Showing 1,841 - 1,860 results of 5,420 for search 'may algorithm', query time: 0.12s Refine Results
  1. 1841

    Proposed Method for Tracking Moon Phases using the Co-Occurrence Matrix by Abeer Thanoon

    Published 2010-12-01
    “…The study Proposes a method to detect the appearance of moon phase in a video serial (AVI) . The proposed algorithm  of photographic and videoing treatment presents a method to trace the appearance of moon phases through the analysis of image texture using Co-Occurrence matrix after reading the video file followed by the representation of texture features in the form of histogram followed by the segmentation of image depending on the values of histogram to obtain the detection of the target , i.e. , the moon in order to trace the appearance of moon phases within a video serial and then know the area of the lighted part of the moon surface via sun rays through which the geometric shape of the lighted area of the moon along the video serial can be estimated in each stage . then the moon phase may be expected as it is a ratio of the estimated area of the geometric shape in relation to the total area of the circular disc of the full moon . the purposed method can be applied whenever a video film of the moon is available.…”
    Get full text
    Article
  2. 1842

    Network Reconfiguration with Orientation-Dependent Transit Times by Hari Nandan Nath, Urmila Pyakurel, Tanka Nath Dhamala

    Published 2021-01-01
    “…In the considered problems, the transit time on an arc may change when it is reversed, contrary to the problems considered in the existing literature. …”
    Get full text
    Article
  3. 1843

    Design and Control of Single-Phase Double-Stage PV-MPPT System by Emre Avcı

    Published 2024-10-01
    “…In the double-stage Photovoltaic-Maximum Power Point Tracking (PV-MPPT) systems, the performance of each stage and the MPPT algorithm may affect the system performance. This study gives the design and control of a single-phase double-stage PV-MPPT system with a cascade controller. …”
    Get full text
    Article
  4. 1844

    Multievent Correlation with Neutron Volume Detectors by Noah Nachtigall, Andreas Houben, Richard Dronskowski

    Published 2024-11-01
    “…This work takes advantage of these advances by implementing a novel data preprocessing algorithm, exemplified for the first time with data acquired during the operation of a singular mounting unit of the POWTEX detector placed at the POWGEN instrument (SNS, ORNL, Oak Ridge, TN, USA). …”
    Get full text
    Article
  5. 1845

    Modeling of Distorted Degradation Data Based on Oil Analysis by Yue Chen, Jian Shi

    Published 2025-06-01
    “…However, interference factors (e.g., oil top-ups) may distort degradation observations, causing the observed data to deviate from the actual physical degradation curve that engineers rely on. …”
    Get full text
    Article
  6. 1846

    Stock Index Prices Prediction via Temporal Pattern Attention and Long-Short-Term Memory by Xiaolu Wei, Binbin Lei, Hongbing Ouyang, Qiufeng Wu

    Published 2020-01-01
    “…The results show that stock index prices prediction through the TPA-LSTM algorithm could achieve better prediction performance over traditional deep neural networks, such as recurrent neural network (RNN), convolutional neural network (CNN), and long and short-term time series network (LSTNet).…”
    Get full text
    Article
  7. 1847

    Influence of Absorbing Material Distribution on Double Slope Sound Decay in L-Shaped Room by Mirosław MEISSNER

    Published 2008-12-01
    “…A space distribution of eigenfunctions was computed using the forced oscillator method with a finite difference algorithm. Numerical results have demonstrated that an introduction of high absorbent material on selected room walls may cause an intense double slope effect. …”
    Get full text
    Article
  8. 1848

    ON FPGA BASED ACCELERATION OF IMAGE PROCESSING IN MOBILE ROBOTICS by Petr Cížek, Jan Faigl

    Published 2015-12-01
    “…The results indicate that even a computationally efficient FAST algorithm can benefit from a parallel (low–cost) FPGA–based implementation that has a competitive processing time but more importantly it is a more power efficient.…”
    Get full text
    Article
  9. 1849

    On the Designing of Model Checkers for Real-Time Distributed Systems by D. Yu. Volkanov, V. A. Zakharov, D. A. Zorin, I. V. Konnov, V. V. Podymov

    Published 2015-03-01
    “…To verify real-time properties of UML statecharts one may apply a UPPAAL, toolbox for model checking of real-time systems. …”
    Get full text
    Article
  10. 1850

    The complexity of learning (pseudo)random dynamics of black holes and other chaotic systems by Lisa Yang, Netta Engelhardt

    Published 2025-03-01
    “…We use the common simplification of modeling black holes and more generally chaotic systems via (pseudo)random dynamics. The quantum algorithms that we consider are completely general, and their attempted guess for the time evolution of black holes is likewise unconstrained: it need not be a linear operator, and may be as general as an arbitrary (e.g. decohering) quantum channel.…”
    Get full text
    Article
  11. 1851

    Drought Prediction Model of Pearl River Basin Based on SST and Machine Learning by FENG Xin, LIU Yanju, TONG Hongfu, QIAN Shuni

    Published 2024-05-01
    “…Combining with the random forest algorithm, this paper constructs a new meteorological drought forecasting model through regression analysis to screen global SST areas of forecasting significance and takes the Pearl River Basin as an example for application tests. …”
    Get full text
    Article
  12. 1852

    A collocation procedure for the numerical treatment of FitzHugh–Nagumo equation using a kind of Chebyshev polynomials by Waleed Mohamed Abd-Elhameed, Omar Mazen Alqubori, Ahmed Gamal Atta

    Published 2025-01-01
    “…The suggested approximate solutions are spectral and may be achieved using the standard collocation technique. …”
    Get full text
    Article
  13. 1853

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article
  14. 1854

    Unveiling connectivity patterns of railway timetables through complex network theory and Infomap clustering. by Fabio Lamanna, Michele Prisma, Giorgio Medeossi

    Published 2025-01-01
    “…This study introduces a novel framework for analysing railway timetable connectivity through complex network theory and the Infomap clustering algorithm. By transforming timetable data into network representations, we systematically assess the connectivity and efficiency of the Norwegian railway system for the 2024 and projected 2033 scenarios. …”
    Get full text
    Article
  15. 1855

    Mitigation of Corruption by Implementing e-Government Using Soft Computing by Shareef M. Shareef

    Published 2022-01-01
    “…The findings revealed that the model is adaptable and may be used in e-government performance applications for government authorities and experts.…”
    Get full text
    Article
  16. 1856

    Automated Detection of Working Area of Peripheral Blood Smears Using Mathematical Morphology by Jesús Angulo, Georges Flandrin

    Published 2003-01-01
    “…The paper presents a technique to automatically detect the working area of peripheral blood smears stained with May‐Grünwuald Giemsa. The optimal area is defined as the well spread part of the smear. …”
    Get full text
    Article
  17. 1857

    Optimal entanglement generation in optomechanical systems via Krotov control of covariance matrix dynamics by Pengju Chen, Da-Wei Luo, Ting Yu

    Published 2025-02-01
    “…It has been shown that the control may still be achieved when imposing spectral constraints on the external field to restrict it to low-frequency components. …”
    Get full text
    Article
  18. 1858

    Interference alignment based secure transmission scheme in multi-user interference networks by Lin HU, Jiabing FAN, Hong WEN, Jie TANG, Qianbin CHEN

    Published 2023-06-01
    “…Faced with the requirement of information security in internet of things, a scenario of multi-user interference networks with multiple eavesdroppers was considered, and an interference alignment (IA) scheme based physical layer secure transmission was proposed.Traditional IA security algorithm may result in secret signal cancellation.To overcome this threat, a modified alternating minimization (AM) method was proposed.The multi-user interference was eliminated by alternatively optimizing transceiver matrices, and artificial noise (AN) aided max-eigenmode beamforming was employed for secure transmission.To obtain a more accurate analysis of IA feasibility, the IA equation was divided into independent subsets and their combinations.By analyzing each case, a much tighter necessary condition for IA feasibility was established.Finally, the power allocation ratio between the secret signal and the AN signal was optimized to maximize the secrecy outage probability (SOP) constrained secrecy rate.Numerical results confirm that both the quality and security of the secret signal have been enhanced.Therefore, the proposed scheme is more suitable and reliable for security applications in interference networks.…”
    Get full text
    Article
  19. 1859

    Composing problem solvers for simulation experimentation: a case study on steady state estimation. by Stefan Leye, Roland Ewald, Adelinde M Uhrmacher

    Published 2014-01-01
    “…Experimenters, therefore, must choose from the available options, even though they may not be aware of the consequences. To support those users, we propose a general scheme to aggregate such algorithms to so-called synthetic problem solvers, which exploit algorithm differences to improve overall performance. …”
    Get full text
    Article
  20. 1860

    Cystinosis symposium: a rare disease model for comprehensive care by Ashley M. Gefen, Frederick J. Kaskel, Frederick J. Kaskel, Joshua J. Zaritsky

    Published 2025-07-01
    “…The time to provide a forum for collaboration in cystinosis research underscored the recent Cystinosis Symposium: A Rare Disease Model for Comprehensive Care held at the New York Academy of Medicine, on 31 May 2024, an event sponsored by the Cystinosis Research Network and numerous corporate entities (Amgen and others). …”
    Get full text
    Article