We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 101-120 of 10,000 results
  1. Automated abnormalities detection in mammography using deep learning

    Breast cancer is the second most prevalent cause of cancer death and the most common malignancy among women, posing a life-threatening risk....

    Ghada M. El-Banby, Nourhan S. Salem, ... Essam N. Abd El-Azziz in Complex & Intelligent Systems
    Article Open access 11 July 2024
  2. Microscopic Damage Analysis of Structural Strength and Fatigue Life of Rotor of Automotive Drive Motor Under Cyclic Operating Conditions

    In order to study the structural strength change of automotive drive motor rotor under different cyclic conditions, and the fatigue life change after...

    Yan Zhang, Zijun Ma, ... Zhou Yuan in Journal of Electrical Engineering & Technology
    Article 11 July 2024
  3. Short-term wind power prediction based on ICEEMDAN-Correlation reconstruction and BWO-BiLSTM

    To solve the problems of high volatility and low prediction accuracy of wind farm output power, this paper proposes a short-term wind power...

    **gxia Liu, Yanqi Wu, ... Peihong Yang in Electrical Engineering
    Article 11 July 2024
  4. Advanced lower order harmonic torque suppression by P-PWM in high-performance scalar-controlled IM drives

    VSI-operated IM drives at low switching per fundamental frequency in a quarter cycle ( N s ) are highly prone to lower order harmonic torque in addition...

    Shivam Yadav, Sanjeev Kumar Mallik, Ambarisha Mishra in Journal of Power Electronics
    Article 11 July 2024
  5. UMGAN: multi-scale graph attention network for grid parameter identification

    Parameter identification of transmission lines plays a crucial role in power systems, and many deep learning methods have been continuously applied...

    Gang Zou, Min **a, ... Jun Liu in Electrical Engineering
    Article 11 July 2024
  6. Study of SVPWM control algorithm with voltage balancing based on simplified vector for cascaded H-bridge energy storage converters

    DC-side voltage balancing is a critical problem to be solved for cascaded H-bridge energy storage converters. Aiming at inner-phase voltage balancing...

    Zhan Liu, Daopeng Ren, ... Fei Wang in Electrical Engineering
    Article 11 July 2024
  7. Fuzzy nominal sets

    In this paper, we use two approaches to define the concept of fuzzy nominal sets: classic and universal algebraic. We see that the fuzzy nominal sets...

    N. S. Razmara, M. Haddadi, Kh. Keshvardoost in Soft Computing
    Article 11 July 2024
  8. An artificial bee colony algorithm for the minimum edge-dilation K-center problem

    This paper studies the minimum edge-dilation K -center (MEDKC) problem for edge-weighted, undirected and connected graphs. This problem which is ...

    Manisha Israni, Shyam Sundar in Soft Computing
    Article 11 July 2024
  9. Some New Concepts of Interval-Valued Picture Fuzzy Graphs and Their Application Toward the Selection Criteria

    Interval-valued picture fuzzy sets (IVPFSs) being the most advanced form of fuzzy sets (FSs) has more capacity to analyze the network state more...

    Yongsheng Rao, Ruxian Chen, ... Alishba Zahid in International Journal of Fuzzy Systems
    Article 11 July 2024
  10. A generalization of \(k\times j\)-rough Heyting algebras

    Gustavo Pelaitay, Nohelia Paloma Ramos in Soft Computing
    Article 11 July 2024
  11. A Multi-strategy Improved Grasshopper Optimization Algorithm for Solving Global Optimization and Engineering Problems

    This paper presents a multi-strategy improved grasshopper optimization algorithm (MSIGOA), which aims to address the shortcomings of the grasshopper...

    Wei Liu, Wenlv Yan, ... Tengteng Ren in International Journal of Computational Intelligence Systems
    Article Open access 11 July 2024
  12. Prototype as query for few shot semantic segmentation

    Few-shot Semantic Segmentation (FSS) was proposed to segment unseen classes in a query image, referring to only a few annotated examples named...

    Leilei Cao, Yibo Guo, ... Qiangguo ** in Complex & Intelligent Systems
    Article Open access 10 July 2024
  13. Strong s-box construction approach based on Josephus problem

    There are two basic requirements for symmetric encryption algorithms. The first of these is diffusion. The second and most important is confusion. In...

    Fırat Artuğer in Soft Computing
    Article Open access 10 July 2024
  14. Performance evaluation of PI and FLC controller for shunt active power filters

    Shunt active power filters (SAPF) play a vital role in power systems. Integration of renewable energy sources and electrical vehicle (EV) charging...

    Arulkumar Annamalaichamy, Prince Winston David, ... Ilhami Colak in Electrical Engineering
    Article 10 July 2024
  15. Intrusion detection system and fuzzy ant colony optimization based secured routing in wireless sensor networks

    Recent advances in wireless sensor networks (WSNs) have brought the sensor based monitoring developments to the surface in many applications. In such...

    Shalini Subramani, M. Selvi in Soft Computing
    Article 10 July 2024
  16. New characterizations of partial orders induced by a class of non-divisible t-norms

    In this article, we deal with the algebraic structures of the partial orders induced by non-divisible t-norms. We first give a condition for the...

    Zhi-qiang Liu, Xue-** Wang in Soft Computing
    Article 10 July 2024
  17. Generating fuzzy sets using rearranged nested family and the mathematical formula in decomposition theorem

    The purpose of this paper is to propose a mechanical procedure to generate fuzzy data from the observed real number data. The observed data may be...

    Hsien-Chung Wu in Soft Computing
    Article 10 July 2024
  18. On join-complete implication algebras

    In this paper, first, we consider an algebra that has a binary operation and a join of arbitrary nonempty subset. A lattice implication algebra is a...

    Yong Ho Yon, Şule Ayar Özbal in Soft Computing
    Article Open access 10 July 2024
  19. Predicting the potential toxicity of the metal oxide nanoparticles using machine learning algorithms

    Over the years, machine learning (ML) algorithms have proven their ability to make reliable predictions of the toxicity of metal oxide nanoparticles....

    Gehad Ismail Sayed, Heba Alshater, Aboul Ella Hassanien in Soft Computing
    Article Open access 10 July 2024
Did you find what you were looking for? Share feedback.