Results 91 to 100 of about 904,121 (199)

Best of Two Local Models: Local Centralized and Local Distributed Algorithms [PDF]

open access: yes, 2014
We consider two models of computation: centralized local algorithms and local distributed algorithms. Algorithms in one model are adapted to the other model to obtain improved algorithms.
Even, Guy, Medina, Moti, Ron, Dana
core  

Isotone Optimization in R: Pool-Adjacent-Violators Algorithm (PAVA) and Active Set Methods

open access: yesJournal of Statistical Software, 2009
In this paper we give a general framework for isotone optimization. First we discuss a generalized version of the pool-adjacent-violators algorithm (PAVA) to minimize a separable convex function with simple chain constraints.
Jan de Leeuw, Kurt Hornik, Patrick Mair
doaj  

Rural road surface distress detection algorithm based on mask R-CNN with data augmentation

open access: yesFrontiers in Built Environment
Traditional manual detection of rural road surface distress is time-consuming and labor-intensive. In this paper, we propose a Mask R-CNN algorithm specifically designed for detecting rural road surface defects.
Dongfang Li   +6 more
doaj   +1 more source

Design of a mine monitoring image restoration device based on L-R algorithm

open access: yesGong-kuang zidonghua, 2020
The intelligent technology of mine video monitoring is one of the key technologies to realize visual remote intervention intelligent unmanned mining in coal mine.However, due to bad working environment of mining face in underground coal mine, the collected mine monitoring images have serious degradation, which affects development of intelligence of ...
openaire   +1 more source

An improved CLTree algorithm

open access: yesDianxin kexue, 2016
An improved algorithm called CLTree-R was proposed.It could compensate the shortcoming of CLTree algorithm such as low accurate and inefficiency.Then CLTree-R was applied in clustering analysis for UCI data sets.In order to improve the efficiency,data ...
Zhuohang LI
doaj   +2 more sources

RETRACTED ARTICLE: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment

open access: yesEURASIP Journal on Information Security
In recent years, various smart devices based on IoT technology, such as smart homes, healthcare, detection, and logistics systems, have emerged. However, as the number of IoT-connected devices increases, securing the IoT is becoming increasingly ...
Lin Yang
doaj   +1 more source

From Spider-Man to Hero — Archetypal Analysis in R

open access: yesJournal of Statistical Software, 2009
Archetypal analysis has the aim to represent observations in a multivariate data setas convex combinations of extremal points. This approach was introduced by Cutler andBreiman (1994); they dened the concrete problem, laid out the theoretical ...
Manuel J. A. Eugster, Friedrich Leisch
doaj  

Global convergence of the Armijo epsilon steepest descent algorithm

open access: yesJournal of Numerical Analysis and Approximation Theory, 2012
In this article, we study the unconstrained minimization problem\[(P)\,\,\,\min\left\{ f(x):x\in\mathbb{R}^{n}\right\} .\]where \(f:\mathbb{R}^{n}\rightarrow\mathbb{R}\) is a continuously differentiable function.
Nour E. Rahali   +2 more
doaj  

Home - About - Disclaimer - Privacy