Showing 18,761 - 18,780 results of 19,511 for search '"Algorithm"', query time: 0.12s Refine Results
  1. 18761

    Complex System of Vertical Baduanjin Lifting Motion Sensing Recognition under the Background of Big Data by Yan Zhang, M. M. Kamruzzaman, Lu Feng

    Published 2021-01-01
    “…In order to carry out related action recognition research on the lifting action of vertical Baduanjin, this paper uses sensor technology to collect the motion video image of vertical Baduanjin based on the background of big data and uses action recognition technology and related algorithms to obtain the action. Recognize the video image to obtain the data, get the acceleration, angular velocity, and EMG data, and count the end time and duration according to the change of the action. …”
    Get full text
    Article
  2. 18762

    Optimizing Multilayer Perceptron with Cost-Sensitive Learning for Addressing Class Imbalance in Credit Card Fraud Detection by Wowon Priatna, Hindriyanto Dwi Purnomo, Ade Iriani, Irwan Sembiring, Theophilus Wellem

    Published 2024-08-01
    “…This imbalance often leads to machine learning algorithms overlooking fraudulent transactions, resulting in suboptimal performance. …”
    Get full text
    Article
  3. 18763

    Webometric as diagnostic tools of digital sociology: contents, purpose, usage experience by M. V. Kibakin

    Published 2020-05-01
    “…The rules and conditions for effective use of Webometrics have been substantiated, based on the usage of content analysis methods and procedures for the development of its forms; to include usability and visibility in the analysis of technological characteristics of Internet portals; to make the research parameters used reliable by separating them from official documents of state policy and corporate strategies; to combine traditional methods of fixing primary data and computer algorithms. A specific webometric technique has been revealed in detail, which implies fixing the formal status of the Internet source under study, the content parameters of information representation of information about the implementation of state policy on the example of working with young people, the availability of services, as well as indicators of the site’s technology and ease of access to it by the population. …”
    Get full text
    Article
  4. 18764

    Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks by Jin CAO, Xiaoping SHI, Ruhui MA, Hui LI

    Published 2023-02-01
    “…With the characteristics of large space-time and satellite-ground network integration, the space integrated ground network has attracted much attention.Satellites can not only be used as emergency communication supplements, but also serve as air stations to expand the coverage of terrestrial networks, occupying an important position in both military and civilian scenarios.The entity authentication and key negotiation mechanism can prevent the malicious entities from joining the integrated network to steal users’ privacy, and guarantee network information security.In view of the characteristics of the high satellite-ground transmission delays, exposed links, limited processing capability and dynamic topology of the integrated network, a lightweight authentication scheme between satellites and ground suitable for double-layer satellite network was proposed to achieve a secure satellite networking architecture with session keys to protect data transmission.The scheme was based on symmetric cryptographic system, using lightweight cryptographic algorithms and introducing group key and hierarchical management mechanisms.The proposed scheme included three parts: inter-satellite authentication for geostationary earth orbit satellites, layer and inter-satellite authentication for same low earth orbit, and inter-satellite authentication for adjacent low earth orbit satellites.The group key and hierarchical management mechanism improved the efficiency of inter-group information transfer, reduced the authentication pressure on the ground control center, and enhanced the authentication security strength by realizing double verification in the three-entities authentication protocol.Different from the previous single scene authentication, the proposed authentication protocol took the form of multiplexing authentication parameters, which can realize the authentication requirements of dual scenes in one process.The results of Scyther, a protocol formal security simulation tool, show that the proposed scheme achieves secure access authentication.Compared with existing protocols, the proposed scheme improves authentication security and reduces communication and computational overhead.…”
    Get full text
    Article
  5. 18765

    Parameter-Efficient Vehicle Trajectory Prediction Based on Attention-Enhanced Liquid Structural Neural Model by Ruochen Wang, Yue Chen, Renkai Ding, Qing Ye

    Published 2024-12-01
    “…Trajectory prediction is a critical task to anticipate the future positions of surrounding vehicles. However, existing algorithms, such as LSTM-based and attention-based models, face challenges of high computational complexity, large parameter sizes, and limited ability to efficiently capture both temporal dependencies and spatial interactions in dynamic traffic scenarios. …”
    Get full text
    Article
  6. 18766

    Energy Use and Demand Prediction Using Time-Series Deep Learning Forecasting Techniques: Application for a University Campus by Bivin Pradeep, Parag Kulkarni, Farman Ullah, Abderrahmane Lakas

    Published 2025-01-01
    “…The window size six performs better for most time-series algorithms and hyperparameter combinations.…”
    Get full text
    Article
  7. 18767

    Microcephalic osteodysplastic primordial dwarfism type II in four Indian children with PCNT variants by Amit Singh, Mahak Garg, Mohammed Shariq, Preeti Khetarpal, Inusha Panigrahi

    Published 2025-01-01
    “…Data were analyzed using standard bioinformatic algorithms and possible causal variants identified. …”
    Get full text
    Article
  8. 18768

    Dual-Band Power Divider with Wide Suppression Band by Salman Karimi, Golshan Mohamadpour, Saeed Roshani

    Published 2025-02-01
    “…The weights of each neuron are obtained using particle swarm optimization algorithms. The proposed neural network model has accurate results, and the mean relative error of the train and test data for both outputs is <0.1 , which validates the accurate results of the proposed model. …”
    Get full text
    Article
  9. 18769

    Multivariate analysis of long-term climate data in connection with yield, earliness and the problem of global warming by V. M. Efimov, D. V. Rechkin, N. P. Goncharov

    Published 2024-04-01
    “…This optimization should apply algorithms for smart farming and take into consideration possible climate variations.  …”
    Get full text
    Article
  10. 18770

    Chronic hepatitis C course at elderly and therapeutic approach by M. V. Mayevskaya, M. A. Morozova

    Published 2011-02-01
    “…This complication requires careful monitoring of hemoglobin and hematocrit level during the whole period of treatment and, if necessary, decline of drug doses according to established algorithms.Conclusion. Elderly age is not an absolute contraindication for antiviral treatment. …”
    Get full text
    Article
  11. 18771

    Innovative approaches in marketing for the development of the tourism industry by Yuliia Stasiuk, Andrii Kobchenko

    Published 2024-06-01
    “…For instance, AI-powered chatbots and virtual assistants provide real-time customer support, while machine learning algorithms analyze booking patterns to offer personalized travel recommendations. …”
    Get full text
    Article
  12. 18772

    Aggregate Queries in Wireless Sensor Networks by Jeong-Joon Kim, In-Su Shin, Yan-Sheng Zhang, Dong-Oh Kim, Ki-Joon Han

    Published 2012-09-01
    “…Existing representative in-network aggregate query processing techniques propose routing algorithms and data structures for processing aggregate queries. …”
    Get full text
    Article
  13. 18773

    Machine Learning Prediction of Peripheral Mononuclear Cells Based on Interactomic Hub Genes in Periodontitis and Rheumatoid Arthritis by Sri Shivasankari Thilagar, Pradeep Kumar Rathinavelu, Pradeep Kumar Yadalam

    Published 2024-07-01
    “…This study aimed to predict peripheral mononuclear cells based on interactomic hub genes in PD and RA by machine learning algorithms. Method: Gene Expression Omnibus datasets were used to identify the genes linked to RA (GSE224842) and PD (GSE156993). …”
    Get full text
    Article
  14. 18774

    Intrusion detection system for V2X communication in VANET networks using machine learning-based cryptographic protocols by Thiruppathy Kesavan Venkatasamy, Md. Jakir Hossen, Gopi Ramasamy, Nor Hidayati Binti Abdul Aziz

    Published 2024-12-01
    “…Using machine learning algorithms, it is feasible to identify and address security risks in real-time. …”
    Get full text
    Article
  15. 18775

    ACD-ML: Advanced CKD detection using machine learning: A tri-phase ensemble and multi-layered stacking and blending approach by Mir Faiyaz Hossain, Shajreen Tabassum Diya, Riasat Khan

    Published 2025-01-01
    “…This study aims to leverage machine learning algorithms and ensemble models for early detection of CKD using the “Chronic Kidney Disease (CKD15)” and “Risk Factor Prediction of Chronic Kidney Disease (CKD21)” datasets from the UCI Machine Learning Repository. …”
    Get full text
    Article
  16. 18776

    STURM-Flood: a curated dataset for deep learning-based flood extent mapping leveraging Sentinel-1 and Sentinel-2 imagery by Nicla Notarangelo, Charlotte Wirion, Frankwin van Winsen

    Published 2025-02-01
    “…Timely assessment and mapping of inundations are crucial for preventive and emergency measures, driving the demand for curated global geospatial data to implement novel algorithms. This study introduces the STURM-Flood dataset, a high-quality, open-access, and DL-ready resource for flood extent mapping using Sentinel-1 and Sentinel-2 satellite imagery, combined with ground-truth data from the Copernicus Emergency Management Service. …”
    Get full text
    Article
  17. 18777

    Sleep stages classification based on feature extraction from music of brain by Hamidreza Jalali, Majid Pouladian, Ali Motie Nasrabadi, Azin Movahed

    Published 2025-01-01
    “…A total of 19 features are extracted from the sequence of notes and fed into feature reduction algorithms; the selected features are applied to a two-stage classification structure: 1) the classification of 5 classes (merging S1 and REM-S2-S3-S4-W) is made with an accuracy of 89.5 % (Cap sleep database), 85.9 % (Sleep-EDF database), 86.5 % (Sleep-EDF expanded database), and 2) the classification of 2 classes (S1 vs. …”
    Get full text
    Article
  18. 18778

    An Overview of Reviews as a Trend Maker in the Field by L. K. Raitskaya, E. V. Tikhonova

    Published 2020-03-01
    “…The authors consider the methodology basics of reviews as a prospective type of scholarly publications, their taxonomy and most popular review types (narrative reviews, bibliometric reviews, systematic reviews, reviews of reviews, scoping reviews, meta-analysis), as well as specific features of procedures and algorithms for conducting reviews. Top 100 of highly cited reviews on higher education from 2010 to 2019 published in high-ranking peer-reviewed journals and indexed in the international database Scopus is based on the traditional methodology that aims to sample the most essential and influential publications of the kind in a well-represented and unbiased way and to subject the sampled reviews to content, bibliometric, and linguistic analyses. based on the inclusion criteria, keywords and methods of objective selection and sampling of the publications to be reviewed and analyzed, the authors singled out the essential thematic clusters in Top-100 list (educational technologies, university, student, teaching, learning, assessment, etc.) and determined the key directions in the review field of study. …”
    Get full text
    Article
  19. 18779

    Machine learning assisted classification RASAR modeling for the nephrotoxicity potential of a curated set of orally active drugs by Arkaprava Banerjee, Kunal Roy

    Published 2025-01-01
    “…We initially developed ML models using nine different algorithms separately on topological descriptors (referred to as simply “descriptors” in the subsequent sections of the manuscript) and MACCS fingerprints (referred to as “fingerprints” in the subsequent sections of the manuscript), thus generating 18 different ML QSAR models. …”
    Get full text
    Article
  20. 18780