Showing 11,921 - 11,940 results of 19,511 for search '"algorithm"', query time: 0.09s Refine Results
  1. 11921

    Gene Coexpression Network Comparison via Persistent Homology by Ali Nabi Duman, Harun Pirim

    Published 2018-01-01
    “…We quantify multiscale topological features of each network using persistent homology and apply a hierarchical clustering algorithm to the distance matrix whose entries are pairwise bottleneck distance between the networks. …”
    Get full text
    Article
  2. 11922

    Light-weighted vehicle detection network based on improved YOLOv3-tiny by Pingshu Ge, Lie Guo, Danni He, Liang Huang

    Published 2022-03-01
    “…Based on YOLOv3-tiny, the feature extraction was realized using light-weighted networks such as DarkNet-19 and ResNet-18 to improve accuracy. The K -means algorithm was used to cluster nine anchor boxes to achieve multi-scale prediction, especially for small targets. …”
    Get full text
    Article
  3. 11923

    Gradient Based Multipath Reliable Transmission Strategy with Fault Tolerance for Wireless Sensor Networks by Hongbing Li, Qingyu Xiong, Weiren Shi, Cheng Zeng, Min Fan

    Published 2014-04-01
    “…Firstly nonuniform clustering topology is established in nonequal clustering probability based on twice K -means algorithm. Then it calculates the comprehensive measurements (CM) of cluster heads by the quality evaluation function and establishes the contour lines. …”
    Get full text
    Article
  4. 11924

    COMMUNITY-ACQUIRED PNEUMONIA COMPLICATED BY SEPSIS CAUSED BY KLEBSIELLA PNEUMONIAE: A CASE REPORT by A.V. Lavrenko

    Published 2017-12-01
    “…Shown the diagnostic algorithm, which is acceptable both in the presence and in the absence of laboratory verification of the disease. …”
    Get full text
    Article
  5. 11925

    Application of artificial neural network in the modeling and optimization of volatile acid from anaerobic digestion of biomass by Noohi Ali

    Published 2024-01-01
    “…Artificial neural networks (ANNs) and Brute Force algorithms (BF) are two of the most common and simplest techniques for modeling non-linear problems and linear search for an element. …”
    Get full text
    Article
  6. 11926

    Effective Method for Analysis of Electrothermally Coupled Fields by Jacek Korytkowski, Stanisław Wincenciak

    Published 1995-01-01
    “…The main idea of the proposed method is the use of an automatic time step selection algorithm to solve heat conduction equations. The influence of the assumed accuracy value on the final result of the nonlinear calculation is discussed. …”
    Get full text
    Article
  7. 11927

    Visual Localization of an Internal Inspection Robot for the Oil-Immersed Transformer by Yingbin Feng, Yahui Kou, Yanju Liu

    Published 2023-01-01
    “…First, in order to solve the problem of blur, distortion, and low contrast of the image obtained by the camera in the deteriorated and discolored transformer oil, an image enhancement algorithm based on multiscale fusion is developed to provide a reliable data source for robot localization. …”
    Get full text
    Article
  8. 11928

    Appropriateness of Liver Biopsy by Thierry Poynard, Vlad Ratziu, Pierre Bedossa

    Published 2000-01-01
    “…Therefore, further evaluation of the appropriateness of liver biopsy in the practical algorithm of such diseases is needed.…”
    Get full text
    Article
  9. 11929

    Research on intrusion detection method of marine meteorological sensor network based on anomalous behaviors by Xin SU, Tian TIAN, Gong Ziyang, Yiqing ZHOU

    Published 2023-07-01
    “…To deal with the abnormal data flow attacks faced by the marine meteorological sensor network (MMSN), analyze the security mechanism, and aim at the complex and huge network structure and the extremely imbalanced data flow in the nodes, the intrusion detection method of marine meteorological sensor network based on anomalous behaviors was studied, and intrusion detection system (IDS) was built.The imbalance of dataset was considered emphatically, and the effective data generation was realized by using depth generation network CVAE-GAN to learn the distribution of minority classes in the dataset.OPTICS-based denoising algorithm was used to remove the noise points in majority classes and clarify the category boundaries.From the data perspective, the imbalance rate of dataset was reduced, the influence of imbalanced dataset on IDS was reduced, and the ability of classifier to identify minority classes of abnormal traffic was improved.The simulation results show that the proposed system can effectively identify all kinds of abnormal traffic, especially minority classes of them, and the imbalanced dataset processing method can significantly improve the detection ability of the classifier.…”
    Get full text
    Article
  10. 11930

    Optimization strategies in NOMA-based vehicle edge computing network by Jianbo DU, Nana XUE, Yan SUN, Jing JIANG, Shulei LI, Guangyue LU

    Published 2021-03-01
    “…Nowadays, vehicular network is confronting the challenges to support ubiquitous connections and vast computation-intensive and delay-sensitive smart service for numerous vehicles.To address these issues, non-orthogonal multiple access (NOMA) and mobile edge computing (MEC) are considered as two promising technologies by letting multiple vehicles to share the same wireless resources, and the powerful edge computing resources were adopted at the edge of vehicular wireless access network respectively.A NOMA-based vehicular edge computing network was studied.Under the condition of guaranteeing task processing delay, the joint optimization problem of task offloading, user clustering, computing resource allocation and transmission power control was proposed to minimize the task processing cost.Since the proposed problem was difficult to solve, it was divided into sub-problems, and a low-complexity and easy-to-implement method was proposed to solve it.The simulation results show that compared with other benchmark algorithms, the proposed algorithm performs well in minimizing costs.…”
    Get full text
    Article
  11. 11931

    Energy efficiency-based downlink resource allocation in cognitive small cell networks by Ya-nan JIA, Dian-wu YUE

    Published 2016-04-01
    “…Simulation results show the proposed algorithm can converge to a Nash equilibrium and effectively improve system resources utilization and EE in interference-limited communication environments.…”
    Get full text
    Article
  12. 11932

    Research on the Relationship between Human Resource Management Activities and Enterprise Performance Based on the Supervised Learning Model by Chan Sun, Xiaojuan Li

    Published 2021-01-01
    “…To this end, for the problem of multilabel text classification of recruitment information, this paper provides two algorithms for multilayer classification based on supported SVM. …”
    Get full text
    Article
  13. 11933

    South African Rheumatism and Arthritis Association 2024 updated guidelines for the management of rheumatoid arthritis by G Tarr, N Govind, M Seboka, E Gardiner, B Hodkinson

    Published 2024-09-01
    “…These guidelines recommend a treat-to-target strategy using a composite disease activity score at each visit, with frequent follow-up and escalation or switching of disease-modifying antirheumatic drug (DMARD) therapy until the goal of low disease activity is achieved. A stepwise algorithm for DMARD therapy is provided. Screening for comorbidities and vaccination is advised. …”
    Get full text
    Article
  14. 11934

    A Comparison of Gaussian Elimination and Cholesky Decomposition Methods in Solving a System of Linear Equations. by Niringiye, Richard

    Published 2024
    “…It is found out that Gaussian elimination is an algorithm in linear algebra for solving a system of linear equations and can also be used to find the rank of a matrix, to calculate the determinant of a matrix, and to calculate the inverse of an invertible square matrix Whereas Cholesky decomposition is a decomposition of a Hermitian, positive-definite matrix into the product of a lower triangular matrix and its conjugate transpose, which is useful for efficient numerical solutions.…”
    Get full text
    Thesis
  15. 11935

    A method for evaluating the accessibility of underground auxiliary transportation vehicles in coal mines based on multi feature fusion by Fan JIANG, Yifan LIU, Zhencai ZHU, Chaofan ZHANG, Gongbo ZHOU, Yuxing PENG

    Published 2024-12-01
    “…Progressive probability Hough transform and Catmull Rom spline curve with improved feature point selection are used to fit the straight track and curved track separately, forming a railway track detection method based on a switchable model; Secondly, based on the color attributes of coal mine underground tunnel wall pipelines, a pipeline feature detection strategy is constructed through HSV color space transformation, edge detection, and least squares fitting algorithms; Once again, a weighted fusion method based on pipeline and rail feature points is proposed to extract the centerline trajectory of auxiliary transportation vehicles, and to construct rules for generating safe passage areas for auxiliary transportation vehicles; Then, for the over-segmentation problem in the traditional watershed algorithm, two-dimensional edge and area feature extraction of static obstacles is carried out by using improved watershed segmentation based on markers and GraphCut algorithm, and a small-sample classification support vector mechanism is selected to build a pedestrian detection model based on the fusion of HOG (Histograms of Oriented Gradients)features and LBP(Local Binary Pattern) features for underground coal mine, so as to realize the comprehensive detection of dynamic and static obstacles in front of auxiliary transportation vehicles; Finally, the positional relationship between obstacles and safe passage area is judged by Euclidean distance to determine the obstacle invasion, and the results of auxiliary transportation vehicle passability assessment are obtained. …”
    Get full text
    Article
  16. 11936
  17. 11937
  18. 11938

    Komparasi Data Mining Naive Bayes dan Neural Network memprediksi Masa Studi Mahasiswa S1 by Azahari Azahari, Yulindawati Yulindawati, Dewi Rosita, Syamsuddin Mallala

    Published 2020-05-01
    “…By using the data mining algorithm Naive bayes and neural network, the student graduation in STMIK Widya Cipta Dharma (WiCiDa) can be predicted. …”
    Get full text
    Article
  19. 11939

    Easy Data Augmentation untuk Data yang Imbalance pada Konsultasi Kesehatan Daring by Anisa Nur Azizah, Misbachul Falach Asy'ari, Ifnu Wisma Dwi Prastya, Diana Purwitasari

    Published 2023-10-01
    “…We employ the Indonesian thesaurus for changing synonyms in the EDA and do empirical experiments on parameters required by the algorithm to obtain optimal results of text augmentation. …”
    Get full text
    Article
  20. 11940

    Teknologi Irigasi Cerdas pada Sistem Irigasi Drip dengan Algoritma Ant Colony Optimization by Abdul Haris, Nabilla Anggraini, Hengki Sikumbang

    Published 2022-12-01
    “…This algorithm can work dynamically and adaptively, so it is able to adjust to the land conditions and can be monitored in real time.  …”
    Get full text
    Article