-
781
Extreme Operation Mode Extraction Method Based on Convex Hull Algorithm
Published 2024-07-01“…Compared with the extreme scenario extraction based on the K-means algorithm, the results demonstrate that the proposed method can provide effective data support for scenario selection and meet the requirements of power grid planning.…”
Get full text
Article -
782
Key Transmission Section Search Strategy Based on Improved Clustering Algorithm
Published 2022-06-01“…In order to effectively avoid the occurrence of cascading failure due to the loss of faulted or overloaded lines, a key transmission section search method based on an improved fuzzy C-means clustering algorithm is proposed. Firstly, an improved particle swarm optimization algorithm is employed to update the clustering center, so that the problem that the clustering algorithm is sensitive to the initial clustering center can be solved. …”
Get full text
Article -
783
Optimization of Transformer Windings Based on FEA-XGBoost and NSGA-III Algorithm
Published 2024-01-01“…Besides, the winding manufacturing cost and loss are meanly decreased by 4.7% and 4.1%, respectively, in the engineering case.…”
Get full text
Article -
784
Hiding Encryption Text by DNA using Exploiting Modification Direction Algorithm
Published 2021-06-01Get full text
Article -
785
Bank Customer Segmentation and Marketing Strategies Based on Improved DBSCAN Algorithm
Published 2025-03-01“…The proposed KM-DBSCAN algorithm, which combines K-means and DBSCAN, is used for customer segmentation. …”
Get full text
Article -
786
An Algorithm for Correcting Levels of Useful Signals on Interpretation of Eddy-Current Defectograms
Published 2021-03-01“…Examples of the algorithm’s operation on real eddy-current data are given.…”
Get full text
Article -
787
Density Peaks Clustering Algorithm Based on Neighborhood Radius and Membership Degree
Published 2025-01-01“…Low-density points that remain unassigned undergo secondary clustering using the DPC algorithm. The proposed approach is evaluated on eight synthetic datasets and eleven real-world datasets, with comparisons to DPC-KNN, DPC, K-means, and DBSCAN. …”
Get full text
Article -
788
Modeling Parking Occupancy Using Algorithm of 3D Visibility Network
Published 2025-01-01“…In the present research work, a new approach for the 3D visibility network algorithm has been developed, showing how graph theory applied to wireless sensor networks (WSNs) enables technological development for new solutions in areas such as public infrastructure. …”
Get full text
Article -
789
Algorithm for parametric identification of the dc electric drive using the inverse model
Published 2022-04-01“…The need arises to create such a control system that will allow for the identification of the parameters of the EDCS by introducing the appropriate identification algorithms into its structure.METHODS. When solving the problem, a search-free gradient method of adaptive identification was used, implemented by means of the MatLab software environment.RESULTS. …”
Get full text
Article -
790
Algorithm for parametric identification of the DC electric drive using the inverse model
Published 2022-06-01“…The need arises to create such a control system that will allow for the identification of the parameters of the EDCS by introducing the appropriate identification algorithms into its structure.METHODS. When solving the problem, a search-free gradient method of adaptive identification was used, implemented by means of the MatLab software environment.RESULTS. …”
Get full text
Article -
791
Didactic potential of using systems for visualization of algorithms in the process of teaching programming
Published 2019-05-01“…There are described the difficulties arising during the study of the fundamentals of algorithmization and programming. The author proposed to use the algorithm visualizer, as an auxiliary visual means of teaching algorithmization, for more successful mastering the mechanism of the algorithms at lectures. …”
Get full text
Article -
792
Algorithmic support of the adaptive system of controlled flight into terrain avoidance (CFITA)
Published 2023-01-01“…The article considers the restrictions algorithms for the trajectory parameters of aircraft motion. …”
Get full text
Article -
793
Analysis and Research on Spectrogram-Based Emotional Speech Signal Augmentation Algorithm
Published 2025-06-01“…To address this issue, in this paper we systematically evaluate the influence of common data augmentation algorithms on emotion recognition from three dimensions: (1) we design subjective auditory experiments to intuitively demonstrate the impact of augmentation algorithms on the emotional expression of speech; (2) we jointly extract multi-dimensional features from spectrograms based on the Librosa library and analyze the impact of data augmentation algorithms on the spectral features of speech signals through heatmap visualization; and (3) we objectively evaluate the recognition performance of the model by means of indicators such as cross-entropy loss and introduce statistical significance analysis to verify the effectiveness of the augmentation algorithms. …”
Get full text
Article -
794
Audio Watermarking Algorithm Against Speed Attack based on Amplitude Rearrangement
Published 2025-05-01“…[Purposes] Digital audio watermarking technology refers to the technique of embedding a watermark signal with specific meaning into the original audio signal, which can be extracted when needed. …”
Get full text
Article -
795
Dynamic Demodulation Algorithm for Bio-radar Sensors Based on Range Tapper
Published 2025-02-01“…We tested the algorithm performance in simulations and experiments for the cross range bin cases. …”
Get full text
Article -
796
Application of the spectral bisection algorithm for the analysis of criminal communities in social networks
Published 2024-07-01“…The purpose of the study is to substantiate the use of one of the graph separation methods – the spectral bisection algorithm for the analysis of social networks, as well as to evaluate the possibilities of software implementation of this algorithm during the collection of evidence-based information in the investigation of crimes committed using information and telecommunications technologies.Method. …”
Get full text
Article -
797
Optimization of the Offshore Wind Turbines Layout Using Cuckoo Search Algorithm
Published 2024-06-01“…One way to address this challenge is through wind turbine arrangements and their scalability. Developing effective means of optimizing wind farm configurations is a major concern for energy communities. …”
Get full text
Article -
798
Hybrid machine learning algorithms accurately predict marine ecological communities
Published 2025-03-01“…The study considered data from 245 nematode genera and 44 environmental parameters from 100 stations. Data was analyzed by means of a hybrid machine learning (ML) approach, which combines unsupervised and supervised methods. …”
Get full text
Article -
799
Comparing variable neighbourhood search algorithms for the direct aperture optimisation in radiotherapy
Published 2025-08-01“…We apply our proposed algorithms to prostate cancer cases, achieving highly competitive results for both algorithms. …”
Get full text
Article -
800
Gaussian pulse shaping algorithm based on finite impulse response filters
Published 2024-12-01“…Compared to infinite impulse response (IIR) filters, finite impulse response (FIR) filters have the advantage of being less affected by errors and more stable.PurposeThis study aims to propose a FIR filter-based Gaussian pulse shaping algorithm using impulse response functions, and realize a FPGA-based hardware implementation of this algorithm to evaluate the impact of hardware limitations on it.MethodsFirst of all, the discrete impulse response of Gaussian pulse shaping (GPS) was derived by means of impulse response invariant transformation, and shaped pulse waveforms under different quantization accuracies and truncation intervals were obtained using a computer simulation, so did that under Gaussian pulse shaping with or without additional truncation were assessed. …”
Get full text
Article