-
17201
EVOLUTIONARY MULTITASKING: A NEW OPTIMIZATION TECHNIQUE
Published 2018-09-01“…In the last decades, evolutionary algorithms (EAs) have been successfully applied to solve various optimization problems in science and technology. …”
Get full text
Article -
17202
Successful nonoperative management of a simultaneous high-grade splenic injury and devascularized kidney in Australia: a case report
Published 2023-12-01“…Severe blunt injuries to isolated solid abdominal viscera have been previously managed nonoperatively; however, management algorithms for simultaneous visceral injuries are less well defined. …”
Get full text
Article -
17203
Based on improved malthusian model microblogging topic trend forecast
Published 2015-04-01“…Although trend forecasting problem is the research focus of social computing,yet the topic trend forecast of micro logging platform is still at the exploratory stage.Based on the analyzing,extracting and defining the influencing factors of the trends of event,the improved Malthus model,which is more applicable to solve microblogging topic trend forecast problem is presented.Then the model is mapped to the neural network,and the genetic algorithms are used to predict the trend of events.Experiments show that this method can predict the trend of long-term events in the social network with good results,and can predict the outbreak point and posting volume effectively.It is worth nothing that the method is also suitable for small sample forecasting problems.…”
Get full text
Article -
17204
Node centrality metric based caching mechanism in content-centric network
Published 2017-06-01“…In order to reduce the cache redundancy as well as increase the cache hit ratios in content-centric networks,the node centrality metric based caching mechanism (CMC) was proposed.CMC utilized controllers to obtain the topology of the whole network and the idle rate of cache space.According to the connection relation of the topology,the degree centrality,closeness centrality and betweenness centrality of nodes were calculated.When CMC choose the caching nodes,it took the three metrics and the idle rate of cache space into account.Simulation results show that CMC can effectively increase the cache hit ratios and reduce the content fetching hops and average request delay compared with the traditional routing algorithms in CCN.…”
Get full text
Article -
17205
Review of Gearbox Instantaneous Speed Measurement Methods Based on Vibration Signals
Published 2023-08-01“…The present work recapitulates the basic principles of six popular instantaneous speed estimation algorithms, investigates these six speed measurement methods through the speed test of industrial helical gearboxes under different working conditions, and analyzes their advantages and applicability. …”
Get full text
Article -
17206
State-of-Charge Estimation and Active Cell Pack Balancing Design of Lithium Battery Power System for Smart Electric Vehicle
Published 2017-01-01“…The strong tracking cubature extended Kalman filter (STCEKF) gave an accurate SOC prediction compared to other Kalman-based filter algorithms. The proposed groupwise balancing of the multiple SOC exhibited a higher balancing speed and lower balancing loss than other cell balancing designs. …”
Get full text
Article -
17207
Cell Area-Based Method for Analyzing the Coverage Capacity of Satellite Constellations
Published 2021-01-01“…The classical net point method is one of the most commonly used algorithms in resolving this problem, indicating that the computation efficiency significantly depends on the high-precision requirement. …”
Get full text
Article -
17208
Special Issue in Artificial Intelligence
Published 2019-11-01“…The topics of the articles in this special issue include deep learning applied to medicine [1, 3], support vector machine applied to ecosystems [2], human-robot interaction [4], clustering in the identification of anomalous patterns in communication networks [5], expert systems for the simulation of natural disaster scenarios [6], real-time algorithms of artificial intelligence [7] and big data analytics for natural disasters [8]. …”
Get full text
Article -
17209
Urban micro-forestry for climate adaptation in the smaller ports of the mid-Adriatic sea
Published 2022-06-01“…The methodological approach uses simulation tools with a parametric platform that generates proprietary algorithms and allows recursive control over every aspect of the process. …”
Get full text
Article -
17210
Approximation Theorem for New Modification of q-Bernstein Operators on (0,1)
Published 2021-01-01“…Finally, the rate of convergence by means of modulus of continuity and three different Lipschitz classes for these operators are studied, and some graphs and numerical examples are shown by using Matlab algorithms.…”
Get full text
Article -
17211
Integrins identified as potential prognostic markers in osteosarcoma through multi-omics and multi-dataset analysis
Published 2025-01-01“…A novel machine learning framework combining 10 algorithms was developed to construct an Integrin-related Signature (IRS), which demonstrated robust predictive power across multiple datasets. …”
Get full text
Article -
17212
Rozwiązywanie zadań tekstowych przez studentów – przyszłych nauczycieli edukacji wczesnoszkolnej
Published 2022-12-01“…The research shows that the students have well-mastered calculational algorithms and techniques but they have difficulties in presenting their reasoning in the language of mathematics. …”
Get full text
Article -
17213
DAYLIGHT INVESTIGATION IN CAMPUS LECTURE THEATERS. CASE STUDY: SOUTH WEST COAST UNIVERSITY OF NIGERIA
Published 2021-06-01“…The window area to wall area (AWD to AW) ratio was determined using reliable algorithms. In the three studied buildings, the daylight contribution varies from 12 lux to 3803 lux; AWD to AW varies from 14 % to 22 % to 37 %; 22 % AWD to AW is considered moderate while 37 % AWD to AW is considered more suitable in the studied buildings. …”
Get full text
Article -
17214
PYTHON INTERFACE DESIGN FOR MICROPHOTOGRAPHY ANALYSIS:APPLICATION TO EVALUATE THE HEMORHEOLOGICAL ACTIVITY OF QUERCETIN
Published 2024-12-01“…The image processing algorithms are contained in the OpenCV2 library, which uses pre-trained neural networks. …”
Get full text
Article -
17215
New trends in the treatment of androgenetic alopecia
Published 2025-01-01“…However, treatments with proven efficacy approved by recognised organisations and associations are limited, and research is ongoing to discover new drugs, redesign existing ones and establish therapy algorithms. This publication reviews the use of minoxidil, 5a-reductase inhibitors (applied orally, topically and by injection), tretinoin, botulinum toxin, microRNA, and osteopontin as treatment options for androgenetic alopecia in men.…”
Get full text
Article -
17216
Estimation of Acetic Acid Concentration from Biogas Samples Using Machine Learning
Published 2023-01-01“…The project aims to use NIR sensors and machine learning algorithms to estimate the acetic acid concentration in a biogas substrate based on the measured intensities of the substrate. …”
Get full text
Article -
17217
Mathematical model of inertial-optical autonomous navigation complex of unmanned aerial vehicle
Published 2022-06-01“…Due to the fact that the accuracy of such navigation systems significantly depends on changes in the background-target environment and equipment failures, it is proposed to organize automatic adaptation of the system to changes in external conditions and internal factors by controlling the operating modes and parameters of the software that implements optimal estimation algorithms. For this purpose, a model of an onboard inertial-optical autonomous navigation system has been developed in the class of discrete dynamic systems with a random change in structure.…”
Get full text
Article -
17218
Malware prediction technique based on program gene
Published 2018-08-01“…With the development of Internet technology,malicious programs have risen explosively.In the face of executable files without source,the current mainstream malware detection uses feature detection based on similarity,with lack of analysis of malicious sources.To resolve this status,the definition of program gene was raised,a generic method of extracting program gene was designed,and a malicious program prediction method was proposed based on program gene.Utilizing machine learning and deep-learning algorithms,the forecasting system has good prediction ability,with the accuracy rate of 99.3% in the deep-learning model,which validates the role of program gene theory in the field of malicious program analysis.…”
Get full text
Article -
17219
Strong Convergence Theorems for Quasi-Bregman Nonexpansive Mappings in Reflexive Banach Spaces
Published 2014-01-01“…Furthermore, we apply our method to prove strong convergence theorems of iterative algorithms for finding a common solution of a finite family equilibrium problem and a common zero of a finite family of maximal monotone mappings. …”
Get full text
Article -
17220
Research on Management Method,Classification and Correlation of Alarm in Information Communication Network
Published 2013-08-01“…Abstract:As the standardization,refined and integrated development of information communication network management,communication network monitoring is faced with massive network alarm information that has brought new challenges to the network alarm management.The alarm types system composition based on information communication network alarm management were comed up with,the methods from information communication in terms of the effective control of network alarms were discussed,and also the network equipment alarm logic correlation to the logical level of network equipment alarm correlation was extended,at the same time,the study and application of data mining algorithms in alarm correlation was discussed.Finally,the prospect for the intelligent alarm analysis system was provided.…”
Get full text
Article