Showing 14,481 - 14,500 results of 19,511 for search '"algorithm"', query time: 0.12s Refine Results
  1. 14481

    Structural Damage Identification through an Optimal Sensor Placement Approach and the Modal Strain Energy Based Index by Seyed Mohammad Seyedpoor, Reza Yahyapour, Ali Asghar Mofdi, Saeed Fallahian

    Published 2024-02-01
    “…In the first stage, a correlation function between the reconstructed mode shapes using the iterated improved reduced system (IRS) method and the complete mode shapes of a structure is defined and then the function is minimized via the binary differential evolution (BDE) algorithm to find the optimal sensor placement of the structure. …”
    Get full text
    Article
  2. 14482

    BucketAugment: Reinforced Domain Generalisation in Abdominal CT Segmentation by David Jozef Hresko, Peter Drotar

    Published 2024-01-01
    “…<italic>Methods:</italic> BucketAugment leverages principles from the Q-learning algorithm and employs validation loss to search for an optimal policy within a search space comprised of distributed stacks of 3D volumetric augmentations, termed &#x2018;buckets.…”
    Get full text
    Article
  3. 14483

    Analyses of poverty indicators using PPI methodology by T. Merkulova, D. Kosiashvili

    Published 2024-06-01
    “…Developing the model was carried out using machine learning methods in several steps: 1) data processing and statistical analyses; 2) selection of significant indicators by the classification model; 3) clustering by k-mean algorithm; 4) hierarchical clustering; 5) comparing outcomes of modeling and interpretation of results. …”
    Get full text
    Article
  4. 14484

    An Intelligent Ship Image/Video Detection and Classification Method with Improved Regressive Deep Convolutional Neural Network by Zhijian Huang, Bowen Sui, Jiayi Wen, Guohe Jiang

    Published 2020-01-01
    “…Third, a proper frame and scale suitable for ships are designed with a clustering algorithm to reduced 60% anchors. Last, the activation function is verified and optimized. …”
    Get full text
    Article
  5. 14485

    A reliable unmanned aerial vehicle multi-ship tracking method. by Guoqing Zhang, Jiandong Liu, Yongxiang Zhao, Wei Luo, Keyu Mei, Penggang Wang, Yubin Song, Xiaoliang Li

    Published 2025-01-01
    “…This article introduces a multi-object tracking system designed for unmanned aerial vehicles (UAVs), utilizing the YOLOv7 and Deep SORT algorithms for detection and tracking, respectively. …”
    Get full text
    Article
  6. 14486

    Remdesivir-induced severe hypoglycemia in an elderly man without diabetes: a case report by Yasunori Nagano, Hisae Aoki, Juri David, Naoko Iwahashi Kondo, Makimi Aizawa, Toshiyuki Sumita, Yuki Hamada, Yuki Yamamoto, Kaoru Yamada

    Published 2025-01-01
    “…After discontinuation, his BG levels normalized. The Naranjo algorithm, a tool for evaluating the causality of adverse drug reactions, classified the event as “Probable” (6 points). …”
    Get full text
    Article
  7. 14487

    Research Progress on High-Intermediate Frequency Extension Methods of SEA by Jintao Su, Ling Zheng, Zhaoxiang Deng, Yuhan Jiang

    Published 2019-01-01
    “…Neutron structure assembly and modeling, interval and mixed interval analysis, interval variable and mixed interval variable response are also described, so as to justify the development of a hybrid, large-scale interval algorithm. Finally, the engineering application of the above method is introduced, the limitations and shortcomings of SEA and intermediate frequency extension methods are reviewed, and unsolved problems are further discussed.…”
    Get full text
    Article
  8. 14488

    Identification of global main cable line shape parameters of suspension bridges based on local 3D point cloud by Yurui Li, Danhui Dan, Ruiyang Pan

    Published 2025-01-01
    “…Additionally, the Random Sample Consensus (RANSAC) algorithm, the ordinary least squares, and center-of-mass calibration are applied to identify and optimize the geometric parameters of the cross-section point cloud of the main cable. …”
    Get full text
    Article
  9. 14489

    A Sarsa(λ)-Based Control Model for Real-Time Traffic Light Coordination by Xiaoke Zhou, Fei Zhu, Quan Liu, Yuchen Fu, Wei Huang

    Published 2014-01-01
    “…Considering dynamic characteristics of the actual traffic environment, reinforcement learning algorithm based traffic control approach can be applied to get optimal scheduling policy. …”
    Get full text
    Article
  10. 14490

    Development of an Ensemble Intelligent Model for Assessing the Strength of Cemented Paste Backfill by Yuantian Sun, Guichen Li, Junfei Zhang, Junbo Sun, Jiahui Xu

    Published 2020-01-01
    “…The hyperparameters of the SVM model are tuned using the beetle antennae search (BAS) algorithm; then, the model is called BSVM. The BSVM is then trained on a dataset collected from the experimental results. …”
    Get full text
    Article
  11. 14491

    EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks by Sakshi Patni, Joohyung Lee

    Published 2024-12-01
    “…We have made several technological advances, including a lightweight blockchain consensus mechanism designed for IoMT networks, an adaptive edge resource allocation method based on reinforcement learning, and a federated learning algorithm optimized for medical data with differential privacy. …”
    Get full text
    Article
  12. 14492

    Enhancing depression recognition through a mixed expert model by integrating speaker-related and emotion-related features by Weitong Guo, Qian He, Ziyu Lin, Xiaolong Bu, Ziyang Wang, Dong Li, Hongwu Yang

    Published 2025-02-01
    “…A multi-domain adaptation algorithm trains the MoE model for depression recognition. …”
    Get full text
    Article
  13. 14493

    Text mining of hypertension researches in the west Asia region: a 12-year trend analysis by Mohammad Rezapour, Mohsen Yazdinejad, Faezeh Rajabi Kouchi, Masoomeh Habibi Baghi, Zahra Khorrami, Morteza Khavanin Zadeh, Elmira Pourbaghi, Hassan Rezapour

    Published 2024-12-01
    “…Present analysis uses Latent Dirichlet allocation (LDA) as an algorithm of topic modeling (TM) in text mining, to obtain subjective topic-word distribution from the 2790 studies over the EMRO. …”
    Get full text
    Article
  14. 14494

    Diagnosis and treatment of the functional dyspepsia: clinical guidelines of the Russian Gastroenterological Association by V. T. Ivashkin, I. V. Mayev, A. A. Sheptulin, T. L. Lapina, A. S. Trukhmanov, I. M. Kartavenko, V. A. Kiprianis, O. Z. Okhlobystina

    Published 2018-08-01
    “…Following of the functional dyspepsia management algorithm allows to increase the accuracy of FD diagnosis and improve treatment results.…”
    Get full text
    Article
  15. 14495

    Real‐Time Detection, Location, and Measurement of Geoeffective Stellar Flares From Global Navigation Satellite System Data: New Technique and Case Studies by Manuel Hernández‐Pajares, David Moreno‐Borràs

    Published 2020-03-01
    “…Indeed, we will show that, unlike GSFLAI for solar flares, the new algorithm presented here (Blind GNSS search of Extraterrestrial EUV Sources [BGEES]) is able to detect EUV flares without the previous knowledge of the position of the source, which is also simultaneously estimated, providing an additional quality check of the detection. …”
    Get full text
    Article
  16. 14496

    Modelling and Analysis of Autonomous Airport Surface Movement Operations based on Multi-Agent Planning by Malte von der Burg, Alexei Sharpanskykh

    Published 2025-01-01
    “…To compute conflict-free trajectories for all taxiing agents, we tailored and extended state-of-the-art multi-agent motion planning algorithms: the two-level routing algorithm combines Priority-Based Search (PBS) with Safe Interval Path Planning (SIPP). …”
    Get full text
    Article
  17. 14497

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article
  18. 14498

    DIGITAL TRANSFORMATION AND THE USE OF ARTIFICIAL INTELLIGENCE IN SOCIAL INSURANCE AND INSURANCE by Elizaveta Pletneva, Daria Zagorska

    Published 2024-06-01
    “…The downsides may include data confidentiality issues, the exclusion of the human factor, the risk of algorithm bias, implementation complexity and high costs, and the threat of unemployment.…”
    Get full text
    Article
  19. 14499

    Forecasting O3 and NO2 concentrations with spatiotemporally continuous coverage in southeastern China using a Machine learning approach by Zeyue Li, Jianzhao Bi, Yang Liu, Xuefei Hu

    Published 2025-01-01
    “…In this research, we adopted a forecasting model that integrates the random forest algorithm with NASA’s Goddard Earth Observing System “Composing Forecasting” (GEOS-CF) product. …”
    Get full text
    Article
  20. 14500

    Numerical Investigation of Performance Improvement and Erosion Characteristics of Vortex Pump Using Particle Model by Daoxing Ye, Hao Li, Qiuyan Ma, Qibiao Han, Xiulu Sun

    Published 2020-01-01
    “…The relationship between geometric factors of vortex pump and efficiency and erosion rate of blade was established using the kriging approximation model. The genetic algorithm solved the multiobjective optimization and obtained the Pareto front solution using NSGA-II. …”
    Get full text
    Article