نتایج جستجو برای: heuristic identification
تعداد نتایج: 464124 فیلتر نتایج به سال:
This paper proposes a heuristic triple layered particle swarm optimization–backpropagation (PSO-BP) neural network method for improving the convergence and prediction accuracy of the fault diagnosis system of the photovoltaic (PV) array. The parameters, open-circuit voltage (Voc), short-circuit current (Isc), maximum power (Pm) and voltage at maximum power point (Vm) are extracted from the outp...
background: acute appendicitis is one of the common and urgent illnesses among children. children usually are unable to help the physicians completely due to weakness in describing the medical history. moreover, acute appendicitis overlaps with conditions of other diseases in terms of symptoms and signs in the first hours of presentation. these conditions lead to unwanted biases as well as err...
As distributed systems increase in size, the need for scalable algorithms becomes more and more important. We argue that in the context of system identification, an essential building block of any scalable algorithm is the ability to estimate local dynamics within a large interconnected system. We show that in what we term the “full interconnection measurement” setting, this task is easily solv...
Grey wolf optimization (GWO) is one of the recently proposed heuristic algorithms imitating the leadership hierarchy and hunting mechanism of grey wolves in nature. The aim of these algorithms is to perform global optimization. This paper presents a modified GWO algorithm based on complex-valued encoding; namely the complex-valued encoding grey wolf optimization (CGWO). We use CGWO to test 16 u...
The goal of cryptography is to construct secure and efficient protocols for various tasks. Unfortunately, it is often the case that protocols that are provably secure are not efficient enough for practical use. As a result, most protocols used in practice are heuristics that lack a proof of security. These heuristics are typically very efficient and are believed to be secure, though no proof of...
Code-switching is an interesting linguistic phenomenon commonly observed in highly bilingual communities. It consists of mixing languages in the same conversational event. This paper presents results on Part-of-Speech tagging Spanish-English code-switched discourse. We explore different approaches to exploit existing resources for both languages that range from simple heuristics, to language id...
Low-rank matrix recovery has found many applications in science and engineering such as machine learning, signal processing, collaborative filtering, system identification, and Euclidean embedding. But the low-rank matrix recovery problem is an NP hard problem and thus challenging. A commonly used heuristic approach is the nuclear norm minimization. In [12,14,15], the authors established the ne...
Inventory record inaccuracy leads to ineffective replenishment decisions and deteriorates supply chain performance. Conducting cycle counts (i.e., periodic inventory auditing) is a common approach to correcting inventory records. It is not clear, however, how inaccuracy at different locations affects supply chain performance and how an effective cycle-count program for a multi-stage supply chai...
Humans communicate with each other using abstract signs and symbols. While the cooperation between humans and machines can be a powerful tool for solving complex or difficult tasks, the communication must be at the abstract enough level that is both natural to the humans and understandable to the machines. Our paper focuses on natural language and in particular on sign language recognition. The...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید