Showing 1,341 - 1,360 results of 5,420 for search 'may algorithm', query time: 0.10s Refine Results
  1. 1341

    Phase Demodulation of Rotor Torsional Vibration Measurement under Time-Varying Speed by Moli Chen, Nan Zheng, Jun Zheng, Zhu Jin, Guihuo Luo

    Published 2022-01-01
    “…To verify the proposed DSLR algorithm, torsional vibration simulations and experiments are conducted under a time-varying rotation speed. …”
    Get full text
    Article
  2. 1342

    Discovering hierarchical process models: an approach based on events partitioning by Antonina K. Begicheva, Irina A. Lomazova, Roman A. Nesterov

    Published 2024-09-01
    “…However, a discovered process model may be too detailed, sophisticated, and difficult for experts to understand. …”
    Get full text
    Article
  3. 1343

    Comparison of Turkey’s Geographical Regions in terms of Stand-Alone PV System Design and Cost Parameters by Nevzat Onat

    Published 2017-01-01
    “…The averages of the centers for each region are taken as output. A calculation algorithm based on MsExcel has been established for these operations. …”
    Get full text
    Article
  4. 1344

    Decomposition-Based Multiobjective Evolutionary Optimization with Adaptive Multiple Gaussian Process Models by Xunfeng Wu, Shiwen Zhang, Zhe Gong, Junkai Ji, Qiuzhen Lin, Jianyong Chen

    Published 2020-01-01
    “…In recent years, a number of recombination operators have been proposed for multiobjective evolutionary algorithms (MOEAs). One kind of recombination operators is designed based on the Gaussian process model. …”
    Get full text
    Article
  5. 1345

    Harnessing Vehicle-to-Vehicle Communications for 3G Downloads on the Move by Yanmin Zhu, Qinghua Chen, Chao Chen

    Published 2014-11-01
    “…We have evaluated our algorithm with simulations with real vehicular traces and the results show that our algorithms reduce the 3G cost and achieve good performance of data downloads.…”
    Get full text
    Article
  6. 1346

    Tracking and Repairing Damaged Healthcare Databases Using the Matrix by Sanaa Kaddoura, Ramzi A. Haraty, Ahmed Zekri, Mehedi Masud

    Published 2015-11-01
    “…The results of this work prove that our algorithm performs better than the other algorithms in both the damage assessment and the recovery stages.…”
    Get full text
    Article
  7. 1347

    Optimal State Estimation in Underwater Vehicle Discrete-Continuous Measurements via Augmented Hybrid Kalman Filter by Vadim Kramar, Kirill Dementiev, Aleksey Kabanov

    Published 2025-05-01
    “…The paper focuses on the optimal state-estimation algorithm for discrete-continuous systems. The research aim is to create an effective strategy for combining data from continuous and discrete information sources to improve the state estimation accuracy and reliability of complex dynamic systems. …”
    Get full text
    Article
  8. 1348

    An Impulse-C Hardware Accelerator for Packet Classification Based on Fine/Coarse Grain Optimization by O. Ahmed, S. Areibi, R. Collier, G. Grewal

    Published 2013-01-01
    “…The Packet Classification with Incremental Update (PCIU) algorithm, Ahmed et al. (2010), is a novel and efficient packet classification algorithm with a unique incremental update capability that demonstrated excellent results and was shown to be scalable for many different tasks and clients. …”
    Get full text
    Article
  9. 1349

    SOFT CONTROL OF A NON-LINEAR ECONOMIC SYSTEM by I.V. Trundaev

    Published 2025-05-01
    “…Certain advantages of the proposed fuzzy control algorithm for a nonlinear model based on expert knowledge are highlighted, which can be useful in developing control systems of higher dimension, where the use of classical methods may not be sufficiently justified or appropriate. …”
    Article
  10. 1350

    Multiobjective Optimization for Topology and Coverage Control in Wireless Sensor Networks by Seyed Mahdi Jameii, Karim Faez, Mehdi Dehghan

    Published 2015-02-01
    “…Simulation results demonstrate that the proposed algorithm can improve the network lifetime and coverage while maintaining the network connectivity.…”
    Get full text
    Article
  11. 1351

    Circadian phase resetting via single and multiple control targets. by Neda Bagheri, Jörg Stelling, Francis J Doyle

    Published 2008-07-01
    “…In particular, maintaining proper circadian regulation may significantly decrease the chance of acquiring chronic illness.…”
    Get full text
    Article
  12. 1352

    Security control scheme for cloud data copy based on differential privacy model by Jun REN, Jin-bo XIONG, Zhi-qiang YAO

    Published 2017-05-01
    “…In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in constructing a hybrid cloud framework.Then file was encrypted for second times by using the privacy protection parameters of differential privacy as well as the key of the file computed by convergent encryption algorithm.After the file is uploaded,each file has only one copy in the server.Meanwhile,compared with the scheme that use setting threshold value to control the number of copies,the proposed scheme can resist against the side channel attack,related files attack,and the specific attack of encryption algorithm and save the network bandwidth and disk storage space.…”
    Get full text
    Article
  13. 1353

    Network Coding-Based Real-Time Retransmission Scheme in Wireless Sensor Networks by Chang Zhu, Yanqin Zhu, Lingzhi Li

    Published 2015-06-01
    “…In wireless sensor networks (WSNs), wireless links are unreliable and sensor nodes may be in sleep mode. Thus, many applications which require reliable broadcast cannot work properly if they lost some packets. …”
    Get full text
    Article
  14. 1354

    A Real-Time Image Encryption Method of Networked Inverted Pendulum Visual Servo Control System by Xue Li, Bing Liu, Changda Zhang

    Published 2020-01-01
    “…Generally, the inverted pendulum images are directly transmitted via the network, while these images are not secure because they may be attacked by the hacker. To solve the problem, a fast image encryption method by combining image scaling and improved self-diffusion image encryption (ISDIE) algorithm is firstly proposed, which is employed to encrypt the captured images after they are scaled. …”
    Get full text
    Article
  15. 1355

    Novel Hardware Implementation of the Cipher Message Authentication Code by H. E. Michail, G. Selimis, M. Galanis, D. Schinianakis, C. E. Goutis

    Published 2008-01-01
    “…The proposed security scheme incorporates an FIPS approved and secure block cipher algorithm and was standardized by NIST in May, 2005. …”
    Get full text
    Article
  16. 1356

    Big Data Analytics: A Tutorial of Some Clustering Techniques by Said Baadel

    Published 2021-09-01
    “…Other algorithms use overlapping techniques where an object may belong to one or more clusters. …”
    Get full text
    Article
  17. 1357

    RESTORATION OF ELEMENTS IN THE FACADE DECOR OF MONUMENTS IN ARCHITECTURE by Vladyslav Neshchadym

    Published 2023-05-01
    “…The restoration process may involve cleaning, repair, reconstruction, or replacement of the damaged elements. …”
    Get full text
    Article
  18. 1358

    An Alternative Fuel Refueling Station Location Model considering Detour Traffic Flows on a Highway Road System by Seong Wook Hwang, Sang Jin Kweon, Jose A. Ventura

    Published 2020-01-01
    “…To this end, we first propose an algorithm to generate alternative paths that may provide the multiple AF refueling stops between all origin/destination (OD) vertices. …”
    Get full text
    Article
  19. 1359

    Automated Syndesmotic Distance, Area, and Volume Measurements Using 3D Segmentations of Weightbearing Computed Tomography Scans by Samir Ghandour MD, Alireza Gholipour PhD, Daniel Guss MD, MBA, Gregory R. Waryasz MD, Lorena Bejarano-Pineda MD, John Y. Kwon MD, Christopher W. DiGiovanni MD, Soheil Ashkani-Esfahani MD

    Published 2024-12-01
    “…Category: Ankle; Sports Introduction/Purpose: Syndesmotic injuries may be associated with subsequent instability, even following operative fixation of etiologic fractures. …”
    Get full text
    Article
  20. 1360

    Structural knowledge-driven meta-learning for task offloading in vehicular networks with integrated communications, sensing and computing by Ruijin Sun, Yao Wen, Nan Cheng, Wei Wang, Rong Chai, Yilong Hui

    Published 2024-07-01
    “…To tackle this challenge, we propose a creative structural knowledge-driven meta-learning (SKDML) method, involving both the model-based AM algorithm and neural networks. Specifically, borrowing the iterative structure of the AM algorithm, also referred to as structural knowledge, the proposed SKDML adopts long short-term memory (LSTM) network-based meta-learning to learn an adaptive optimizer for updating variables in each sub-problem, instead of the handcrafted counterpart in the AM algorithm. …”
    Get full text
    Article