Search

Showing total 65 results

Search Constraints

Start Over You searched for: Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Topic algorithms Remove constraint Topic: algorithms Publication Year Range This year Remove constraint Publication Year Range: This year Publisher academic press inc. Remove constraint Publisher: academic press inc.
65 results

Search Results

1. Valuative dimension, constructive points of view.

2. A structure-preserving algorithm for Vlasov–Darwin system conserving charge, canonical momentum, and Hamiltonian.

3. Unsupervised question-retrieval approach based on topic keywords filtering and multi-task learning.

4. A general positivity-preserving algorithm for implicit high-order finite volume schemes solving the Euler and Navier-Stokes equations.

5. Tonal vibration control with a self-tuning absorber employing the extremum seeking algorithm.

6. Algebraic number fields and the LLL algorithm.

7. An anti-steganalysis adaptive steganography for HEVC video based on PU partition modes.

8. New limiter regions for multidimensional flows.

9. Improved phase-generated carrier demodulation technique based on LM algorithm with low harmonic distortion and high stability.

10. Primality proving using elliptic curves with complex multiplication by imaginary quadratic fields of class number three.

11. On the computation of r-th roots in finite fields.

12. An autonomous recognition framework based on reinforced adversarial open set algorithm for compound fault of mechanical equipment.

13. Embedded exponential Runge–Kutta–Nyström methods for highly oscillatory Hamiltonian systems.

14. Two families of dual-explicit model-based integration algorithms with controllable numerical damping for structural dynamic problems.

15. HLSM-KF-optimized identification algorithm of unbalanced vibration of dual-rotor in contra-rotating propfan.

16. Suppressing spatial dispersion of seismic finite-difference modeling with the improved pix2pix algorithm.

17. High-capacity multi-MSB predictive reversible data hiding in encrypted domain for triangular mesh models.

18. Copy-move forgery detection using Regional Density Center clustering.

19. [formula omitted]-enumerations of arrowed Gelfand–Tsetlin patterns.

20. Relative approximate bisimulations for fuzzy picture automata.

21. Efficient topology reconfiguration for NoC-based multiprocessors: A greedy-memetic algorithm.

22. Link prediction in protein–protein interaction network: A similarity multiplied similarity algorithm with paths of length three.

23. Sparse online regression algorithm with insensitive loss functions.

24. Explainable AI Insights for Symbolic Computation: A case study on selecting the variable ordering for cylindrical algebraic decomposition.

25. Enhanced selective delayless subband algorithm independent of primary disturbance configuration for multi-channel active noise control system in vehicles.

26. 4 mC site recognition algorithm based on pruned pre-trained DNABert-Pruning model and fused artificial feature encoding.

27. Physics-based prognostics of rolling-element bearings: The equivalent damaged volume algorithm.

28. An improved near-field weighted subspace fitting algorithm based on niche particle swarm optimization for ultrasonic guided wave multi-damage localization.

29. High-probability generalization bounds for pointwise uniformly stable algorithms.

30. Invariants of SDP exactness in quadratic programming.

31. A tree-based algorithm for the integration of monomials in the Chow ring of the moduli space of stable marked curves of genus zero.

32. A low-rank complexity reduction algorithm for the high-dimensional kinetic chemical master equation.

33. Read/write fence-free work-stealing with multiplicity.

34. Federated learning with uncertainty-based client clustering for fleet-wide fault diagnosis.

35. Numerical evaluation of oscillatory integrals via automated steepest descent contour deformation.

36. Multiple correlation filters with gaussian constraint for fast online tracking.

37. Methods for countering attacks on image watermarking schemes: Overview.

38. Matrices in [formula omitted] with quadratic minimal polynomial.

39. On the computation of rational solutions of linear integro-differential equations with polynomial coefficients.

40. Isolating all the real roots of a mixed trigonometric-polynomial.

41. A Bayesian Kalman filter algorithm for quantifying estimation uncertainty of track irregularity on bridges with randomness in system parameters.

42. A first-order computational algorithm for reaction-diffusion type equations via primal-dual hybrid gradient method.

43. A novel slime mold algorithm for grayscale and color image contrast enhancement.

44. Towards adversarial robustness verification of no-reference image- and video-quality metrics.

45. Dynamical integrity estimation in time delayed systems: A rapid iterative algorithm.

46. A single-step recursive algorithm of the convolution integral for computing non-viscous damping forces in dynamic analyses.

47. Human skin detection: An unsupervised machine learning way.

48. A domain generalized person re-identification algorithm based on meta-bond domain alignment☆.

49. Locality sensitive hashing scheme based on online-learning.

50. Stereo matching algorithm based on improved census transform and minimum spanning tree cost aggregation.