Suggested Topics within your search.
Suggested Topics within your search.
-
3921
Method of Assessing of Spot Welded Joints Quality
Published 2016-04-01“…The X-ray optical scheme of shooting of a welding point is described. The algorithm of definition of a depth of a cast core of a spot weld is offered.…”
Get full text
Article -
3922
THE METHOD OF ANALYSIS OF HIERARCHIES IN THE SYSTEM OF COMPLEX PROTECTION OF INFORMATION OBJECTS
Published 2022-10-01“…The main purpose of the article is to justify the expediency of applying the method of analyzing hierarchies to algorithms for complex protection of information objects.…”
Get full text
Article -
3923
Identification of television images in vision systems based on mathematical apparatus of cubic normalized B-splines
Published 2017-12-01“…The resulting spline-differentiation algorithm is used for mathematical modeling. Research Results. …”
Get full text
Article -
3924
3D-CNN with Multi-Scale Fusion for Tree Crown Segmentation and Species Classification
Published 2024-12-01“…The results show that the U-WTS algorithm achieved a recall of 0.809, precision of 0.885, and an F-score of 0.845. …”
Get full text
Article -
3925
Relationship between intra-bladder pressure and acute kidney injury in patients with acute pancreatitis: interpretable machine learning approach
Published 2025-08-01“…Then, the ML algorithm is used to establish the prediction model. …”
Get full text
Article -
3926
EEMtoolbox: A user‐friendly R package for flexible ensemble ecosystem modelling
Published 2025-05-01“…Two approaches have been considered to find parameter values satisfying those features: a standard accept–reject algorithm, appropriate for small ecosystem networks, and a sequential Monte Carlo (SMC) algorithm that is more computationally efficient for larger ecosystem networks. …”
Get full text
Article -
3927
Predicting Oncological and Functional Outcomes by Nephrectomy Type for T1 Renal Tumors Using Machine Learning Models
Published 2025-03-01“…Using machine learning algorithms, we aimed to develop a model to predict both outcomes simultaneously, according to each radical (RN) and partial nephrectomy (PN). …”
Get full text
Article -
3928
Enhancing knee MRI bone marrow lesion detection with artificial intelligence: An external validation study
Published 2025-09-01“…Mean age was 46 years with a standard deviation (SD) of 15.8 years and a female/male ratio of 49 %/51 %.An AI algorithm from the AI solution Keros, comprising three orientation-specific 3D-UNet models, was deployed for bone marrow edema segmentation on T2/proton density with fat suppression sequences.The ground truth was set by expert musculoskeletal radiologists.The purpose was to externally validate the AI algorithm and compare the performance and speed of bone marrow edema identification by less experienced radiologists when using the algorithm versus not using it Results: A total of 184 patients were included. …”
Get full text
Article -
3929
Research on automatic identification method for pipeline girth weld defects based on X-ray images and sparse representation
Published 2024-09-01“…Based on Suspected Defect Region (SDR) and formulated gray densities, a clustering-based SDR segmentation algorithm was constructed, aimed at precise segmentation of defect SDRs in various shapes. …”
Get full text
Article -
3930
Classifcation of events in information security systems based on neural networks
Published 2019-03-01“…To address the problem more effectively, collective methods based on collective neural ensembles aligned with an advanced complex approach were implemented.Materials and methods: When solving complex classification problems, often none of the classification algorithms provides the required accuracy. In such cases, it seems reasonable to build compositions of algorithms, mutually compensating errors of individual algorithms. …”
Get full text
Article -
3931
Maximizing multi-source data integration and minimizing the parameters for greenhouse tomato crop water requirement prediction
Published 2025-08-01“…We employed the ExG (Excess Green) algorithm and the maximum inter-class variance method to develop an algorithm for extracting canopy coverage from image segmentation. …”
Get full text
Article -
3932
Pig Aggression Tracking and Analysis Application Based on A RPMeMOTR Method
Published 2025-12-01“…Then, we design the P-ids algorithm to ensure stable tracking by preserving and leveraging historical trajectory data. …”
Get full text
Article -
3933
Risk factors and bone mineral density in predicting the risk of fracture in postmenopausal women
Published 2016-09-01“…The sensitivity of the FRAX® algorithm with BMD- and BMD+ was 41% (31–51%) and 38% (29–48%) and its specificity was 77% (68–84%) and 82% (74–88%), respectively. …”
Get full text
Article -
3934
Enhancing weld quality of novel robotic-arm arc welding: Vision-based monitoring, real-time control seam tracking
Published 2024-12-01“…A vision sensor-based algorithm for adaptive extraction functionality is proposed to solve this issue. …”
Get full text
Article -
3935
Stability Analysis and Static–Dynamic Characterization of Subminiature Two-Dimensional (2D) Electro-Hydraulic Servo Valves
Published 2025-05-01“…Aiming at the special working condition of the electro-mechanical converter with high-frequency oscillation at a small turning angle, this paper designs a position–current double closed-loop PID control algorithm based on the framework of the vector control algorithm (FOC). …”
Get full text
Article -
3936
Aspects of Developing A Methodology for Managing Digital Financial Assets
Published 2023-09-01“…The subject of the study is methods, models and algorithms for automated monitoring and management of digital financial assets and cryptocurrencies. …”
Get full text
Article -
3937
Design a low-noise 5GHz wideband microwave power amplifier using 90nm CMOS technology with area reduction employing an active inductor
Published 2025-07-01“…Lastly, this work illustrates how genetic algorithm optimization has drastically changed LNA design. …”
Get full text
Article -
3938
Protection of confidentiality of medical data PATIENTS
Published 2019-06-01“…One of the medical information security options by using the data historian encoding information on biometrics eye is proposed. A schematic algorithm of recognition of individual retinal image of the eye, some optimizations recognition and user authentication are given. …”
Get full text
Article -
3939
COMPUTER TARGET AND STRATEGY FORMATION OF THE INFORMATION SYSTEM SAFETY VIOLATOR
Published 2016-05-01“…Semantic models and algorithms are developed for a conclusion of the purposes and strategies; criteria and tasks for strategies assessment, based on representation of information system in the form of the open environment model are described.…”
Get full text
Article -
3940
BLADDER EXTROPHY TREATMENT WITH PUBIC DIASTASIS CORRECTION IN AN ADOLESCENT. CLINICAL CASE
Published 2011-11-01“…The presentation covers main pathogenic mechanisms of the disease, diagnostic algorithm and treatment approaches.Key words: Bladder extrophy, children. …”
Get full text
Article