Showing 641 - 660 results of 1,556 for search 'partial algorithm', query time: 0.09s Refine Results
  1. 641

    Nonlinear Klein-Gordon and Schrödinger Equations by the Projected Differential Transform Method by Younghae Do, Bongsoo Jang

    Published 2012-01-01
    “…The results reveal that PDTM is a simple and effective numerical algorithm.…”
    Get full text
    Article
  2. 642

    Numerical solution of KdV-mKdV equation based on PINN and its improved method(基于PINN及其改进算法求解KdV-mKdV方程) by 栗雪娟(LI Xuejuan), 刘瑜欣(LIU Yuxin)

    Published 2024-11-01
    “…To overcome these defects, an improved PINN algorithm is proposed based on the idea of gradient enhancement, namely gradient-enhanced physics-informed neural network (gPINN) for solving the problem. gPINN algorithm makes up the defect of gradient attenuation by embedding the gradient information of partial differential equation residuals into the loss function. …”
    Get full text
    Article
  3. 643

    Research on Control System for Material Transport Vehicle Based on Stacking Model by LIU Yuanming, TANG Lingsi, Zen Shuhua

    Published 2023-10-01
    “…Finally, the control system was reinforced using an improved proportional-integral-differential (PID) control algorithm to optimize the control performance. This algorithm not only ensures control stability and accuracy, but also reduces energy consumption and mechanical wear. …”
    Get full text
    Article
  4. 644

    Actuator fault detection method of quadrotor UAV based on dual channel inertial sensors by Laihong Zhou, Hong Jin, Ping Chen, Jianqiang Xiong, Chengdi Li, Wenming Xiong

    Published 2025-07-01
    “…Firstly, the actuator partial failure fault model is introduced into the UAV dynamic model. …”
    Get full text
    Article
  5. 645

    REAL TIME OBJECT MONITORING USING ADAPTIVE CORRELATION FILTER by A. M. Polonevitch, M. P. Revotjuk

    Published 2019-06-01
    “…Present article describes real-time object tracking algorithm based on adaptive correlation filter usage. …”
    Get full text
    Article
  6. 646

    Blind-Matched Filtering for Speech Enhancement with Distributed Microphones by Sebastian Stenzel, Jürgen Freudenberger

    Published 2012-01-01
    “…The speech enhancement is based on a blind-matched filtering algorithm that combines the microphone signals such that the output SNR is maximized. …”
    Get full text
    Article
  7. 647

    Lower-Latency Screen Updates over QUIC with Forward Error Correction by Nooshin Eghbal, Paul Lu

    Published 2025-06-01
    “…We study the impact of varying the packet-loss rate, RTT, bandwidth, and CCA and demonstrate that partial order and FEC latency improvements grow as we increase packet loss and RTT, especially with the emerging Bottleneck Bandwidth and Round-Trip propagation time (BBR) congestion control algorithm.…”
    Get full text
    Article
  8. 648

    University proceedings. Volga region. Technical sciences by V.N. Ashanin, A.A. Korotkov

    Published 2025-05-01
    “…An experimental study was conducted and the values of the root mean square deviation (RMS) of the linearity of the ADC conversion function were obtained using an ideal integrating capacitor, as well as with the addition of an integrating capacitor equivalent circuit with a number of absorption coefficient values to the model. The algorithm performance was assessed and the effect of the absorption coefficient on the final conversion result was analyzed for different numbers of partial cycles in a full cycle. …”
    Article
  9. 649

    A simple and efficient attack on the Merkle-Hellman knapsack cryptosystem. by Jingguo Bi, Lei Su, Haipeng Peng, Lin Wang

    Published 2025-01-01
    “…In this paper, we present an improved algorithm to analyze the basic Merkle-Hellman public key cryptosystem. …”
    Get full text
    Article
  10. 650

    Optimization Method for Crop Growth Characteristics Based on Improved Locality Preserving Projection by Jia Dongyao, Hu Po, Zou Shengxiong

    Published 2014-01-01
    “…Locality preserving projection (LPP) retains only partial information, and category information of samples is not considered, which causes misclassification of feature extraction. …”
    Get full text
    Article
  11. 651

    A clustering fractional-order grey model in short-term electrical load forecasting by Xiang Yu, Lihua Lu, Jianming Qi, Yuchen Qian, Lisen Zhao, Chang Tan, Yangquan Chen, Zhigang Han

    Published 2025-02-01
    “…Hyper parameters of these equations are then sent to a global optimization algorithm to reduce predictive errors. Simulation results on two electricity datasets demonstrated that our algorithm can learn from datasets hyper parameters inside equations and produce forecast values efficiently. …”
    Get full text
    Article
  12. 652

    Suppression model of energy sink-hole attack in WSN based on the unequal cluster radius and mobile cluster head by Wei-wei ZHOU, Bin YU

    Published 2017-11-01
    “…To overcome the problem that partial cluster heads were drastically exhausted by the energy sink-hole attack in wireless sensor network,a novel suppression model based on the optimal path of mobile cluster heads was proposed,which was shown to balance the energy consumption in each cluster head.With the adoption of unequal cluster radius and data traffic monitoring explicitly,the inhibition mechanism was modeled as multivariate linear equations.Furthermore,toroidal projection was adopted to calculate the Euclidean distance,based on which the initial energy of mobile cluster head was configured correspondingly.On this basis,an algorithm based on the minimum cluster lifetime and throughput threshold was provided to achieve the detection and suppression of energy sink-hole attack.The experimental results show that the developed algorithm can suppress energy sink-hole attack evidently and efficiently and is suitable to the resource constrained WSN.…”
    Get full text
    Article
  13. 653

    Utilizing weak graph for edge consolidation-based efficient enhancement of network robustness by Wei Ding, Zhengdan Wang

    Published 2025-05-01
    “…Thus, by consolidating fewer edges, the connectivity of the original graph can be maintained. The algorithm then extracts the weak graph and discovers a superior solution by constructing a partial minimum cost spanning tree. …”
    Get full text
    Article
  14. 654

    A simplified method for calculating the reliability of rockfill dams slope stability using nonlinear parameters by Li Kangping, Zhou Heng, Li Feng, Du Jifang, Zhao Qing, Bai Yani

    Published 2025-07-01
    “…However, the characteristics of the shear strengths of granular materials are non-linear, so that calculating the reliability index requires significantly more iterations and partial derivatives. To optimise this iterative method, an algorithm is proposed to linearise Duncan’s non-linear strength parameters. …”
    Get full text
    Article
  15. 655

    FLWD:A Webshell detection method based on federated learning by ZENG Qingpeng, CHAI Jiangli, WU Shuixiu

    Published 2025-06-01
    “…Webshell attacks were a common technique where attackers gained partial control over the Web server through a Webshell to carry out malicious activities. …”
    Get full text
    Article
  16. 656

    Event-Triggered MFAILC Bipartite Formation Control for Multi-Agent Systems Under DoS Attacks by Han Li, Lixia Fu, Wenchao Wu

    Published 2025-02-01
    “…Subsequently, the proposed DoS attack compensation algorithm and the dynamic event-triggered mechanism are integrated with the model-free adaptive iterative learning control algorithm to design a controller, which is further extended from fixed-topology systems to time-varying topology systems. …”
    Get full text
    Article
  17. 657

    On the decidability of boundedness problems for counter Minsky machines by E. V. Kuzmin, D. Ju. Chalyy

    Published 2008-03-01
    “…It is proved, that for Minsky machines with two counters the boundedness is partial decidable, but for the total boundedness problem does not even exist a semidecision algorithm. …”
    Get full text
    Article
  18. 658

    Decoding Lung Cancer Radiogenomics: A Custom Clustering/Classification Methodology to Simultaneously Identify Important Imaging Features and Relevant Genes by Destie Provenzano, John P. Lichtenberger, Sharad Goyal, Yuan James Rao

    Published 2025-04-01
    “…Methods: CT imaging data and genetic mutation data for 281 subjects with NSCLC were collected from the CPTAC-LUAD and TCGA-LUSC databases on TCIA. The algorithm was run as follows: (1) genetic clusters were initialized using random clusters, binary matrix factorization, or k-means; (2) image classification was run on CT data for these genetic clusters; (3) misclassified subjects were re-classified based on the image classification algorithm; and (4) the algorithm was run until an accuracy of 90% or no improvement after 10 runs. …”
    Get full text
    Article
  19. 659

    Agreement Analysis on Postoperative Care Between ChatGPT and a High-Volume Foot and Ankle Surgeon. by Ben Efrima MD, Agustin Barbero MD, Cristian Indino MD, Camilla Maccario MD, Federico Giuseppe Usuelli MD

    Published 2024-12-01
    “…Category: Other; Ankle Arthritis Introduction/Purpose: ChatGPT is an Artificial intelligence (AI) algorithm based on a user-friendly interface that does not requires advanced programming skills. …”
    Get full text
    Article
  20. 660

    Incremental mining of periodic patterns of inadequately informed communication data based on fuzzy segmentation of time series by Miaomiao Li

    Published 2025-07-01
    “…Subsequently, the partial weekly incremental pattern mining algorithm with a moving window scans the segmented data, extracting new periodic patterns using the maximum sub-pattern pandering tree algorithm. …”
    Get full text
    Article