-
14481
Structural Damage Identification through an Optimal Sensor Placement Approach and the Modal Strain Energy Based Index
Published 2024-02-01“…In the first stage, a correlation function between the reconstructed mode shapes using the iterated improved reduced system (IRS) method and the complete mode shapes of a structure is defined and then the function is minimized via the binary differential evolution (BDE) algorithm to find the optimal sensor placement of the structure. …”
Get full text
Article -
14482
BucketAugment: Reinforced Domain Generalisation in Abdominal CT Segmentation
Published 2024-01-01“…<italic>Methods:</italic> BucketAugment leverages principles from the Q-learning algorithm and employs validation loss to search for an optimal policy within a search space comprised of distributed stacks of 3D volumetric augmentations, termed ‘buckets.…”
Get full text
Article -
14483
Analyses of poverty indicators using PPI methodology
Published 2024-06-01“…Developing the model was carried out using machine learning methods in several steps: 1) data processing and statistical analyses; 2) selection of significant indicators by the classification model; 3) clustering by k-mean algorithm; 4) hierarchical clustering; 5) comparing outcomes of modeling and interpretation of results. …”
Get full text
Article -
14484
An Intelligent Ship Image/Video Detection and Classification Method with Improved Regressive Deep Convolutional Neural Network
Published 2020-01-01“…Third, a proper frame and scale suitable for ships are designed with a clustering algorithm to reduced 60% anchors. Last, the activation function is verified and optimized. …”
Get full text
Article -
14485
A reliable unmanned aerial vehicle multi-ship tracking method.
Published 2025-01-01“…This article introduces a multi-object tracking system designed for unmanned aerial vehicles (UAVs), utilizing the YOLOv7 and Deep SORT algorithms for detection and tracking, respectively. …”
Get full text
Article -
14486
Remdesivir-induced severe hypoglycemia in an elderly man without diabetes: a case report
Published 2025-01-01“…After discontinuation, his BG levels normalized. The Naranjo algorithm, a tool for evaluating the causality of adverse drug reactions, classified the event as “Probable” (6 points). …”
Get full text
Article -
14487
Research Progress on High-Intermediate Frequency Extension Methods of SEA
Published 2019-01-01“…Neutron structure assembly and modeling, interval and mixed interval analysis, interval variable and mixed interval variable response are also described, so as to justify the development of a hybrid, large-scale interval algorithm. Finally, the engineering application of the above method is introduced, the limitations and shortcomings of SEA and intermediate frequency extension methods are reviewed, and unsolved problems are further discussed.…”
Get full text
Article -
14488
Identification of global main cable line shape parameters of suspension bridges based on local 3D point cloud
Published 2025-01-01“…Additionally, the Random Sample Consensus (RANSAC) algorithm, the ordinary least squares, and center-of-mass calibration are applied to identify and optimize the geometric parameters of the cross-section point cloud of the main cable. …”
Get full text
Article -
14489
A Sarsa(λ)-Based Control Model for Real-Time Traffic Light Coordination
Published 2014-01-01“…Considering dynamic characteristics of the actual traffic environment, reinforcement learning algorithm based traffic control approach can be applied to get optimal scheduling policy. …”
Get full text
Article -
14490
Development of an Ensemble Intelligent Model for Assessing the Strength of Cemented Paste Backfill
Published 2020-01-01“…The hyperparameters of the SVM model are tuned using the beetle antennae search (BAS) algorithm; then, the model is called BSVM. The BSVM is then trained on a dataset collected from the experimental results. …”
Get full text
Article -
14491
EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks
Published 2024-12-01“…We have made several technological advances, including a lightweight blockchain consensus mechanism designed for IoMT networks, an adaptive edge resource allocation method based on reinforcement learning, and a federated learning algorithm optimized for medical data with differential privacy. …”
Get full text
Article -
14492
Enhancing depression recognition through a mixed expert model by integrating speaker-related and emotion-related features
Published 2025-02-01“…A multi-domain adaptation algorithm trains the MoE model for depression recognition. …”
Get full text
Article -
14493
Text mining of hypertension researches in the west Asia region: a 12-year trend analysis
Published 2024-12-01“…Present analysis uses Latent Dirichlet allocation (LDA) as an algorithm of topic modeling (TM) in text mining, to obtain subjective topic-word distribution from the 2790 studies over the EMRO. …”
Get full text
Article -
14494
Diagnosis and treatment of the functional dyspepsia: clinical guidelines of the Russian Gastroenterological Association
Published 2018-08-01“…Following of the functional dyspepsia management algorithm allows to increase the accuracy of FD diagnosis and improve treatment results.…”
Get full text
Article -
14495
Real‐Time Detection, Location, and Measurement of Geoeffective Stellar Flares From Global Navigation Satellite System Data: New Technique and Case Studies
Published 2020-03-01“…Indeed, we will show that, unlike GSFLAI for solar flares, the new algorithm presented here (Blind GNSS search of Extraterrestrial EUV Sources [BGEES]) is able to detect EUV flares without the previous knowledge of the position of the source, which is also simultaneously estimated, providing an additional quality check of the detection. …”
Get full text
Article -
14496
Modelling and Analysis of Autonomous Airport Surface Movement Operations based on Multi-Agent Planning
Published 2025-01-01“…To compute conflict-free trajectories for all taxiing agents, we tailored and extended state-of-the-art multi-agent motion planning algorithms: the two-level routing algorithm combines Priority-Based Search (PBS) with Safe Interval Path Planning (SIPP). …”
Get full text
Article -
14497
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
14498
DIGITAL TRANSFORMATION AND THE USE OF ARTIFICIAL INTELLIGENCE IN SOCIAL INSURANCE AND INSURANCE
Published 2024-06-01“…The downsides may include data confidentiality issues, the exclusion of the human factor, the risk of algorithm bias, implementation complexity and high costs, and the threat of unemployment.…”
Get full text
Article -
14499
Forecasting O3 and NO2 concentrations with spatiotemporally continuous coverage in southeastern China using a Machine learning approach
Published 2025-01-01“…In this research, we adopted a forecasting model that integrates the random forest algorithm with NASA’s Goddard Earth Observing System “Composing Forecasting” (GEOS-CF) product. …”
Get full text
Article -
14500
Numerical Investigation of Performance Improvement and Erosion Characteristics of Vortex Pump Using Particle Model
Published 2020-01-01“…The relationship between geometric factors of vortex pump and efficiency and erosion rate of blade was established using the kriging approximation model. The genetic algorithm solved the multiobjective optimization and obtained the Pareto front solution using NSGA-II. …”
Get full text
Article