Search alternatives:
pattern research » pain research (Expand Search)
Showing 401 - 420 results of 2,101 for search 'pattern research algorithms', query time: 0.16s Refine Results
  1. 401

    Identifying Strong Connectivity in Urban Road Networks Considering Traffic Constraints: An Analysis of Road Networks With Different Patterns by Ruru Xing, ZePeng Yang, Xinghua Zhang, Yiwen Liang, Tao Yang, Fei Wang

    Published 2025-01-01
    “…Secondly, combining the Floyd-Warshall algorithm and the depth-first search algorithm, we constructed a strong connectivity effective path search algorithm to adapt to the refined traffic management situation, and identified the key road sections that have the greatest impact on the connectivity of the road network by considering the maximum acceptable level of the path and the road access constraints. …”
    Get full text
    Article
  2. 402

    Examining the Impact of Fingerprint Vector Size on Similarity Determination and Clustering Performance of a Pattern-Based Similarity Metric by Abdulmalik Shehu Yaro, Filip Maly, Pavel Prazak

    Published 2025-01-01
    “…The correlation-based context similarity coefficient (CSC) metric is a pattern-based fingerprint similarity metric that has gained interest in fingerprint database clustering operations. …”
    Get full text
    Article
  3. 403

    A novel energy pattern factor-based optimized approach for assessing Weibull parameters for wind power applications by Ghulam Abbas, Arshad Ali, Mohamed Tahar Ben Othman, Muhammad Wasim Nawaz, Ateeq Ur Rehman, Habib Hamam

    Published 2025-01-01
    “…., Weibull distribution (WD), that fits well with the wind speed data must be known. In this research, we proposed a novel optimized energy pattern factor method (NOEPFM) based on the trust-region-dogleg algorithm and applied it to wind speed data of four cities of the Southern region of Punjab, Pakistan, to determine WD parameters, i.e., shape k and scale c parameters. …”
    Get full text
    Article
  4. 404

    Developing an Algorithm for Detecting Suspicious Trades in Tehran Stock Exchange Based on Spoof Trading Model by Reza Tehrani, Saeed Fallahpour, Hamid Nouralidokht

    Published 2023-03-01
    “…Thoughtful and accurate manipulation techniques adopted by manipulators may not easily be detected. This research examines stock price manipulation in Tehran Stock Exchange and addresses the identification and detection of stock price manipulation by mathematical algorithm (spoof trading). …”
    Get full text
    Article
  5. 405

    Development and Use of Biotechnological System Models in Applied Scientific Research by M. A. Kerimov

    Published 2023-12-01
    “…The system includes three subsystems: two of them have a biological nature and exhibit probabilistic behavior, while the milking machine, serving as a connecting element with inanimate characteristics, is to be regarded as a deterministic technical subsystem. (Research purpose) The research aims to substantiate the conceptual approach to the functioning of an «operator-machine-animal» biotechnical system, taking into account the subsystem interaction patterns. …”
    Get full text
    Article
  6. 406

    An investigation on energy-saving scheduling algorithm of wireless monitoring sensors in oil and gas pipeline networks by Zhifeng Ma, Zhanjun Hao, Zhenya Zhao

    Published 2024-10-01
    “…However, since sensor nodes typically rely on limited battery power, extending the network’s lifecycle and improving energy utilization efficiency have become focal points of research. Therefore, this paper proposes an energy-saving scheduling algorithm based on transformer networks, aimed at optimizing energy consumption and data transmission efficiency of wireless monitoring sensors in oil and gas pipelines. …”
    Get full text
    Article
  7. 407

    Text classification using SVD, BERT, and GRU optimized by improved Seagull optimization (ISO) algorithm by Yuanyuan Chen, Nan Sun, Yuanbang Li, Rong Peng, Abbas Habibi

    Published 2025-06-01
    “…In the present research, a Gated Recurrent Unit (GRU) optimized by the Improved Seagull Optimization (ISO) algorithm was utilized to address these issues, resulting in notable improvements in classification performance. …”
    Get full text
    Article
  8. 408

    Enhanced Network Traffic Classification Using Bayesian-Optimized Logistic Regression and Random Forest Algorithm by Manisankar Sannigrahi, R. Thandeeswaran

    Published 2025-01-01
    “…It examines the performance of a logistic regression model enhanced by Bayesian optimization for detecting TOR traffic using the UNB-CIC TOR-NonTOR datasets and a Bayesian-optimized random forest model for the CIC-Darknet2020 dataset. The research evaluates four key machine learning algorithms: Random forest, logistic regression, support vector machine (SVM), and K-nearest neighbors (K-NN). …”
    Get full text
    Article
  9. 409

    Improving Performance of the Convolutional Neural Networks for Electricity Theft Detection by using Cheetah Optimization Algorithm by Hassan Ghaedi, Seyed Reza Kamel Tabbakh, Reza Ghaemi

    Published 2022-12-01
    “…Early detection of abnormal consumers can prevent security and financial losses. Extensive research studies have been done to detect electricity theft by analyzing customer consumption patterns. …”
    Get full text
    Article
  10. 410

    Electricity usage prediction using developed human evolutionary optimization algorithm and Xception neural network by Dongxian Yu, Di Wu, Chongyang Liao, Zaihui Cao, Somayeh Pouramini

    Published 2025-07-01
    “…Abstract The research paper introduces a novel technique for forecasting electricity usage by utilizing the Developed human evolutionary optimization (DHEO) algorithm and the Xception Neural Network (Xception-NN) model. …”
    Get full text
    Article
  11. 411

    A Cluster Head Selection Algorithm for Extending Last Node Lifetime in Wireless Sensor Networks by Marcin Lewandowski, Bartłomiej Płaczek

    Published 2025-05-01
    “…Experimental results demonstrate that our method significantly extends the lifetime of the last active node compared to representative state-of-the-art algorithms. This research provides a practical and robust solution for energy-efficient WSN operation in real deployment scenarios by considering realistic and application-driven communication behavior along with hardware-level energy consumption.…”
    Get full text
    Article
  12. 412

    Application of Random Forest Algorithm to Analyze the Confidence Level of Forest Fire Hotspots in Riau Peatland by Mitra Unik, Imas Sukaesih Sitanggang, Lailan Syaufina, I Nengah Surati Jaya

    Published 2025-03-01
    “…The research focuses on peatlands spanning 3.86 million ha, using key variables such as NDVI, surface temperature, and peat thickness derived from satellite data. …”
    Get full text
    Article
  13. 413

    Multi-Threshold Remote Sensing Image Segmentation Based on Improved Black-Winged Kite Algorithm by Yi Zhang, Xinyu Liu, Wei Sun, Tianshu You, Xin Qi

    Published 2025-05-01
    “…This paper proposes an adaptive multi-threshold image segmentation method named IBKA-OTSU to address the limitations of existing deep learning-based image segmentation methods, particularly their heavy reliance on large-scale annotated datasets and high computational complexity. The proposed algorithm significantly enhances the capability of complex remote sensing scenarios by systematic improvements to core algorithm components, including population initialization strategy, attack behavior patterns, migration mechanisms, and opposition-based learning strategy. …”
    Get full text
    Article
  14. 414

    Quantum Marine Predator Algorithm: A Quantum Leap in Photovoltaic Efficiency Under Dynamic Conditions by Okba Fergani, Yassine Himeur, Raihane Mechgoug, Shadi Atalla, Wathiq Mansoor, Nacira Tkouti

    Published 2024-11-01
    “…The Quantum Marine Predator Algorithm (QMPA) presents a groundbreaking solution to the inherent limitations of conventional Maximum Power Point Tracking (MPPT) techniques in photovoltaic systems. …”
    Get full text
    Article
  15. 415

    A New Algorithm Model Based on Extended Kalman Filter for Predicting Inter-Well Connectivity by Liwen Guo, Zhihong Kang, Shuaiwei Ding, Xuehao Yuan, Haitong Yang, Meng Zhang, Shuoliang Wang

    Published 2024-10-01
    “…Given that more and more oil reservoirs are reaching the high water cut stage during water flooding, the construction of an advanced algorithmic model for identifying inter-well connectivity is crucial to improve oil recovery and extend the oilfield service life cycle. …”
    Get full text
    Article
  16. 416

    Generation of Julia Sets for a Novel Class of Generalized Rational Functions via Generalized Viscosity Iterative Method by Iqbal Ahmad, Ahmad Almutlg

    Published 2025-04-01
    “…This approach enhances existing algorithms, enabling the visualization of intricate fractal patterns as Julia sets. …”
    Get full text
    Article
  17. 417

    Urban growth simulation using cellular automata model and machine learning algorithms (case study: Tabriz metropolis) by Omid Ashkriz, Babak Mirbagheri, Ali Akbar Matkan, Alireza Shakiba

    Published 2021-12-01
    “…Also, among the algorithms used in this research, the random forest algorithm based on ensemble learning has a higher advantage than the two-support vector machine and the artificial neural network algorithms.…”
    Get full text
    Article
  18. 418
  19. 419
  20. 420