-
641
Nonlinear Klein-Gordon and Schrödinger Equations by the Projected Differential Transform Method
Published 2012-01-01“…The results reveal that PDTM is a simple and effective numerical algorithm.…”
Get full text
Article -
642
Numerical solution of KdV-mKdV equation based on PINN and its improved method(基于PINN及其改进算法求解KdV-mKdV方程)
Published 2024-11-01“…To overcome these defects, an improved PINN algorithm is proposed based on the idea of gradient enhancement, namely gradient-enhanced physics-informed neural network (gPINN) for solving the problem. gPINN algorithm makes up the defect of gradient attenuation by embedding the gradient information of partial differential equation residuals into the loss function. …”
Get full text
Article -
643
Research on Control System for Material Transport Vehicle Based on Stacking Model
Published 2023-10-01“…Finally, the control system was reinforced using an improved proportional-integral-differential (PID) control algorithm to optimize the control performance. This algorithm not only ensures control stability and accuracy, but also reduces energy consumption and mechanical wear. …”
Get full text
Article -
644
Actuator fault detection method of quadrotor UAV based on dual channel inertial sensors
Published 2025-07-01“…Firstly, the actuator partial failure fault model is introduced into the UAV dynamic model. …”
Get full text
Article -
645
REAL TIME OBJECT MONITORING USING ADAPTIVE CORRELATION FILTER
Published 2019-06-01“…Present article describes real-time object tracking algorithm based on adaptive correlation filter usage. …”
Get full text
Article -
646
Blind-Matched Filtering for Speech Enhancement with Distributed Microphones
Published 2012-01-01“…The speech enhancement is based on a blind-matched filtering algorithm that combines the microphone signals such that the output SNR is maximized. …”
Get full text
Article -
647
Lower-Latency Screen Updates over QUIC with Forward Error Correction
Published 2025-06-01“…We study the impact of varying the packet-loss rate, RTT, bandwidth, and CCA and demonstrate that partial order and FEC latency improvements grow as we increase packet loss and RTT, especially with the emerging Bottleneck Bandwidth and Round-Trip propagation time (BBR) congestion control algorithm.…”
Get full text
Article -
648
University proceedings. Volga region. Technical sciences
Published 2025-05-01“…An experimental study was conducted and the values of the root mean square deviation (RMS) of the linearity of the ADC conversion function were obtained using an ideal integrating capacitor, as well as with the addition of an integrating capacitor equivalent circuit with a number of absorption coefficient values to the model. The algorithm performance was assessed and the effect of the absorption coefficient on the final conversion result was analyzed for different numbers of partial cycles in a full cycle. …”
Article -
649
A simple and efficient attack on the Merkle-Hellman knapsack cryptosystem.
Published 2025-01-01“…In this paper, we present an improved algorithm to analyze the basic Merkle-Hellman public key cryptosystem. …”
Get full text
Article -
650
Optimization Method for Crop Growth Characteristics Based on Improved Locality Preserving Projection
Published 2014-01-01“…Locality preserving projection (LPP) retains only partial information, and category information of samples is not considered, which causes misclassification of feature extraction. …”
Get full text
Article -
651
A clustering fractional-order grey model in short-term electrical load forecasting
Published 2025-02-01“…Hyper parameters of these equations are then sent to a global optimization algorithm to reduce predictive errors. Simulation results on two electricity datasets demonstrated that our algorithm can learn from datasets hyper parameters inside equations and produce forecast values efficiently. …”
Get full text
Article -
652
Suppression model of energy sink-hole attack in WSN based on the unequal cluster radius and mobile cluster head
Published 2017-11-01“…To overcome the problem that partial cluster heads were drastically exhausted by the energy sink-hole attack in wireless sensor network,a novel suppression model based on the optimal path of mobile cluster heads was proposed,which was shown to balance the energy consumption in each cluster head.With the adoption of unequal cluster radius and data traffic monitoring explicitly,the inhibition mechanism was modeled as multivariate linear equations.Furthermore,toroidal projection was adopted to calculate the Euclidean distance,based on which the initial energy of mobile cluster head was configured correspondingly.On this basis,an algorithm based on the minimum cluster lifetime and throughput threshold was provided to achieve the detection and suppression of energy sink-hole attack.The experimental results show that the developed algorithm can suppress energy sink-hole attack evidently and efficiently and is suitable to the resource constrained WSN.…”
Get full text
Article -
653
Utilizing weak graph for edge consolidation-based efficient enhancement of network robustness
Published 2025-05-01“…Thus, by consolidating fewer edges, the connectivity of the original graph can be maintained. The algorithm then extracts the weak graph and discovers a superior solution by constructing a partial minimum cost spanning tree. …”
Get full text
Article -
654
A simplified method for calculating the reliability of rockfill dams slope stability using nonlinear parameters
Published 2025-07-01“…However, the characteristics of the shear strengths of granular materials are non-linear, so that calculating the reliability index requires significantly more iterations and partial derivatives. To optimise this iterative method, an algorithm is proposed to linearise Duncan’s non-linear strength parameters. …”
Get full text
Article -
655
FLWD:A Webshell detection method based on federated learning
Published 2025-06-01“…Webshell attacks were a common technique where attackers gained partial control over the Web server through a Webshell to carry out malicious activities. …”
Get full text
Article -
656
Event-Triggered MFAILC Bipartite Formation Control for Multi-Agent Systems Under DoS Attacks
Published 2025-02-01“…Subsequently, the proposed DoS attack compensation algorithm and the dynamic event-triggered mechanism are integrated with the model-free adaptive iterative learning control algorithm to design a controller, which is further extended from fixed-topology systems to time-varying topology systems. …”
Get full text
Article -
657
On the decidability of boundedness problems for counter Minsky machines
Published 2008-03-01“…It is proved, that for Minsky machines with two counters the boundedness is partial decidable, but for the total boundedness problem does not even exist a semidecision algorithm. …”
Get full text
Article -
658
Decoding Lung Cancer Radiogenomics: A Custom Clustering/Classification Methodology to Simultaneously Identify Important Imaging Features and Relevant Genes
Published 2025-04-01“…Methods: CT imaging data and genetic mutation data for 281 subjects with NSCLC were collected from the CPTAC-LUAD and TCGA-LUSC databases on TCIA. The algorithm was run as follows: (1) genetic clusters were initialized using random clusters, binary matrix factorization, or k-means; (2) image classification was run on CT data for these genetic clusters; (3) misclassified subjects were re-classified based on the image classification algorithm; and (4) the algorithm was run until an accuracy of 90% or no improvement after 10 runs. …”
Get full text
Article -
659
Agreement Analysis on Postoperative Care Between ChatGPT and a High-Volume Foot and Ankle Surgeon.
Published 2024-12-01“…Category: Other; Ankle Arthritis Introduction/Purpose: ChatGPT is an Artificial intelligence (AI) algorithm based on a user-friendly interface that does not requires advanced programming skills. …”
Get full text
Article -
660
Incremental mining of periodic patterns of inadequately informed communication data based on fuzzy segmentation of time series
Published 2025-07-01“…Subsequently, the partial weekly incremental pattern mining algorithm with a moving window scans the segmented data, extracting new periodic patterns using the maximum sub-pattern pandering tree algorithm. …”
Get full text
Article