Showing 2,061 - 2,080 results of 5,420 for search 'may algorithm', query time: 0.14s Refine Results
  1. 2061

    Application research of 3D virtual interactive technology in interactive teaching of arts and crafts by Mingqi Yao

    Published 2024-12-01
    “…For this reason, the research proposes an image denoising model based on convolutional neural network and wavelet transform, which adopts residual neural network structure and batch normalization algorithm, aiming at gradient explosion and gradient disappearance that may be caused by convolutional neural network, And the problem of low training efficiency has been optimized. …”
    Get full text
    Article
  2. 2062

    Assessing government grants: evidence from greenhouse tomato and pepper farmers in Kosovo by Blend FRANGU, Jennie SHEERIN POPP, Michael THOMSEN, Arben MUSLIU

    Published 2018-12-01
    “…Genetic matching with an evolutionary algorithm was applied to evaluate the impact of the Ministry of Agriculture, Forestry and Rural Development (MAFRD) grant programs to support greenhouse vegetable production in Kosovo. …”
    Get full text
    Article
  3. 2063

    On Optimal Antijamming Strategies in Sensor Networks by Yanmin Zhu, Yuan Jiang

    Published 2012-04-01
    “…A critical issue is that there may exist a number of possible strategy profiles of Nash equilibria. …”
    Get full text
    Article
  4. 2064

    Robust Adaptive Control for a Class of T-S Fuzzy Nonlinear Systems with Discontinuous Multiple Uncertainties and Abruptly Changing Actuator Faults by Xin Ning, Yao Zhang, Zheng Wang

    Published 2020-01-01
    “…Finally, a numerical example is provided to illustrate the effectiveness of the proposed control algorithm.…”
    Get full text
    Article
  5. 2065

    Consensus control of multiple electric springs considering non-critical load electricity fairness in islanded microgrid by Fagen Yin, Chun Wang

    Published 2025-07-01
    “…The electric spring (ES) is an effective means to mitigate these fluctuations. However, a single ES may not be sufficient to ensure voltage stability for each node or support system frequency regulation. …”
    Get full text
    Article
  6. 2066

    On improvements of multi-objective branch and bound by Julius Bauß, Sophie N. Parragh, Michael Stiglmayr

    Published 2024-01-01
    “…Since bounding and pruning is considerably weaker in multiple objectives, many branches have to be (partially) searched and may not be pruned directly. The adaptive use of objective space information can guide the search in promising directions to determine a good approximation of the Pareto front already in early stages of the algorithm. …”
    Get full text
    Article
  7. 2067

    Design of Privacy Preservation Model for Data Stream Using Condensation Based Anonymization by Latha P, Thangaraj M

    Published 2025-08-01
    “… In modern world, continuous data flows that may be analyzed in real-time and are created from multiple sources are referred to as data streams. …”
    Get full text
    Article
  8. 2068
  9. 2069

    Prediction of the spatial distribution of vine weevil under climate change using multiple variable selection methods by Ga-Young Kim, Wang-Hee Lee

    Published 2025-03-01
    “…Climate change could shift its habitat northward, particularly in areas where it currently occurs, and human activities may help spread the pest to new regions. This study offers a potential distribution map to aid in monitoring and controlling the vine weevil, emphasizing the importance of variable selection methods in predictive modeling.…”
    Get full text
    Article
  10. 2070

    Application of Fuzzy Optimization to the Orienteering Problem by Madhushi Verma, K. K. Shukla

    Published 2015-01-01
    “…To efficiently solve large instances of FOP, we also present a parallel algorithm on CREW PRAM model.…”
    Get full text
    Article
  11. 2071

    Unveiling the Hidden Menace: A Topic Modeling Analysis of Hijacked Medical Journals by Mehdi Dadkhah, Mihály Hegedűs, Prema Nedungadi, Raghu Raman, Lóránt Dénes Dávid

    Published 2024-07-01
    “…Conclusion: The academic world is faced with the third-generation of hijacked journals, and their detection may be more complex than common ones. The usage of artificial intelligence (AI) can be a powerful tool to deal with the phenomenon.…”
    Get full text
    Article
  12. 2072

    The poetry of senses: exploring semantic mediation in timbre-aroma correspondences by Asterios Zacharakis

    Published 2025-02-01
    “…This study expands on previous work regarding timbre-aroma correspondences by examining the semantic mediation hypothesis, according to which cross-modal correspondences may be partly explained by the existence of common semantic qualities. …”
    Get full text
    Article
  13. 2073

    Designing natural gesture interaction for archaeological data in immersive environments by Niccolò Albertini, Andrea Brogni, Riccardo Olivito, Emanuele Taccola, Baptiste Caramiaux, Marco Gillies

    Published 2017-05-01
    “…Datasheets  and pictures,  stratigraphic  data  and  3D  models,  time and  space  mixed  together: these are  only a few  of  the  categories  a researcher has to deal with. New technologies may be able to help in this process and trying to solve research related problems needs innovative solutions. …”
    Get full text
    Article
  14. 2074

    Tolerance Analysis of Antenna Array Pattern and Array Synthesis in the Presence of Excitation Errors by Ying Zhang, DanNi Zhao, Qiong Wang, ZhengBin Long, Xiaofeng Shen

    Published 2017-01-01
    “…The nonprobabilistic interval analysis algorithm is used for tolerance analysis of the nonideal uniform linear array in this work. …”
    Get full text
    Article
  15. 2075

    System to Assist the Driver During a Single Lane Change Maneuver, in the Conditions of Danger Arising from a Change in the Condition of the Road Surface by Zbigniew Lozia, Marek Guzek

    Published 2024-12-01
    “…An original control algorithm has been built. It is the driver assistance system with a double PID controller of the steering wheel angle. …”
    Get full text
    Article
  16. 2076

    The Minimum Spectral Radius of an Edge-Removed Network: A Hypercube Perspective by Yingbo Wu, Tianrui Zhang, Shan Chen, Tianhui Wang

    Published 2017-01-01
    “…The edges in each candidate are evenly distributed over the network, which may be a common feature of all symmetric networks and hence is instructive in designing effective heuristic algorithms for the SRMP.…”
    Get full text
    Article
  17. 2077

    CP-ABE based users collaborative privacy protection scheme for continuous query by Lei ZHANG, Chun-guang MA, Song-tao YANG, Zeng-peng LI

    Published 2017-09-01
    “…In location-based services (LBS),as the untrusted LBS server can be seen as an adversary,and it can utilize the attribute as background knowledge to correlate the real location of the user in the set of uncertain locations.Then the adversary can gain the location privacy when the user enjoys the snapshot and continuous query through the correlation inference attack.In order to cope with this attack,the main scheme in privacy protection is to generalize the attribute and achieve attribute anonymity.However,algorithms of this type usually assumes a trusted third party (TTP) which provides the service of similarity attribute finding and comparing,and it is unpractical in the real environment,as the TTP may become the point of attack or the bottleneck of service and it cannot be considered as the trusted one all the time.Thus,to cope with the correlation inference attack as well as the semi-trusted third party,ciphertext policy attribute based encryption (CP-ABE) and users collaboration based attribute anonymous scheme was proposed.In this scheme,the user coupled achieve location and attribute anonymity.Furthermore,this scheme could also provide security for attacks from the semi-trusted third party as well as semi-trusted collaborative users.At last,security analysis and the experiment results further verify the effectiveness of privacy protection and the efficiency of algorithm execution.…”
    Get full text
    Article
  18. 2078

    Motion Transmissibility for Load Identification Based on Optimum Sensor Placement by Hana’a M. Alqam, Anoop K. Dhingra

    Published 2019-01-01
    “…In such situations, it may be possible to estimate the imposed loads through a measurement of the system output response. …”
    Get full text
    Article
  19. 2079

    Integrating Order Splitting and Acceptance with Batch Delivery in Parallel Machine Scheduling by Hanxing Cui, Qilan Zhao, Huanhuan Wang, Yuliang Guo, Junjie Guo

    Published 2024-09-01
    “…By comprehensively considering these aspects, a multi-machine production model is constructed that incorporates transportation batch sequences and uses heuristic algorithms to solve the problem. Finally, designed case examples validate the effectiveness of the model and algorithm.…”
    Get full text
    Article
  20. 2080

    On PTV definition for glioblastoma based on fiber tracking of diffusion tensor imaging data. by Barbara Witulla, Nicole Goerig, Florian Putz, Benjamin Frey, Tobias Engelhorn, Arnd Dörfler, Michael Uder, Rainer Fietkau, Christoph Bert, Frederik Bernd Laun

    Published 2020-01-01
    “…It depended strongly on the used tracking algorithm and the used tracking parameters whether a connection was observed. …”
    Get full text
    Article