Displaying publications 61 - 80 of 1459 in total

Abstract:
Sort:
  1. Hou Chin J, Ratnavelu K
    Sci Rep, 2017 04 04;7:45836.
    PMID: 28374836 DOI: 10.1038/srep45836
    Community structure is an important feature of a complex network, where detection of the community structure can shed some light on the properties of such a complex network. Amongst the proposed community detection methods, the label propagation algorithm (LPA) emerges as an effective detection method due to its time efficiency. Despite this advantage in computational time, the performance of LPA is affected by randomness in the algorithm. A modified LPA, called CLPA-GNR, was proposed recently and it succeeded in handling the randomness issues in the LPA. However, it did not remove the tendency for trivial detection in networks with a weak community structure. In this paper, an improved CLPA-GNR is therefore proposed. In the new algorithm, the unassigned and assigned nodes are updated synchronously while the assigned nodes are updated asynchronously. A similarity score, based on the Sørensen-Dice index, is implemented to detect the initial communities and for breaking ties during the propagation process. Constraints are utilised during the label propagation and community merging processes. The performance of the proposed algorithm is evaluated on various benchmark and real-world networks. We find that it is able to avoid trivial detection while showing substantial improvement in the quality of detection.
    Matched MeSH terms: Algorithms
  2. Wan Nor Arifin
    MyJurnal
    For the purpose of teaching statistics, lecturers often rely on data from real studies, text book examples or painstakingly created datasets. The process of creating a dataset can be made easier with the utilization of PASW Statistics to generate random values. The objective of this article is to demonstrate the creation of data which are measured on continuous scale, using PASW Statistics menus and syntax.
    Matched MeSH terms: Algorithms
  3. Hasan, Talaat I., Shaharuddin Salleh, Sulaiman, Nejmaddin A.
    MATEMATIKA, 2017;33(2):191-206.
    MyJurnal
    In this paper, we consider the system of Volterra-Fredholm integral equations
    of the second kind (SVFI-2). We proposed fixed point method (FPM) to solve
    SVFI-2 and improved fixed point method (IFPM) for solving the problem. In addition,
    a few theorems and two new algorithms are introduced. They are supported by
    numerical examples and simulations using Matlab. The results are reasonably good
    when compared with the exact solutions.
    Matched MeSH terms: Algorithms
  4. Wu Diyi, Zulaiha Ali Othman, Suhaila Zainudin, Ayman Srour
    MyJurnal
    The water flow-like algorithm (WFA) is a relatively new metaheuristic algorithm, which has shown good solution for the Travelling Salesman Problem (TSP) and is comparable to state of the art results. The basic WFA for TSP uses a 2-opt searching method to decide a water flow splitting decision. Previous algorithms, such as the Ant Colony System for the TSP, has shown that using k-opt (k>2) improves the solution, but increases its complexity exponentially. Therefore, this paper aims to present the performance of the WFA-TSP using 3-opt and 4-opt, respectively, compare them with the basic WFA-TSP using 2-opt and the state of the art algorithms. The algorithms are evaluated using 16 benchmarks TSP datasets. The experimental results show that the proposed WFA-TSP-4opt outperforms in solution quality compare with others, due to its capacity of more exploration and less convergence.
    Matched MeSH terms: Algorithms
  5. Chaudhuri A, Das P
    The concepts of fuzzy semi-open and semi-closed sets have been utilised to define four types of semi-separation of fuzzy sets corresponding to the notions of separation, Q-separation, weak separation, strong separation and eight types of semi-connectedness viz SiC, SCi-connectedness for i = 1 ,2 ,3 ,4 corresponding to the notions of O-connectedness, connectedness, Oq-connectedness and ci-connectedness of a fuzzy set. Interrelationship between these notions of semi-connectedness of a fuzzy set and their properties have been discussed.
    Konsep set semi-terbuka dan semi-tertutup kabur digunakan untuk mentakrif empat jenis semi-pemisahan bagi set-set kabur sepadan dengan konsep pemisahan, Q-pemisahan, pemisahan lemah, pemisahan kuat dan lapan jenis keberkaitan, iaitu keberkaitan-SiC dan keberkaitan-SCi untuk i=1 ,2 ,3 ,4 sepadan dengan konsep keberkaitan, keberkaitan-Oq dan keberkaitan-Ci bagi set kabur. Hubung kait antara konsep-konsep semi-keberkaitan set kabur ini dan sifat-sifatnya dibincangkan.
    Matched MeSH terms: Algorithms
  6. Zanariah Abdul Majid, Mohamed Suleiman
    Sains Malaysiana, 2011;40:1179-1186.
    Predictor-corrector two point block methods are developed for solving first order ordinary differential equations (ODEs) using variable step size. The method will estimate the solutions of initial value problems (IVPs) at two points simultaneously. The existence multistep method involves the computations of the divided differences and integration coefficients when using the variable step size or variable step size and order. The block method developed will be presented as in the form of Adams Bashforth - Moulton type and the coefficients will be stored in the code. The efficiency of the predictor-corrector block method is compared to the standard variable step and order non block multistep method in terms of total number of steps, maximum error, total function calls and execution times.
    Matched MeSH terms: Algorithms
  7. Muhammad Sarfraz, Misbah Irshad, Malik Zawwar Hussain
    Sains Malaysiana, 2013;42:1167-1179.
    An automatic approach, for reverse engineering of digitized hand printed and electronic planar objects, is presented which is useful for vectorizing the generic shapes. The rational cubic function were used to find the optimal solution of the curve fitting problem with the help of a soft computing technique genetic algorithm which finds appropiate values of shape parameters in the description of rational cubic functions.
    Matched MeSH terms: Algorithms
  8. Zurni Omar, Mohamed Suleiman
    A new method called parallel R-point explicit block method for solving a single equation of higher order ordinary differential equation directly using a constant step size is developed. This method calculates the numerical solution at R point simultaneously is parallel in nature. Computational advantages are presented by comparing the results obtained with the new method with that of the conventional 1-point method. The numerical results show that the new method reduces the total number of steps and execution time. The accuracy of the parallel block and the conventional 1-point methods is comparable particularly when finer step sizes are used.
    Matched MeSH terms: Algorithms
  9. Yap H, Mohd Atan K, Sapar S
    Sains Malaysiana, 2011;40:1179-1186.
    In this paper we determined the estimate of p-adic sizes of common zeros of partial derivative polynomials associated with a cubic form whose indicator diagrams have one overlapping segment by using Newton polyhedron technique. We showed that the p-adic sizes of such common zeros can be found explicitly on the overlapping segment of the indicator diagrams associated with the polynomials.
    Matched MeSH terms: Algorithms
  10. Elayaraja Aruchunan, Mohana Sundaram Muthuvalu, Jumat Sulaiman
    Sains Malaysiana, 2015;44:139-146.
    In this paper, we have examined the effectiveness of the quarter-sweep iteration concept on conjugate gradient normal residual (CGNR) iterative method by using composite Simpson's (CS) and finite difference (FD) discretization schemes in solving Fredholm integro-differential equations. For comparison purposes, Gauss- Seidel (GS) and the standard or full- and half-sweep CGNR methods namely FSCGNR and HSCGNR are also presented. To validate the efficacy of the proposed method, several analyses were carried out such as computational complexity and percentage reduction on the proposed and existing methods.
    Matched MeSH terms: Algorithms
  11. Ali M, Khan A, Aurangzeb K, Ali I, Mahmood H, Haider SI, et al.
    Sensors (Basel), 2019 Mar 04;19(5).
    PMID: 30836710 DOI: 10.3390/s19051101
    An efficient algorithm for the persistence operation of data routing is crucial due to the uniqueness and challenges of the aqueous medium of the underwater acoustic wireless sensor networks (UA-WSNs). The existing multi-hop algorithms have a high energy cost, data loss, and less stability due to many forwarders for a single-packet delivery. In order to tackle these constraints and limitations, two algorithms using sink mobility and cooperative technique for UA-WSNs are devised. The first one is sink mobility for reliable and persistence operation (SiM-RPO) in UA-WSNs, and the second is the enhanced version of the SiM-RPO named CoSiM-RPO, which utilizes the cooperative technique for better exchanging of the information and minimizes data loss probability. To cover all of the network through mobile sinks (MSs), the division of the network into small portions is accomplished. The path pattern is determined for MSs in a manner to receive data even from a single node in the network. The MSs pick the data directly from the nodes and check them for the errors. When erroneous data are received at the MS, then the relay cooperates to receive correct data. The proposed algorithm boosts the network lifespan, throughput, delay, and stability more than the existing counterpart schemes.
    Matched MeSH terms: Algorithms
  12. Wang X, Sun B, Liu B, Fu Y, Zheng P
    PLoS One, 2017;12(11):e0186853.
    PMID: 29095845 DOI: 10.1371/journal.pone.0186853
    Experimental design focuses on describing or explaining the multifactorial interactions that are hypothesized to reflect the variation. The design introduces conditions that may directly affect the variation, where particular conditions are purposely selected for observation. Combinatorial design theory deals with the existence, construction and properties of systems of finite sets whose arrangements satisfy generalized concepts of balance and/or symmetry. In this work, borrowing the concept of "balance" in combinatorial design theory, a novel method for multifactorial bio-chemical experiments design is proposed, where balanced templates in combinational design are used to select the conditions for observation. Balanced experimental data that covers all the influencing factors of experiments can be obtianed for further processing, such as training set for machine learning models. Finally, a software based on the proposed method is developed for designing experiments with covering influencing factors a certain number of times.
    Matched MeSH terms: Algorithms
  13. Mohammad Lutfi Othman, Mahmood Khalid Hadi, Noor Izzri Abdul Wahab
    MyJurnal
    Special Protection Schemes (SPSs), are corrective action schemes that are designed to protect power
    systems against severe contingency conditions. In planning of SPSs, protecting transmission network from
    overloading issue due to critical situations has become a serious challenge which needs to be taken into
    account. In this paper, a Special Protection and Control Scheme (SPCS) based on Differential Evolution
    (DE) algorithm for optimal generation rescheduling has been applied to mitigate the transmission line
    overloading in system contingency conditions. The N-1 contingency has been performed for different
    single line outages under base and increased load in which generation rescheduling strategy has been
    undertaken to overcome the overloading problem. Simulation results are presented for both pre-and
    post system emergency situations. The IEEE 30-bus test system was utilised in order to validate the
    effectiveness of the proposed method.
    Matched MeSH terms: Algorithms
  14. Song W, Suandi SA
    Sensors (Basel), 2023 Jan 09;23(2).
    PMID: 36679542 DOI: 10.3390/s23020749
    Recognizing traffic signs is an essential component of intelligent driving systems' environment perception technology. In real-world applications, traffic sign recognition is easily influenced by variables such as light intensity, extreme weather, and distance, which increase the safety risks associated with intelligent vehicles. A Chinese traffic sign detection algorithm based on YOLOv4-tiny is proposed to overcome these challenges. An improved lightweight BECA attention mechanism module was added to the backbone feature extraction network, and an improved dense SPP network was added to the enhanced feature extraction network. A yolo detection layer was added to the detection layer, and k-means++ clustering was used to obtain prior boxes that were better suited for traffic sign detection. The improved algorithm, TSR-YOLO, was tested and assessed with the CCTSDB2021 dataset and showed a detection accuracy of 96.62%, a recall rate of 79.73%, an F-1 Score of 87.37%, and a mAP value of 92.77%, which outperformed the original YOLOv4-tiny network, and its FPS value remained around 81 f/s. Therefore, the proposed method can improve the accuracy of recognizing traffic signs in complex scenarios and can meet the real-time requirements of intelligent vehicles for traffic sign recognition tasks.
    Matched MeSH terms: Algorithms
  15. Mandala S, Di TC
    J Med Biol Eng, 2017;37(4):441-453.
    PMID: 28867990 DOI: 10.1007/s40846-017-0281-x
    Many studies showed electrocardiogram (ECG) parameters are useful for predicting fatal ventricular arrhythmias (VAs). However, the studies have several shortcomings. Firstly, all studies lack of effective way to present behavior of various ECG parameters prior to the occurrence of the VAs. Secondly, they also lack of discussion on how to consider the parameters as abnormal. Thirdly, the reports do not include approaches to increase the detection accuracy for the abnormal patterns. The purpose of this study is to address the aforementioned issues. It identifies ten ECG parameters from various sources and then presents a review based on the identified parameters. From the review, it has been found that the increased risk of VAs can be represented by presence and certain abnormal range of the parameters. The variation of parameters range could be influenced by either gender or age. This study also has discovered the facts that averaging, outliers elimination and morphology detection algorithms can contribute to the detection accuracy.
    Matched MeSH terms: Algorithms
  16. Zhang H, Feng Y, Wang L
    Comput Intell Neurosci, 2022;2022:3948221.
    PMID: 35909867 DOI: 10.1155/2022/3948221
    With the rapid development of image video and tourism economy, tourism economic data are gradually becoming big data. Therefore, how to schedule between data has become a hot topic. This paper first summarizes the research results on image video, cloud computing, tourism economy, and data scheduling algorithms. Secondly, the origin, structure, development, and service types of cloud computing are expounded in detail. And in order to solve the problem of tourism economic data scheduling, this paper regards the completion time and cross-node transmission delay as the constraints of tourism economic data scheduling. The constraint model of data scheduling is established, the fitness function is improved on the basis of an artificial immune algorithm combined with the constraint model, and the directional recombination of excellent antibodies is carried out by using the advantages of gene recombination so as to obtain the optimal solution to the problem more appropriately. When the resource node scale is 100, the response time of EDSA is 107.92 seconds.
    Matched MeSH terms: Algorithms
  17. Asteris PG, Gandomi AH, Armaghani DJ, Tsoukalas MZ, Gavriilaki E, Gerber G, et al.
    J Cell Mol Med, 2024 Feb;28(4):e18105.
    PMID: 38339761 DOI: 10.1111/jcmm.18105
    Complement inhibition has shown promise in various disorders, including COVID-19. A prediction tool including complement genetic variants is vital. This study aims to identify crucial complement-related variants and determine an optimal pattern for accurate disease outcome prediction. Genetic data from 204 COVID-19 patients hospitalized between April 2020 and April 2021 at three referral centres were analysed using an artificial intelligence-based algorithm to predict disease outcome (ICU vs. non-ICU admission). A recently introduced alpha-index identified the 30 most predictive genetic variants. DERGA algorithm, which employs multiple classification algorithms, determined the optimal pattern of these key variants, resulting in 97% accuracy for predicting disease outcome. Individual variations ranged from 40 to 161 variants per patient, with 977 total variants detected. This study demonstrates the utility of alpha-index in ranking a substantial number of genetic variants. This approach enables the implementation of well-established classification algorithms that effectively determine the relevance of genetic variants in predicting outcomes with high accuracy.
    Matched MeSH terms: Algorithms
  18. Abdi A, Idris N, Alguliyev RM, Aliguliyev RM
    PLoS One, 2016;11(1):e0145809.
    PMID: 26735139 DOI: 10.1371/journal.pone.0145809
    Summarization is a process to select important information from a source text. Summarizing strategies are the core cognitive processes in summarization activity. Since summarization can be important as a tool to improve comprehension, it has attracted interest of teachers for teaching summary writing through direct instruction. To do this, they need to review and assess the students' summaries and these tasks are very time-consuming. Thus, a computer-assisted assessment can be used to help teachers to conduct this task more effectively.
    Matched MeSH terms: Algorithms*
  19. Karimi A, Zarafshan F, Al-Haddad SA, Ramli AR
    ScientificWorldJournal, 2014;2014:672832.
    PMID: 25386613 DOI: 10.1155/2014/672832
    Voting is an important operation in multichannel computation paradigm and realization of ultrareliable and real-time control systems that arbitrates among the results of N redundant variants. These systems include N-modular redundant (NMR) hardware systems and diversely designed software systems based on N-version programming (NVP). Depending on the characteristics of the application and the type of selected voter, the voting algorithms can be implemented for either hardware or software systems. In this paper, a novel voting algorithm is introduced for real-time fault-tolerant control systems, appropriate for applications in which N is large. Then, its behavior has been software implemented in different scenarios of error-injection on the system inputs. The results of analyzed evaluations through plots and statistical computations have demonstrated that this novel algorithm does not have the limitations of some popular voting algorithms such as median and weighted; moreover, it is able to significantly increase the reliability and availability of the system in the best case to 2489.7% and 626.74%, respectively, and in the worst case to 3.84% and 1.55%, respectively.
    Matched MeSH terms: Algorithms*
  20. Akbari M, Manesh MR, El-Saleh AA, Reza AW
    ScientificWorldJournal, 2014;2014:128195.
    PMID: 25045725 DOI: 10.1155/2014/128195
    In diversity combining at the receiver, the output signal-to-noise ratio (SNR) is often maximized by using the maximal ratio combining (MRC) provided that the channel is perfectly estimated at the receiver. However, channel estimation is rarely perfect in practice, which results in deteriorating the system performance. In this paper, an imperialistic competitive algorithm (ICA) is proposed and compared with two other evolutionary based algorithms, namely, particle swarm optimization (PSO) and genetic algorithm (GA), for diversity combining of signals travelling across the imperfect channels. The proposed algorithm adjusts the combiner weights of the received signal components in such a way that maximizes the SNR and minimizes the bit error rate (BER). The results indicate that the proposed method eliminates the need of channel estimation and can outperform the conventional diversity combining methods.
    Matched MeSH terms: Algorithms*
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links