-
18761
Complex System of Vertical Baduanjin Lifting Motion Sensing Recognition under the Background of Big Data
Published 2021-01-01“…In order to carry out related action recognition research on the lifting action of vertical Baduanjin, this paper uses sensor technology to collect the motion video image of vertical Baduanjin based on the background of big data and uses action recognition technology and related algorithms to obtain the action. Recognize the video image to obtain the data, get the acceleration, angular velocity, and EMG data, and count the end time and duration according to the change of the action. …”
Get full text
Article -
18762
Optimizing Multilayer Perceptron with Cost-Sensitive Learning for Addressing Class Imbalance in Credit Card Fraud Detection
Published 2024-08-01“…This imbalance often leads to machine learning algorithms overlooking fraudulent transactions, resulting in suboptimal performance. …”
Get full text
Article -
18763
Webometric as diagnostic tools of digital sociology: contents, purpose, usage experience
Published 2020-05-01“…The rules and conditions for effective use of Webometrics have been substantiated, based on the usage of content analysis methods and procedures for the development of its forms; to include usability and visibility in the analysis of technological characteristics of Internet portals; to make the research parameters used reliable by separating them from official documents of state policy and corporate strategies; to combine traditional methods of fixing primary data and computer algorithms. A specific webometric technique has been revealed in detail, which implies fixing the formal status of the Internet source under study, the content parameters of information representation of information about the implementation of state policy on the example of working with young people, the availability of services, as well as indicators of the site’s technology and ease of access to it by the population. …”
Get full text
Article -
18764
Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks
Published 2023-02-01“…With the characteristics of large space-time and satellite-ground network integration, the space integrated ground network has attracted much attention.Satellites can not only be used as emergency communication supplements, but also serve as air stations to expand the coverage of terrestrial networks, occupying an important position in both military and civilian scenarios.The entity authentication and key negotiation mechanism can prevent the malicious entities from joining the integrated network to steal users’ privacy, and guarantee network information security.In view of the characteristics of the high satellite-ground transmission delays, exposed links, limited processing capability and dynamic topology of the integrated network, a lightweight authentication scheme between satellites and ground suitable for double-layer satellite network was proposed to achieve a secure satellite networking architecture with session keys to protect data transmission.The scheme was based on symmetric cryptographic system, using lightweight cryptographic algorithms and introducing group key and hierarchical management mechanisms.The proposed scheme included three parts: inter-satellite authentication for geostationary earth orbit satellites, layer and inter-satellite authentication for same low earth orbit, and inter-satellite authentication for adjacent low earth orbit satellites.The group key and hierarchical management mechanism improved the efficiency of inter-group information transfer, reduced the authentication pressure on the ground control center, and enhanced the authentication security strength by realizing double verification in the three-entities authentication protocol.Different from the previous single scene authentication, the proposed authentication protocol took the form of multiplexing authentication parameters, which can realize the authentication requirements of dual scenes in one process.The results of Scyther, a protocol formal security simulation tool, show that the proposed scheme achieves secure access authentication.Compared with existing protocols, the proposed scheme improves authentication security and reduces communication and computational overhead.…”
Get full text
Article -
18765
Parameter-Efficient Vehicle Trajectory Prediction Based on Attention-Enhanced Liquid Structural Neural Model
Published 2024-12-01“…Trajectory prediction is a critical task to anticipate the future positions of surrounding vehicles. However, existing algorithms, such as LSTM-based and attention-based models, face challenges of high computational complexity, large parameter sizes, and limited ability to efficiently capture both temporal dependencies and spatial interactions in dynamic traffic scenarios. …”
Get full text
Article -
18766
Energy Use and Demand Prediction Using Time-Series Deep Learning Forecasting Techniques: Application for a University Campus
Published 2025-01-01“…The window size six performs better for most time-series algorithms and hyperparameter combinations.…”
Get full text
Article -
18767
Microcephalic osteodysplastic primordial dwarfism type II in four Indian children with PCNT variants
Published 2025-01-01“…Data were analyzed using standard bioinformatic algorithms and possible causal variants identified. …”
Get full text
Article -
18768
Dual-Band Power Divider with Wide Suppression Band
Published 2025-02-01“…The weights of each neuron are obtained using particle swarm optimization algorithms. The proposed neural network model has accurate results, and the mean relative error of the train and test data for both outputs is <0.1 , which validates the accurate results of the proposed model. …”
Get full text
Article -
18769
Multivariate analysis of long-term climate data in connection with yield, earliness and the problem of global warming
Published 2024-04-01“…This optimization should apply algorithms for smart farming and take into consideration possible climate variations. …”
Get full text
Article -
18770
Chronic hepatitis C course at elderly and therapeutic approach
Published 2011-02-01“…This complication requires careful monitoring of hemoglobin and hematocrit level during the whole period of treatment and, if necessary, decline of drug doses according to established algorithms.Conclusion. Elderly age is not an absolute contraindication for antiviral treatment. …”
Get full text
Article -
18771
Innovative approaches in marketing for the development of the tourism industry
Published 2024-06-01“…For instance, AI-powered chatbots and virtual assistants provide real-time customer support, while machine learning algorithms analyze booking patterns to offer personalized travel recommendations. …”
Get full text
Article -
18772
Aggregate Queries in Wireless Sensor Networks
Published 2012-09-01“…Existing representative in-network aggregate query processing techniques propose routing algorithms and data structures for processing aggregate queries. …”
Get full text
Article -
18773
Machine Learning Prediction of Peripheral Mononuclear Cells Based on Interactomic Hub Genes in Periodontitis and Rheumatoid Arthritis
Published 2024-07-01“…This study aimed to predict peripheral mononuclear cells based on interactomic hub genes in PD and RA by machine learning algorithms. Method: Gene Expression Omnibus datasets were used to identify the genes linked to RA (GSE224842) and PD (GSE156993). …”
Get full text
Article -
18774
Intrusion detection system for V2X communication in VANET networks using machine learning-based cryptographic protocols
Published 2024-12-01“…Using machine learning algorithms, it is feasible to identify and address security risks in real-time. …”
Get full text
Article -
18775
ACD-ML: Advanced CKD detection using machine learning: A tri-phase ensemble and multi-layered stacking and blending approach
Published 2025-01-01“…This study aims to leverage machine learning algorithms and ensemble models for early detection of CKD using the “Chronic Kidney Disease (CKD15)” and “Risk Factor Prediction of Chronic Kidney Disease (CKD21)” datasets from the UCI Machine Learning Repository. …”
Get full text
Article -
18776
STURM-Flood: a curated dataset for deep learning-based flood extent mapping leveraging Sentinel-1 and Sentinel-2 imagery
Published 2025-02-01“…Timely assessment and mapping of inundations are crucial for preventive and emergency measures, driving the demand for curated global geospatial data to implement novel algorithms. This study introduces the STURM-Flood dataset, a high-quality, open-access, and DL-ready resource for flood extent mapping using Sentinel-1 and Sentinel-2 satellite imagery, combined with ground-truth data from the Copernicus Emergency Management Service. …”
Get full text
Article -
18777
Sleep stages classification based on feature extraction from music of brain
Published 2025-01-01“…A total of 19 features are extracted from the sequence of notes and fed into feature reduction algorithms; the selected features are applied to a two-stage classification structure: 1) the classification of 5 classes (merging S1 and REM-S2-S3-S4-W) is made with an accuracy of 89.5 % (Cap sleep database), 85.9 % (Sleep-EDF database), 86.5 % (Sleep-EDF expanded database), and 2) the classification of 2 classes (S1 vs. …”
Get full text
Article -
18778
An Overview of Reviews as a Trend Maker in the Field
Published 2020-03-01“…The authors consider the methodology basics of reviews as a prospective type of scholarly publications, their taxonomy and most popular review types (narrative reviews, bibliometric reviews, systematic reviews, reviews of reviews, scoping reviews, meta-analysis), as well as specific features of procedures and algorithms for conducting reviews. Top 100 of highly cited reviews on higher education from 2010 to 2019 published in high-ranking peer-reviewed journals and indexed in the international database Scopus is based on the traditional methodology that aims to sample the most essential and influential publications of the kind in a well-represented and unbiased way and to subject the sampled reviews to content, bibliometric, and linguistic analyses. based on the inclusion criteria, keywords and methods of objective selection and sampling of the publications to be reviewed and analyzed, the authors singled out the essential thematic clusters in Top-100 list (educational technologies, university, student, teaching, learning, assessment, etc.) and determined the key directions in the review field of study. …”
Get full text
Article -
18779
Machine learning assisted classification RASAR modeling for the nephrotoxicity potential of a curated set of orally active drugs
Published 2025-01-01“…We initially developed ML models using nine different algorithms separately on topological descriptors (referred to as simply “descriptors” in the subsequent sections of the manuscript) and MACCS fingerprints (referred to as “fingerprints” in the subsequent sections of the manuscript), thus generating 18 different ML QSAR models. …”
Get full text
Article -
18780
Cerebral compliance assessment from intracranial pressure waveform analysis: Is a positional shift-related increase in intracranial pressure predictable?
Published 2024-01-01“…Adding more features to the input set and/or using nonlinear machine learning algorithms did not significantly improve classification performance. …”
Get full text
Article