Showing 1,381 - 1,400 results of 5,420 for search 'may algorithm', query time: 0.13s Refine Results
  1. 1381

    Limitations of quantum approximate optimization in solving generic higher-order constraint-satisfaction problems by Thorge Müller, Ajainderpal Singh, Frank K. Wilhelm, Tim Bode

    Published 2025-05-01
    “…The ability of the quantum approximate optimization algorithm (QAOA) to deliver a quantum advantage on combinatorial optimization problems is still unclear. …”
    Get full text
    Article
  2. 1382
  3. 1383

    Ability of verbal autopsy data to detect deaths due to uncontrolled hyperglycaemia: testing existing methods and development and validation of a novel weighted score by Justine I Davies, David Beran, Miles D Witham, Alisha N Wade, Amelia Crampin, Sarah Blackstock, Graham D Ogle

    Published 2019-10-01
    “…There were 8699 relevant deaths in Agincourt and 1663 in Karonga.Results Of the Agincourt deaths, there were 77 study physician classified cases and 58 computer algorithm classified cases. Agreement between study physician classified cases and computer algorithm classified cases was poor (Cohen’s kappa 0.14). …”
    Get full text
    Article
  4. 1384

    Supervised Learning of Depth Estimation From Imperfect Rectified Stereo Laparoscopic Images of Liver Surface by Chongan Zhang, Ziyi Jin, Xiaoyue Liu, Yuelong Liang, Xiao Liang, Peng Wang, Xiujun Cai, Xuesong Ye

    Published 2025-01-01
    “…Yet, using deep learning algorithms for binocular depth estimation in laparoscopic images may encounter challenges like system-induced calibration errors and significant object depth variations in the laparoscopic field of view, which can impact rectification and depth estimation accuracy. …”
    Get full text
    Article
  5. 1385

    Artificial Seismic Source Field Research on the Impact of the Number and Layout of Stations on the Microseismic Location Error of Mines by Bao-xin Jia, Lin-li Zhou, Yi-shan Pan, Hao Chen

    Published 2019-01-01
    “…On the contrary, the number of stations can be reduced on the premise of the allowable error of the seismic source location, which may effectively reduce the monitoring cost.…”
    Get full text
    Article
  6. 1386

    Servo Control of Shunt-Active Power Filters Using Kalman Filter With DC-Link Reference by Vijay Kumar C. V., Srinivasa Rao Gundala, Sri Kavya G., Pavan K., Murali R., Meerimatha G.

    Published 2025-01-01
    “…LQG servo controllers may regulate current flow in a SAPF (shunt-active power filter) provided by a balanced or unbalanced supply voltage. …”
    Get full text
    Article
  7. 1387

    A student academic performance prediction model based on the interval belief rule base by Wenkai Zhou, Yunsong Li, Jiaxing Li, Tianhao Zhang, Xiping Duan, Ning Ma, Yuhe Wang

    Published 2025-08-01
    “…The parameters of the IBRB-C model are determined by combining the expert knowledge and the Kmeans++ algorithm. Subsequently, the P-CMA-ES algorithm is applied to optimize the initial model. …”
    Get full text
    Article
  8. 1388
  9. 1389

    Uso de Métodos Monte Carlo na Modelagem de uma Nuvem Radioativa Natural by Gutemberg Luiz Sales Claudino, José Wilson Vieira, Viriato Leal Neto, Fernando Roberto Andrade Lima, Alisson Fernando Silva, Joana Caroline Lopes Soares

    Published 2015-05-01
    “…At these locations, the radiation may come from the ground, the walls, and the environment in the form of gases. …”
    Get full text
    Article
  10. 1390

    Optimal integrated location and dispatching decisions for feeder bus route design problem by Bo Sun, Ming Wei, Chunfeng Yang

    Published 2024-12-01
    “…However, the calculation time is greatly reduced, thus proving the effectiveness of the proposed algorithm. …”
    Get full text
    Article
  11. 1391

    Spatial Estimation of Trophic State for Reservoir Using Ground Monitoring and Remote Sensing Data by Thong Nguyen Hoang, Van Tran Thi

    Published 2025-01-01
    “…The results of correlation analysis between ground monitoring values and spectral values from remote sensing algorithms showed that the two parameters, SD and TP, correlated best with the NIR/BLUE algorithm. …”
    Get full text
    Article
  12. 1392

    Using Dendritic Heat Maps to Simultaneously Display Genotype Divergence with Phenotype Divergence. by Matthew Kellom, Jason Raymond

    Published 2016-01-01
    “…These sequences were clustered in a fractional identity range of 0.75 to 1.0 using agglomerative minimum-, maximum-, and average-linkage algorithms, as well as a divisive centroid-based algorithm. …”
    Get full text
    Article
  13. 1393

    Correlating Patient Symptoms and CT Morphology in AI-Detected Incidental Pulmonary Embolisms by Selim Abed, Lucas Brandstetter, Klaus Hergan

    Published 2025-06-01
    “…<b>Background/Objectives</b>: Incidental pulmonary embolisms (IPEs) may be asymptomatic and radiologists may discover them for unrelated reasons, and they can thereby go underdiagnosed and undertreated. …”
    Get full text
    Article
  14. 1394

    Extracting Target Detection Knowledge Based on Spatiotemporal Information in Wireless Sensor Networks by Tian Wang, Zhen Peng, Cheng Wang, Yiqiao Cai, Yonghong Chen, Hui Tian, Junbin Liang, Bineng Zhong

    Published 2016-02-01
    “…This algorithm does not need any artificial threshold compared with traditional algorithms. …”
    Get full text
    Article
  15. 1395

    Vegetation growth monitoring based on ground-based visible light images from different views by Yanli Chen, Lu Huang, Cheng Chen, Ying Xie

    Published 2025-02-01
    “…The results showed that: (1) machine learning algorithm was suitable for green vegetation segmentation of multi-view images. …”
    Get full text
    Article
  16. 1396

    IQGO: Iterative Quantum Gate Optimiser for Quantum Data Embedding by Tautvydas Lisas, Ruairi de Frein

    Published 2024-01-01
    “…Using small tabular datasets, we benchmark our approach against contemporary state-of-the-art classical algorithms. These promising results suggest that quantum algorithms may perform well at data classification problems. …”
    Get full text
    Article
  17. 1397

    Optimization of Arrangements of Heat-Storage Bricks in a Regenerative Combustion System by Tree Search by Tsai-Jung Chen, Ying-Ji Hong, Sheng-Chuan Chung, Chern-Shuh Wang

    Published 2025-07-01
    “…This simple tree search method/algorithm may effectively enhance the <i>thermal efficiency</i> of a regenerative combustion system.…”
    Get full text
    Article
  18. 1398

    Blockchain-based high transparent PKI authentication protocol by Liquan CHEN, Xiao LI, Zheyi YANG, Sijie QIAN

    Published 2022-08-01
    “…The public key infrastructure (PKI), as an significant component of the current Internet security infrastructure, guarantees the information transmission with the necessary authenticity, integrity, confidentiality and non-repudiation.However, the existing PKI also has shortcomings of excessive power of certification authority and difficulties in revoking and querying.Blockchain can be used to solve those problems by leveraging its advantages, such as decentralization, high transparency and flat structure.Furthermore, the ability and efficiency of the entire Internet to establish trust relationships may be improved.The transparent public key infrastructure (PKI) certification protocol based on the blockchain was proposed.The TS-PBFT algorithm was designed in the proposed protocol by adopting the threshold signature technology to the Practical Byzantine fault tolerance (PBFT) algorithm.The TS-PBFT algorithm reduced the communication overhead via reducing the communication complexity, strengthened the supervision via introducing external monitoring mechanism in the master node election of the view change protocol, and also improved the performance of the consensus mechanism via adding a batch processing mechanism.Moreover, a transparent blockchain-based PKI certification protocol was designed.The proposed protocol increased the security of certificate revocation and query, it also improved the efficiency of the certificate query by the introduction of counting bloom filters.Besides, the proposed protocol added audit function into the certificate lifecycle management.Accordingly, it can supervise the behavior of the certificate authority (CA), prompt it to improve security standards, and then achieve the purpose of limiting its authority.According to the security analysis and efficiency experiments, the proposed protocol was equipped with security properties, such as the resistance to spoofing certificate application attacks, and it achieved the best performance on TLS/SSL handshake time compared with existing PKI protocols.…”
    Get full text
    Article
  19. 1399

    A data-driven group retrosynthesis planning model inspired by neurosymbolic programming by Xuefeng Zhang, Haowei Lin, Muhan Zhang, Yuan Zhou, Jianzhu Ma

    Published 2025-01-01
    “…However, current methods often treat each molecule independently, missing the opportunity to utilize shared synthesis patterns and repeat pathways, which may contribute from known synthesis routes to newly emerging, similar molecules, a notable challenge with AI-generated small molecules. …”
    Get full text
    Article
  20. 1400

    Desperate Coverage Problem in Mission-Driven Camera Sensor Networks by Yi Hong, Junghyun Kim, Donghyun Kim, Deying Li, Alade O. Tokuta

    Published 2014-04-01
    “…In particular, we consider a desperate situation in which we may not have enough camera sensors to cover all of the targets of interest during the mission. …”
    Get full text
    Article