1779

    On the study of one way to detect anomalous program execution by Yury V. Kosolapov, Tatjyana A. Pavlova

    Published 2024-06-01
    “…The paper examines an algorithm for detecting the execution of malicious code in the process of a protected program. …”
    Get full text
    Article
  20. 1780

    ASSESSMENT AND ANALYSIS OF DIGITAL TRANSFORMATION OF REGIONAL ECONOMIC SYSTEMS OF THE RUSSIAN FEDERATION: METHODOLOGICAL APPROACHES AND THEIR APPROBATION by M. R. Safiullin, A. A. Abdukaeva, L. A. Elshin

    Published 2020-02-01
    “…A distinctive aspect of the proposed algorithm is the orientation of the developed tools to study the five main directions of digitalization, defined by the Order of the Government of the Russian Federation of July 28, 2017 (No. 1632-r): regulatory regulation, personnel for the digital economy, formation of research competencies and technological foundations, information infrastructure, information security. …”
    Get full text
    Article