-
461
Last-Train Timetabling under Transfer Demand Uncertainty: Mean-Variance Model and Heuristic Solution
Published 2017-01-01“…Then, we add the mean-variance risk measure into the model to generate timetables by adjusting the last trains’ departure times and running times for each line. …”
Get full text
Article -
462
Effective optical and treatment zone analysis by means of cross-over differences after lenticule extraction
Published 2025-01-01Get full text
Article -
463
Optimizing Solar Energy Harvesting: A K‐Means Clustering Approach for Enhanced Efficiency and Viability
Published 2025-01-01“…This research introduces an innovative synthesis method for a typical solar radiation year (TSRY) based on K‐means clustering to maximize energy harvest. The K‐means algorithm, a fundamental image processing technique, is utilized to classify images into distinct groups. …”
Get full text
Article -
464
Comparative Analysis of Nature-Inspired Algorithms for Optimal Power Flow Problem: A Focus on Penalty-Vanishing Terms and Algorithm Performance
Published 2024-01-01“…Utilizing a low-high sorting ranking method, considering mean, maximum, and minimum values for result computation and sorting, we identify the optimal algorithm among all those assessed for various objective functions, alongside assessing the success rate of penalty-vanishing terms. …”
Get full text
Article -
465
Coupled Alternating Neural Networks for Solving Multi-Population High-Dimensional Mean-Field Games
Published 2024-12-01“…Multi-population mean-field game is a critical subclass of mean-field games (MFGs). …”
Get full text
Article -
466
Penerapan Algoritma Fuzzy C Means untuk Analisis Permasalahan Simpanan Wajib Anggota Koperasi
Published 2018-05-01“…The method used is Data Mining Clustering with Fuzzy C Means algorithm. From the results of the clustering, at the final stage of the analysis is known, There are 75 members scattered in the District / City of Rokan Hulu, Kampar, Indragiri Hulu dan Indragiri Hilir dan registered in the 80s that need to be reviewed. …”
Get full text
Article -
467
Algorithmic Audiences, Serialized Streamers, and the Discontents of Datafication
Published 2022-07-01“…This article addresses streaming television platforms’ reliance on algorithms, serial narratives, and user interfaces and the effect of these strategies on the television viewing audience. …”
Get full text
Article -
468
Valuation and compensation selection algorithm of simulation interferences
Published 2019-06-01“…Analytically and by means of simulation the study of the effectiveness of the proposed algorithm is realized. …”
Get full text
Article -
469
Research on algorithm and application risk and its governance
Published 2023-05-01“…With the rapid development and in-depth application of information technology, algorithms are widely used in transportation, medical care, e-commerce, information services, public management and other fields, but their own data dependence, logical black box and general purpose characteristics also bring about data abuse in algorithm applications, algorithm discrimination in public management, algorithm manipulation in information services, algorithm collusion in market competition.In order to deal with the problems caused by the application of algorithms, countries have actively taken measures to strengthen the governance of algorithm applications.To promote the effective use of algorithms and strengthen algorithm governance, we need to further strengthen top-level design, improve governance pattern, enrich governance means, strengthen international coordination, and constantly improve the algorithm governance system.…”
Get full text
Article -
470
PCA clustering algorithm for indoor positioning in WLAN
Published 2016-07-01“…In WLAN indoor location system,aiming at the problem of time-varying characteristic of received signal strength (RSS) which reduces indoor positioning accuracy,a clustering algorithm based on principal component analysis (PCA) albino RSS was put forward.The algorithm firstly treated the RSS with PCA whitening treatment to remove the correlation and improve reliability and rationality of the cluster centers.Then,K-means clustering method was used to cluster the RSS and the clustering accuracy was improved effectively,so as to improve positioning accuracy.Experimental results show that compared with the traditional clustering algorithm without PCA,probability of positioning error within 2 meters has improved 44.8% in positioning accuracy,and the performance of positioning system has been more excellent.…”
Get full text
Article -
471
Opportunities and challenges of multidisciplinary algorithmic impact assessments
Published 2025-12-01“…However, the evaluation of computational and algorithmic systems has largely been approached through a uni-modal and uni-disciplinary perspective that heavily privileges computer science and engineering disciplines. …”
Get full text
Article -
472
Generation Algorithms for Thévenin and Norton Equivalent Circuits
Published 2025-03-01“…Three case studies are discussed to prove the efficiency of the developed algorithms. They cover real DC and AC applications, respectively. …”
Get full text
Article -
473
A Cuckoo Search Algorithm for Multimodal Optimization
Published 2014-01-01“…On the other hand, the cuckoo search (CS) algorithm is a simple and effective global optimization algorithm which can not be directly applied to solve multimodal optimization problems. …”
Get full text
Article -
474
Enhanced Gaining-Sharing Knowledge-based algorithm
Published 2025-06-01“…This means the proposed eGSK algorithm outperforms its competitors and achieves more competitive results, especially with high dimensions.…”
Get full text
Article -
475
A New Single-Parameter Bees Algorithm
Published 2024-10-01“…Based on bee foraging behaviour, the Bees Algorithm (BA) is an optimisation metaheuristic algorithm which has found many applications in both the continuous and combinatorial domains. …”
Get full text
Article -
476
An effective algorithm for measuring diastolic artery diameters
Published 2014-01-01Get full text
Article -
477
Three-Way Merging Algorithm for Structured Data
Published 2025-01-01“…The design of our algorithm is inspired by the diff3 algorithm. Since the diff3 algorithm is designed only for merging text files, we had to change it to enable data merging at the level of programming structures. …”
Get full text
Article -
478
Apllication of optimization algorithms to improve the design of turnouts
Published 2016-04-01“…Similar techniques and algorithms can be used for the solution of a large number of optimization tasks of technical means of railway transport. …”
Get full text
Article -
479
Algorithm for finding subcritical paths on network diagrams
Published 2023-02-01“…Numerically, the algorithm was implemented by the dynamic programming method extended by means of an additional functional relationship, implying the presence of suboptimal policies.Conclusions. …”
Get full text
Article -
480
Carrier-independent deep optical watermarking algorithm
Published 2022-08-01“…With the development of multimedia techniques, the demand for copyright protection of digital products has also gradually risen.Digital watermarking is an effective means to protect the copyright of digital products.It is generally made by adding important identification information (i.e., digital watermark) to a digital carrier (e.g., text, image, etc.), so that the carrier carries the identification information but does not affect the normal use of the carrier.The common digital watermark embedding scheme is to embed the watermark information by modifying the carrier via specific algorithms.In the actual application scenarios, there are many images or objects to be protected (such as art paintings, etc.) that are not allowed to be modified.Based on this background, a new carrier-independent deep optical watermarking algorithm was proposed, which can realize watermark information embedding without modifying the original carrier and achieve the purpose of copyright protection.Specifically, a new watermark template expression scheme at the embedding end was proposed, which expressed the watermark information by visible light modulation.By analyzing the visual system of human eyes, a watermark template pattern based on alternating projection was proposed to embed the watermark information, which made the embedding process neither require modification of the original carrier nor affect the visual senses of human eyes.At the extraction end, a watermark extraction network based on residual connection was designed, and the captured watermarked images were fed into this network after perspective transformation to extract the watermark information.The experiments were conducted under various conditions and comparisons with three baseline algorithms were made.The experimental results show that the proposed algorithm generates watermarked images with less visual distortion and is robust to the "projecting-shooting" process.The watermark extraction network has high accuracy in extracting watermark information at different distances, angles and illumination conditions, and has certain advantages over other general networks.…”
Get full text
Article