Results 41 to 50 of about 26,646,267 (236)

Multi-target Trajectory Generation Method Based on Motion Features [PDF]

open access: yesJisuanji kexue
In the maritime multi-target tracking context of space tracking vessels,the trajectory correlation of target ships has remained a formidable challenge.Owing to the highly dynamic nature of the oceanic environment and the irregularity as well as ...
ZHANG Haoran, WANG Guiling
doaj   +1 more source

Hierarchical Hypergraph-based Attention Neural Network for Service Recommendation [PDF]

open access: yesJisuanji kexue
With the rapid growth of various services and APIs on the Internet and the Web,it has become increasingly challenging for developers to quickly and accurately find APIs that meet their needs,thus requiring an efficient recommendation system.Currently,the
YANG Dongsheng, WANG Guiling, ZHENG Xin
doaj   +1 more source

CP-nets Structure Learning Combined with Inverted Matrix and Frequent Pattern Tree Method

open access: yesTaiyuan Ligong Daxue xuebao, 2021
A method was preposed for mining conditional preferences and learning CP-nets on the data stream based on the inverted matrix structure. The transaction layout using the inverted matrix reduces the number of times the database is scanned, and through ...
Weixing WANG, Zhaowei LIU
doaj   +1 more source

Novel Methods for Synthesizing Self-Checking Combinational Circuits by Means of Boolean Signal Correction and Polynomial Codes

open access: yesComputation
This paper proposes the use of a polynomial code for synthesizing self-checking digital devices. The code is chosen for its error detection characteristics in data symbols and is used for Boolean signals correction in embedded control circuits.
Dmitry V. Efanov   +5 more
doaj   +1 more source

A Correlation Driven Approach with Edge Services for Predictive Industrial Maintenance

open access: yesSensors, 2018
Predictive industrial maintenance promotes proactive scheduling of maintenance to minimize unexpected device anomalies/faults. Almost all current predictive industrial maintenance techniques construct a model based on prior knowledge or data at build ...
Meiling Zhu, Chen Liu
doaj   +1 more source

Nonlinear projective filtering in a data stream

open access: yes, 1998
We introduce a modified algorithm to perform nonlinear filtering of a time series by locally linear phase space projections. Unlike previous implementations, the algorithm can be used not only for a posteriori processing but includes the possibility to ...
Davies M. E.   +8 more
core   +3 more sources

Comparison of Novelty Detection Methods for Detection of Various Rotary Machinery Faults

open access: yesSensors, 2021
Condition monitoring is an indispensable element related to the operation of rotating machinery. In this article, the monitoring system for the parallel gearbox was proposed.
Jakub Górski   +4 more
doaj   +1 more source

Adaptive Data Stream Management System Using Learning Automata

open access: yes, 2011
In many modern applications, data are received as infinite, rapid, unpredictable and time- variant data elements that are known as data streams. Systems which are able to process data streams with such properties are called Data Stream Management Systems
Abdi, Fatemeh   +3 more
core   +2 more sources

A buffer-based online clustering for evolving data stream

open access: yesInformation Sciences, 2019
Data stream clustering plays an important role in data stream mining for knowledge extraction. Numerous researchers have recently studied density-based clustering algorithms due to their capability to generate arbitrarily shaped clusters.
K. Islam, Md. Manjur Ahmed, K. Z. Zamli
semanticscholar   +1 more source

Synthesis of Self-Checking Circuits for Train Route Traffic Control at Intermediate Stations with Control of Calculations Based on Weight-Based Sum Codes

open access: yesComputation
When synthesizing systems for railway interlocking, it is recommended to use automated models to implement the logic of railway automation and remote control units. Finite-state machines (FSMs) can be implemented on any hardware component.
Dmitry V. Efanov   +10 more
doaj   +1 more source

Home - About - Disclaimer - Privacy