-
1841
Proposed Method for Tracking Moon Phases using the Co-Occurrence Matrix
Published 2010-12-01“…The study Proposes a method to detect the appearance of moon phase in a video serial (AVI) . The proposed algorithm of photographic and videoing treatment presents a method to trace the appearance of moon phases through the analysis of image texture using Co-Occurrence matrix after reading the video file followed by the representation of texture features in the form of histogram followed by the segmentation of image depending on the values of histogram to obtain the detection of the target , i.e. , the moon in order to trace the appearance of moon phases within a video serial and then know the area of the lighted part of the moon surface via sun rays through which the geometric shape of the lighted area of the moon along the video serial can be estimated in each stage . then the moon phase may be expected as it is a ratio of the estimated area of the geometric shape in relation to the total area of the circular disc of the full moon . the purposed method can be applied whenever a video film of the moon is available.…”
Get full text
Article -
1842
Network Reconfiguration with Orientation-Dependent Transit Times
Published 2021-01-01“…In the considered problems, the transit time on an arc may change when it is reversed, contrary to the problems considered in the existing literature. …”
Get full text
Article -
1843
Design and Control of Single-Phase Double-Stage PV-MPPT System
Published 2024-10-01“…In the double-stage Photovoltaic-Maximum Power Point Tracking (PV-MPPT) systems, the performance of each stage and the MPPT algorithm may affect the system performance. This study gives the design and control of a single-phase double-stage PV-MPPT system with a cascade controller. …”
Get full text
Article -
1844
Multievent Correlation with Neutron Volume Detectors
Published 2024-11-01“…This work takes advantage of these advances by implementing a novel data preprocessing algorithm, exemplified for the first time with data acquired during the operation of a singular mounting unit of the POWTEX detector placed at the POWGEN instrument (SNS, ORNL, Oak Ridge, TN, USA). …”
Get full text
Article -
1845
Modeling of Distorted Degradation Data Based on Oil Analysis
Published 2025-06-01“…However, interference factors (e.g., oil top-ups) may distort degradation observations, causing the observed data to deviate from the actual physical degradation curve that engineers rely on. …”
Get full text
Article -
1846
Stock Index Prices Prediction via Temporal Pattern Attention and Long-Short-Term Memory
Published 2020-01-01“…The results show that stock index prices prediction through the TPA-LSTM algorithm could achieve better prediction performance over traditional deep neural networks, such as recurrent neural network (RNN), convolutional neural network (CNN), and long and short-term time series network (LSTNet).…”
Get full text
Article -
1847
Influence of Absorbing Material Distribution on Double Slope Sound Decay in L-Shaped Room
Published 2008-12-01“…A space distribution of eigenfunctions was computed using the forced oscillator method with a finite difference algorithm. Numerical results have demonstrated that an introduction of high absorbent material on selected room walls may cause an intense double slope effect. …”
Get full text
Article -
1848
ON FPGA BASED ACCELERATION OF IMAGE PROCESSING IN MOBILE ROBOTICS
Published 2015-12-01“…The results indicate that even a computationally efficient FAST algorithm can benefit from a parallel (low–cost) FPGA–based implementation that has a competitive processing time but more importantly it is a more power efficient.…”
Get full text
Article -
1849
On the Designing of Model Checkers for Real-Time Distributed Systems
Published 2015-03-01“…To verify real-time properties of UML statecharts one may apply a UPPAAL, toolbox for model checking of real-time systems. …”
Get full text
Article -
1850
The complexity of learning (pseudo)random dynamics of black holes and other chaotic systems
Published 2025-03-01“…We use the common simplification of modeling black holes and more generally chaotic systems via (pseudo)random dynamics. The quantum algorithms that we consider are completely general, and their attempted guess for the time evolution of black holes is likewise unconstrained: it need not be a linear operator, and may be as general as an arbitrary (e.g. decohering) quantum channel.…”
Get full text
Article -
1851
Drought Prediction Model of Pearl River Basin Based on SST and Machine Learning
Published 2024-05-01“…Combining with the random forest algorithm, this paper constructs a new meteorological drought forecasting model through regression analysis to screen global SST areas of forecasting significance and takes the Pearl River Basin as an example for application tests. …”
Get full text
Article -
1852
A collocation procedure for the numerical treatment of FitzHugh–Nagumo equation using a kind of Chebyshev polynomials
Published 2025-01-01“…The suggested approximate solutions are spectral and may be achieved using the standard collocation technique. …”
Get full text
Article -
1853
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
1854
Unveiling connectivity patterns of railway timetables through complex network theory and Infomap clustering.
Published 2025-01-01“…This study introduces a novel framework for analysing railway timetable connectivity through complex network theory and the Infomap clustering algorithm. By transforming timetable data into network representations, we systematically assess the connectivity and efficiency of the Norwegian railway system for the 2024 and projected 2033 scenarios. …”
Get full text
Article -
1855
Mitigation of Corruption by Implementing e-Government Using Soft Computing
Published 2022-01-01“…The findings revealed that the model is adaptable and may be used in e-government performance applications for government authorities and experts.…”
Get full text
Article -
1856
Automated Detection of Working Area of Peripheral Blood Smears Using Mathematical Morphology
Published 2003-01-01“…The paper presents a technique to automatically detect the working area of peripheral blood smears stained with May‐Grünwuald Giemsa. The optimal area is defined as the well spread part of the smear. …”
Get full text
Article -
1857
Optimal entanglement generation in optomechanical systems via Krotov control of covariance matrix dynamics
Published 2025-02-01“…It has been shown that the control may still be achieved when imposing spectral constraints on the external field to restrict it to low-frequency components. …”
Get full text
Article -
1858
Interference alignment based secure transmission scheme in multi-user interference networks
Published 2023-06-01“…Faced with the requirement of information security in internet of things, a scenario of multi-user interference networks with multiple eavesdroppers was considered, and an interference alignment (IA) scheme based physical layer secure transmission was proposed.Traditional IA security algorithm may result in secret signal cancellation.To overcome this threat, a modified alternating minimization (AM) method was proposed.The multi-user interference was eliminated by alternatively optimizing transceiver matrices, and artificial noise (AN) aided max-eigenmode beamforming was employed for secure transmission.To obtain a more accurate analysis of IA feasibility, the IA equation was divided into independent subsets and their combinations.By analyzing each case, a much tighter necessary condition for IA feasibility was established.Finally, the power allocation ratio between the secret signal and the AN signal was optimized to maximize the secrecy outage probability (SOP) constrained secrecy rate.Numerical results confirm that both the quality and security of the secret signal have been enhanced.Therefore, the proposed scheme is more suitable and reliable for security applications in interference networks.…”
Get full text
Article -
1859
Composing problem solvers for simulation experimentation: a case study on steady state estimation.
Published 2014-01-01“…Experimenters, therefore, must choose from the available options, even though they may not be aware of the consequences. To support those users, we propose a general scheme to aggregate such algorithms to so-called synthetic problem solvers, which exploit algorithm differences to improve overall performance. …”
Get full text
Article -
1860
Cystinosis symposium: a rare disease model for comprehensive care
Published 2025-07-01“…The time to provide a forum for collaboration in cystinosis research underscored the recent Cystinosis Symposium: A Rare Disease Model for Comprehensive Care held at the New York Academy of Medicine, on 31 May 2024, an event sponsored by the Cystinosis Research Network and numerous corporate entities (Amgen and others). …”
Get full text
Article