Showing 381 - 400 results of 7,635 for search 'mean algorithm', query time: 0.13s Refine Results
  1. 381

    Evaluation of geological engineering factors for productivity of deep CBM well after fracturing based on grey correlation method by KONG Xiangwei,XIE Xin,WANG Cunwu,SHI Xian

    Published 2023-08-01
    Subjects: “…|coal-bed methane|grey correlation method|fracturing effect|k-means clustering algorithm|optimization of fracturing parameters…”
    Get full text
    Article
  2. 382
  3. 383
  4. 384

    Comparison of Doubling the Size of Image Algorithms by S. E. Vaganov, S. I. Khashin

    Published 2016-08-01
    “…For each method of upscaling to twice optimal coefficients of kernel convolutions for different down-scale to twice algorithms were found. Various methods for reducing the image size by half were considered the mean value over 4 nearest points and the weighted value of 16 nearest points with optimal coefficients. …”
    Get full text
    Article
  5. 385

    Improved PESA algorithm based on comentropy by Kun WANG, Lin-lin WANG, Yan LIU, Yu-hua ZHANG, Meng WU

    Published 2013-11-01
    “…Aiming at the issue that the computational effort the complexity and the running time of PESA algorithm are increasing rapidly with the growth of the solutions set number, a comentropy-based PESA algorithm (C-PESA) by merg-ing the entropy value metric into PESA algorithm was proposed. …”
    Get full text
    Article
  6. 386

    PERFORMANCE PREDICTION OF ROADHEADERS USING SUPPORT VECTOR MACHINE (SVM), FIREFLY ALGORITHM (FA) AND BAT ALGORITHM (BA) by Arash Ebrahimabadi, Alireza Afradi

    Published 2025-01-01
    “…Additionally, this study employed Firefly Algorithm (FA), Bat Algorithm (BA) and Support Vector Machine (SVM), which were assessed using coefficient of determination (R²), root mean square error (RMSE), mean squared error (MSE) and mean absolute error (MAE).The obtained results for Firefly Algorithm (FA) are found to be as R2 = 0.9104, RMSE = 0.0658, MSE= 0.0043 and MAE= 0.0039, for Bat Algorithm (BA) are found to be as R2 = 0.9421, RMSE = 0.0528, MSE= 0.0027 and MAE= 0.0024, and for Support Vector Machine (SVM) are found to be as R2 = 0.8795, RMSE = 0.0762, MSE= 0.0058 and MAE= 0.0052, respectively. …”
    Get full text
    Article
  7. 387

    Fast blind detection of short-wave frequency hopping signal based on MeanShift by Zhengyu ZHU, Yu LIN, Zixuan WANG, Kexian GONG, Pengfei CHEN, Zhongyong WANG, Jing LIANG

    Published 2022-06-01
    “…In the complex short-wave channel environment, combined with time-frequency analysis technology, a fast blind detection algorithm of the connected domain labeled frequency hopping signals based on MeanShift algorithm was proposed to reduce the influence of various interference signals and noises on frequency hopping signals and realize blind detection of frequency hopping signals under low signal-to-noise ratio.Firstly, the channel environment gray-scale time-frequency map was filtered by the secondary gray-scale morphology to obtain the binary time-frequency map.Secondly, the maximum duration of the signal was calculated by the connected domain labeling algorithm.Then, the MeanShift algorithm was used to cluster the maximum duration of the signal.Finally, the clustering result was made a second judgment by combining with the adaptive double threshold.The simulation results show that the proposed algorithm can quickly separate various interference signals and sharp noise under low signal-to-noise ratio, and realize fast blind detection of frequency hopping signals without any prior information.It has high detection probability, strong anti-interference ability in short-wave channel environment, low computational complexity and high engineering practical value.…”
    Get full text
    Article
  8. 388

    Modified Bancroft Algorithm for Multilateration Systems by A. A. Monakov

    Published 2018-02-01
    “…The algorithm allows to obtain the location estimation by means of direct method and does not require significant computing costs. …”
    Get full text
    Article
  9. 389

    The Support Splitting Algorithm for Induced Codes by Yury V. Kosolapov, Aleksey N. Shigaev

    Published 2018-06-01
    “…This suggests a potentially high resistance of the McEliece-type cryptosystem on the code Flq ⊗ C. The algorithm for splitting the support for the code Flq ⊗ C is constructed and the efficiency of this algorithm is compared with the existing attack on the key of the McElice type cryptosystem based on the code Flq ⊗ C.…”
    Get full text
    Article
  10. 390

    Knowledge-based Algorithms for BDI-agents by Nikolay Vyacheslavovich Shilov, Natalia Olegovna Garanina

    Published 2020-12-01
    “…Multiagent algorithm is a knowledge-based distributed algorithm that solves some problems by means of cooperative work of agents. …”
    Get full text
    Article
  11. 391

    Technologies and Algorithms for Building the Augmented Reality by I. A. Blagoveshchenskiy, N. A. Demyankov

    Published 2013-04-01
    “…In order to analyze video stream and recognize known objects in it, algorithms of the Computer Vision are used. The authors give a short description and the main characteristics only of two of them: genetic algorithms and feature detection & description. …”
    Get full text
    Article
  12. 392

    Quantum algorithms for enhanced educational technologies by Basil Hanafi, Mohammad Ali, Devyaani Singh

    Published 2025-01-01
    “…Modern quantum algorithms like Grover’s Algorithm and Quantum Annealing support various functionalities like rapidity in processing as well as instantaneous flexibility towards customization of learning resources for the students and proper optimization of the learning trail. …”
    Get full text
    Article
  13. 393

    The Problem of Subjectivity in Algorithmic Creativity Organisation by Tetiana Sovhyra

    Published 2024-10-01
    “…Interpretation of meaningful content is a critical problem in relevant practices. The usage of algorithms in creating art products challenges traditional methods of artistic cultural creation, as the artist’s meaning and intentions are not always clear. …”
    Get full text
    Article
  14. 394

    Architecture and implementation of ulrb algorithm in R by Francisco Pascoal, Rodrigo Costa, Luís Torgo, Catarina Magalhães, Paula Branco

    Published 2025-12-01
    “…This is inappropriate because such thresholds are arbitrary and lack biological meaning. To solve this problem, we have proposed the utilization of unsupervised machine learning, through the ulrb (“Unsupervised Learning Definition of the Microbial Rare Biosphere”) algorithm, implemented as an R package (v0.1.8). …”
    Get full text
    Article
  15. 395

    Detect anomalous quartic gauge couplings at muon colliders with quantum kernel k-means by Shuai Zhang, Ke-Xin Chen, Ji-Chong Yang

    Published 2025-04-01
    “…As a machine learning algorithm, kernel k-means has been demonstrated to be useful for searching NP signals. …”
    Get full text
    Article
  16. 396

    Pemodelan K-Means Pada Penentuan Predikat Kelulusan Mahasiswa STMIK Palangka Raya by Lili Rusdiana, Sam'ani Sam'ani

    Published 2017-03-01
    “…K-Means algorithm is used through three stages: initialization , the first iteration and the second iteration. …”
    Get full text
    Article
  17. 397

    Method to create and optimize original electric power communication network based on K-means by Xin JIN, Liang YANG, Cheng-ming JIN, Guo-hua SU, Lei SUN

    Published 2016-10-01
    “…The major contribution was using the K-means to create nodes instead of traditional Waxman means in order to get a suitable and strong original electric power communication network.After the nodes were created,a vulnerability analysis was given on the grid of the network topology and check that if it has a network islanding,at last the weak nodes would be reinforced.A simulation about this algorithm shows that this algorithm which combines K-means and vulner-ability can create a electric power communication networks with better resistance of risks.…”
    Get full text
    Article
  18. 398

    Hardware-Based Calculation of Mean Square Error for Automatic Target Recognition in SAR Images by Lucas Urbanski, Gustavo Farhat Araujo, Renato Machado, Roberto D'Amore

    Published 2025-01-01
    “…A reference algorithm in Python was used to determine whether the mathematical operations performed by the architecture are correct, comparing the results between different processing phases, such as the determination of the equivalence of coordinates between the target and the models (i.e., coordinates “matching”), partial calculations of the mean squared error, and the final result of the operations. …”
    Get full text
    Article
  19. 399

    Secure cloud computing: leveraging GNN and leader K-means for intrusion detection optimization by Raman Dugyala, Premkumar Chithaluru, M. Ramchander, Sunil Kumar, Arvind Yadav, N. Sudhakar Yadav, Diaa Salama Abd Elminaam, Deema Mohammed Alsekait

    Published 2024-12-01
    “…Key contributions of this work include the integration of the Leader K-means algorithm for effective data clustering, improving the IDS’s ability to differentiate between normal and malicious activities. …”
    Get full text
    Article
  20. 400

    Combination of Transformed-means Clustering and Neural Networks for Short-Term Solar Radiation Forecasting by M. Ghayekhloo, M. B. Menhaj

    Published 2017-12-01
    “…The proposed Transformed-Means clustering method is based on inverse data transformation and K-means algorithm that presents moreaccurate clustering results when compared to the K-Means algorithm; its improved version and also otherpopular clustering algorithms. …”
    Get full text
    Article