Showing 1,881 - 1,900 results of 6,037 for search 'main algorithm', query time: 0.14s Refine Results
  1. 1881

    Cardiogenic syncopal states in children and adolescents by S.Yu. Tereshchenko

    Published 2011-03-01
    “…Clinical symptoms of vasovagal attack and common diagnostic algorithm of episode of syncope in children and adolescents are briefly described. …”
    Get full text
    Article
  2. 1882

    SYNTHESIS OF THE THERMALLY COUPLED DISTILLATION SEQUENCES by E. А. Anokhina, А. V. Timoshenko

    Published 2017-12-01
    “…The article considers the main approaches to the synthesis of distillation schemes, including systems with STMP: 1) a method based on the construction of a "superstructure"; 2) a method based on the concept of thermodynamically equivalent configurations; 3) an evolutionary algorithm; 4) a method based on the transformation of distillation scheme graphs. …”
    Get full text
    Article
  3. 1883

    Cost-Efficient Distributed Learning via Combinatorial Multi-Armed Bandits by Maximilian Egger, Rawad Bitar, Antonia Wachter-Zeh, Deniz Gündüz

    Published 2025-05-01
    “…By assigning tasks to all workers and waiting only for the <i>k</i> fastest ones, the main node can trade off the algorithm’s error with its runtime by gradually increasing <i>k</i> as the algorithm evolves. …”
    Get full text
    Article
  4. 1884
  5. 1885

    Research on False Alarm Rate Reducing Strategies for Subway Train Fire Alarm System by ZHANG Qian, XU Shaohong, XUE Hongquan

    Published 2025-05-01
    “…[Result & Conclusion] Environmental factors, detector type selection, detector detection principle, and software algorithm are identified as main causes for false fire alarms. …”
    Get full text
    Article
  6. 1886

    Improving the accuracy of thin metal film research using the eddy current method by Shmykov Danil, Malikov Vladimir, Katasonov Alexander, Voinash Sergey, Vornacheva Irina, Larin Oleg, Tansura Anton

    Published 2025-01-01
    “…The structural diagram is given and the algorithm of operation of the hardware and software complex is described, the characteristics of the main components of the hardware of the hardware and software complex are given. …”
    Get full text
    Article
  7. 1887

    An Evolutionary Formulation of the Crossing Number Problem by Che Sheng Gan, Wee Chiat Alan Tan, Voon Chet Koo, Kwang Hwai Mak

    Published 2009-01-01
    “…A graph drawing algorithm is presented which results in complete graphs having minimum crossings equal to that of Guy's conjecture. …”
    Get full text
    Article
  8. 1888

    Effective Approach to Shock Absorption Performance Evaluation of Mechanical Component Springs Using the Single Valued Trapezoidal Neutrosophic Numbers for Structural Stability by Hanwei Qu, Caiyun Duan, Jiancheng Yu

    Published 2025-04-01
    “…The suggested hybrid model's application procedures are illustrated by an algorithm that is created. This algorithm is used as the basis for real-world research. …”
    Get full text
    Article
  9. 1889

    Image Encryption Technology Based on Fractional Two-Dimensional Triangle Function Combination Discrete Chaotic Map Coupled with Menezes-Vanstone Elliptic Curve Cryptosystem by Zeyu Liu, Tiecheng Xia, Jinbo Wang

    Published 2018-01-01
    “…Finally, the image encryption algorithm is analysed in four main aspects that indicate the proposed algorithm is better than others.…”
    Get full text
    Article
  10. 1890
  11. 1891

    An Analysis Method of Principal Components of Power Quality Based on Fast S-transform by MAN Weishi, ZHANG Zhiyu, XI Lei

    Published 2013-01-01
    “…Then, PCA was applied to descend dimension and extract the main feature components and the projection matrix was obtained accordingly. …”
    Get full text
    Article
  12. 1892

    The role of interaction between social organizations and specialized medical centers in the treatment of children with inborn cleft lip and palate by A. A. Mamedov, O. V. Nelyubina, M. A. Abiev

    Published 2011-03-01
    “…We have 35 years of experience working with children with congenital cleft lip and palate, evidence-based approach to strategy and tactics of treatment of such children. The main purpose of the proposed algorithm for treatment of children with congenital cleft lip and palate is an early rehabilitation with early restoration of the anatomy and function of maxillofacial organs.…”
    Get full text
    Article
  13. 1893
  14. 1894

    A Semisupervised Feature Selection with Support Vector Machine by Kun Dai, Hong-Yi Yu, Qing Li

    Published 2013-01-01
    “…Feature selection has proved to be a beneficial tool in learning problems with the main advantages of interpretation and generalization. …”
    Get full text
    Article
  15. 1895

    Coordination and Control of Hierarchically Organized Interacting Agents by Sunandita Patra, Paolo Traverso, Malik Ghallab, Dana Nau

    Published 2021-04-01
    “…Our main contribution regards the formal definition, the representation, the theorems about its properties (i.e., the parallel and hierarchical composition are distributive operations), and the synthesis algorithm, proved to be complete and correct.…”
    Get full text
    Article
  16. 1896

    Minimal coverage of generalized typed inclusion dependencies in databases by Sergey V. Zykin

    Published 2024-03-01
    “…The paper discusses the theory and algorithms necessary to construct a minimal covering of generalized typed inclusion dependencies. …”
    Get full text
    Article
  17. 1897

    Study of high-speed malicious Web page detection system based on two-step classifier by Zheng-qi WANG, Xiao-bing FENG, Chi ZHANG

    Published 2017-08-01
    “…In view of the increasing number of new Web pages and the increasing pressure of traditional detection methods,the naive Bayesian algorithm and the support vector machine algorithm were used to design and implement a malicious Web detection system with both efficiency and function,TSMWD ,two-step malicious Web page detection.The first step of detection system was mainly used to filter a large number of normal Web pages,which was characterized by high efficiency,speed,update iteration easy,real rate priority.After the former filter,due to the limited number of samples,the main pursuit of the second step was the detection rate.The experimental results show that the proposed scheme can improve the detection speed of the system under the condition that the overall detection accuracy is basically the same,and can accept more detection requests in certain time.…”
    Get full text
    Article
  18. 1898

    Big Data Analytics: A Tutorial of Some Clustering Techniques by Said Baadel

    Published 2021-09-01
    “…Data Clustering or unsupervised classification is one of the main research areas in Data Mining. Partitioning Clustering involves the partitioning of n objects into k clusters. …”
    Get full text
    Article
  19. 1899

    PROFESSOR VLADIMIR MIKHAILOVICH TAVROVSKY IS A DOCTOR AND SCIENTIST WHO WAS AHEAD OF TIME BY HALF A CENTURY by Аркадий Лейбович Ханин

    Published 2024-06-01
    “…At the same time, the main user – doctor received not only a clear algorithm of actions in a specific clinical situation, but the system showed the priorities of decision-making, the responsibility of each of the members of the management chain: from the attending physician (district doctor), to the chief physician and the head of health care of the city or region.…”
    Get full text
    Article
  20. 1900

    Adaptive differential current relay based on form/ripple factors for busbar current signals by R. A. Mahmoud

    Published 2025-08-01
    “…Moreover, the main protection function differentiates between internal and external faults with or without CT saturation. …”
    Get full text
    Article