Showing 681 - 700 results of 1,556 for search 'partial algorithm', query time: 0.10s Refine Results
  1. 681

    A kind of improved bivariate even order Bernoulli-type multiquadric quasi-interpolation operator and its application in two-dimensional coupled Burgers’ equations by Ruifeng Wu

    Published 2025-08-01
    “…Abstract Multiquadric quasi-interpolation is an efficient high-dimensional approximation algorithm. It can directly obtain the approximation term and its derivatives without solving any large-scale linear equations. …”
    Get full text
    Article
  2. 682

    A Three-Dimensional OFDM System with PAPR Reduction Method for Wireless Sensor Networks by Zhenxing Chen, Seog Geun Kang

    Published 2014-03-01
    “…Here, we propose an improved partial transmit sequence (PTS) technique to reduce PAPR of the OFDM system with 3D modulation formats. …”
    Get full text
    Article
  3. 683

    Fractional-Order MFAC with Application to DC Motor Speed Control System by Haizhen Wang, Huihua Jian, Jianhua Huang, Yonghong Lan

    Published 2025-02-01
    “…First, we use a fractional-order dynamic data model relating the relationship between the output signal and the fractional-order input variables based on the compact form dynamic linearization. Then, the pseudo-partial derivative (PPD) is obtained using a higher-order estimation algorithm that includes more information about past input and output data. …”
    Get full text
    Article
  4. 684

    MISAO: A Multi-Strategy Improved Snow Ablation Optimizer for Unmanned Aerial Vehicle Path Planning by Cuiping Zhou, Shaobo Li, Cankun Xie, Panliang Yuan, Xiangfu Long

    Published 2024-09-01
    “…In response to the defects in the SAO algorithm, which has poor search efficiency and is prone to getting trapped in local optima, this article suggests a multi-strategy improved (MISAO) snow ablation optimizer. …”
    Get full text
    Article
  5. 685

    Non-Destructive Identification of Wool and Cashmere Fibers Based on Cascade Optimizations of Interval-Wavelength Selection Using NIR Spectroscopy by Xin Chen, Qingle Lan, Yaolin Zhu, Jinni Chen

    Published 2024-12-01
    “…Then, the backward interval partial least squares (BiPLS) algorithm is applied for the preliminary selection of spectral intervals, followed by the application of three different variable selection algorithms, competitive adaptive reweighted sampling (CARS), successive projection algorithm (SPA) and whale optimization algorithm (WOA), for secondary wavelength optimization, respectively. …”
    Get full text
    Article
  6. 686

    Probability of stealth multiplets in sample-multiplexing for droplet-based single-cell analysis by Fumio Nakaki, James Sharpe

    Published 2025-07-01
    “…Results We developed a simple theoretical model to predict four classes of possible multiplets in mx-scRNA-seq: Homogeneous stealth, partial stealth, multilabelled, and unlabelled. We estimated the probability of each class and have found that the partial stealth multiplet, which has been previously overlooked, may impact the results of the whole dataset, particularly when the labelling process or demultiplexing is suboptimal. …”
    Get full text
    Article
  7. 687

    Yang-Mills flows for multilayered graphene by Vasilii Iugov, Nikita Nekrasov

    Published 2025-08-01
    “…We provide a numeric algorithm transforming the original single-particle Hamiltonian to the direct sum of ∂ ¯ A $$ {\overline{\partial}}_A $$ operators coupled to abelian gauge fields with non-zero c 1’s. …”
    Get full text
    Article
  8. 688

    Drill pipe counting for underground drilling rigs based on miner pose recognition by LIU Jie, YANG Cheng, CHENG Zeming, SUN Xiaohu, XU Hao, SHENG Guoyu

    Published 2025-06-01
    “…Experimental results showed that the BlazePose-DPC algorithm was able to perform accurate counting even under challenging lighting conditions or partial occlusion. …”
    Get full text
    Article
  9. 689

    On the Solution of Double-Diffusive Convective Flow due to a Cone by a Linearization Method by Mahesha Narayana, Precious Sibanda

    Published 2012-01-01
    “…Diffusion-thermo and thermal-diffusion effects have been taken into account. The governing partial differential equations are transformed into ordinary differential equations using a suitable similarity transformation. …”
    Get full text
    Article
  10. 690

    Mutual-Energy Inner Product Optimization Method for Constructing Feature Coordinates and Image Classification in Machine Learning by Yuanxiu Wang

    Published 2024-12-01
    “…First, by analyzing the solution space and eigenfunctions of the partial differential equations describing a non-uniform membrane, the mutual-energy inner product is defined. …”
    Get full text
    Article
  11. 691

    Short-Term Load Monitoring of a Power System Based on Neural Network by Di Yang

    Published 2023-01-01
    “…The partial hypothesis is superimposed in the following part to obtain the final short-term forecast. …”
    Get full text
    Article
  12. 692

    A Reliable Treatment of Homotopy Perturbation Method for Solving the Nonlinear Klein-Gordon Equation of Arbitrary (Fractional) Orders by A. M. A. El-Sayed, A. Elsaid, D. Hammad

    Published 2012-01-01
    “…The reliable treatment of homotopy perturbation method (HPM) is applied to solve the Klein-Gordon partial differential equation of arbitrary (fractional) orders. …”
    Get full text
    Article
  13. 693
  14. 694

    Hardware-Based Calculation of Mean Square Error for Automatic Target Recognition in SAR Images by Lucas Urbanski, Gustavo Farhat Araujo, Renato Machado, Roberto D'Amore

    Published 2025-01-01
    “…A reference algorithm in Python was used to determine whether the mathematical operations performed by the architecture are correct, comparing the results between different processing phases, such as the determination of the equivalence of coordinates between the target and the models (i.e., coordinates “matching”), partial calculations of the mean squared error, and the final result of the operations. …”
    Get full text
    Article
  15. 695

    Fuzzy Decision Tree Based on Fuzzy Rough Sets and Z-Number Rules by Boya Zhu, Jingqian Wang, Xiaohong Zhang

    Published 2024-11-01
    “…The decision tree algorithm is widely used in various classification problems due to its ease of implementation and strong interpretability. …”
    Get full text
    Article
  16. 696

    Optimal control strategy for trains in emergency self-propelled running conditions by ZHU Yutong

    Published 2024-09-01
    “…By utilizing the optimal constant speed curve, a coasting energy-saving optimization algorithm was proposed to further reduce energy consumption during emergency self-propelled train operation. …”
    Get full text
    Article
  17. 697

    Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain by Lin JIN, Youliang TIAN

    Published 2022-08-01
    “…Currently, there is no data exchanging and sharing between different hospitals, and it is easy to form data islands.At the same time, regional medical data contains a large amount of sensitive information of patients.The public acquisition, sharing and circulation of these data will lead to malicious tampering, theft, abuse and loss of ownership, thereby revealing patient privacy.In addition, the size of medical data is enormous and the data is unstructured, then it is more difficult to prevent and hold accountable some highly targeted malicious attacks, such as malicious attacks on medical data theft, tampering, and extortion.In view of the above problems, a blockchain-based on multi-authority attribute hidden electronic medical record sharing scheme was proposed to achieve fine-grained access to shared electronic medical records while ensuring patient privacy.The Multi-Authorization Attribute Encryption (MA-ABE) algorithm was introduced, which used multi-authority organizations to manage decentralized attributes.It also used hash functions to identify different users, in order to effectively resist collusion attacks between users with different authorizations.Besides, the linear secrets sharing scheme (LSSS) was used to realize partial hiding of attributes, and the attributes were divided into two parts:attribute name and attribute value.In addition, combined with the characteristics of blockchain openness, transparency and tamper-proof, the design of access policy can update the algorithm.Based on the access policy update algorithm, the policy block was added.The new access policy was uploaded to the blockchain to form a policy update traceability chain, which can realize distributed and reliable access control management under the condition of hidden policy.It can also support data privacy protection at the same time, and traceability of user behavior.The theoretical proof and experimental analysis have proved that this scheme protect attribute privacy effectively, while reduces computational overhead.…”
    Get full text
    Article
  18. 698

    Detection of Adulteration of Panax Notoginseng Powder by Terahertz Technology by Bin Li, Hai Yin, A-kun Yang, Ai-guo Ouyang

    Published 2022-01-01
    “…Then, the least square support vector machine (LS-SVM) algorithm and partial least square (PLS) algorithm are used to establish the quantitative analysis model. …”
    Get full text
    Article
  19. 699

    An Adaptive Large Neighborhood Search for the Larger-Scale Instances of Green Vehicle Routing Problem with Time Windows by Zixuan Yu, Ping Zhang, Yang Yu, Wei Sun, Min Huang

    Published 2020-01-01
    “…The core of ALNS algorithm is destroy operators and repair operators. …”
    Get full text
    Article
  20. 700

    Deep Reinforcement Learning for Uplink Scheduling in NOMA-URLLC Networks by Benoit-Marie Robaglia, Marceau Coupechoux, Dimitrios Tsilimantos

    Published 2024-01-01
    “…The challenge of addressing uplink URLLC requirements in NOMA systems is related to the combinatorial complexity of the action space due to the possibility to schedule multiple devices, and to the partial observability constraint that we impose to our algorithm in order to meet the IoT communication constraints and be scalable. …”
    Get full text
    Article