-
1
Computer analysis of the emotional modality of 20 million publications in PUBMED database indicates ways to increase the effectiveness of pharmacotherapy by identifying pseudoscien...
Published 2021-06-01“…The paper formulates a method for analyzing the texts of biomedical publications, which is based on an algorithmic assessment of the emotional modality of medical texts (so-called sentiment analysis). …”
Get full text
Article -
2
APPLICATON OF MICROSEISMIC NOISE ESTIMATION IN OIL AND GAS EXPLORATION AIMED AT REDUCING ENVIRONMENTAL IMPACT
Published 2019-07-01“…Aim. This article discusses the possibility of reducing ecological costs and risks during exploration of oil and gas fields. …”
Get full text
Article -
3
-
4
-
5
Genetic clustering algorithm
Published 2020-01-01“…The genetic algorithm of clustering of analysis objects in different data domains has been offered within the hybrid concept of intelligent information technologies development aimed to support decision-making. …”
Get full text
Article -
6
Knowledge-based Algorithms for BDI-agents
Published 2020-12-01“…From an individual agent's perspective, a multiagent algorithm is a reactive and proactive knowledge/believe-based rational algorithm aimed to achieve an agent's own desires. …”
Get full text
Article -
7
Improvement in panchromatic-guided denoising algorithm for research on Beijing SDGSAT-1 luminous remote sensing image denoising algorithm
Published 2025-08-01“…In this study, based on existing denoising algorithms, the OTSU threshold method is combined with a convolution window to identify noisy pixels. …”
Get full text
Article -
8
Pupil Detection Algorithm Based on ViM
Published 2025-06-01“…In this paper, we propose a novel pupil detection algorithm, ViMSA, based on the ViM model. This algorithm introduces weighted feature fusion, aiming to enable the model to adaptively learn the contribution of different feature patches to the pupil detection results; combines ViM with the MSA (multi-head self-attention) mechanism), aiming to integrate global features and improve the accuracy and robustness of pupil detection; and uses FFT (Fast Fourier Transform) to convert the time-domain vector outer product in MSA into a frequency–domain dot product, in order to reduce the computational complexity of the model and improve the detection efficiency of the model. …”
Get full text
Article -
9
Research on Particle Filter Video Tracking Algorithms
Published 2020-08-01“…Aiming at the problem of insufficient robustness of moving target tracking in complex scenes, a particle filter target tracking algorithm based on CNN feature extraction is proposed CNN selflearning mechanism is used to extract highlevel semantic features of objects in images Chaotic sequence variable scale firefly algorithm is introduced to improve the accuracy of target recognition A particle filter tracking algorithm combining mean shift and weight optimization is constructed to optimize the weight of particles, improve the diversity of particle sets and make video tracking more accurate The simulation results show that the proposed algorithm can effectively adapt to occlusion, illumination, violent motion and other scenes, and has good adaptability and high realtime performance to illumination change, scale change, occlusion and so on The results of comparison with seven other methods show that under the same experimental conditions, the tracking success rate and tracking accuracy of this method are 5%~40% higher than those of other methods…”
Get full text
Article -
10
Application of Differential Evolution Algorithm in Quadrotors Attitude
Published 2019-06-01“…Unmanned aerial vehicle (UAV) technology has been applied to more and more fields, such as military and agriculture. The PID control algorithm is still used on most four rotor aircraft, but the adjustment of its parameters depends on the accurate kinematic model and the adjustment time is longer. …”
Get full text
Article -
11
Risk Assessment Algorithms in Pharmacovigilance: A Review
Published 2025-06-01“…This underscores the need to systematise risk assessment procedures for medicinal products within pharmacovigilance frameworks by pharmacovigilance specialists using a risk-based approach in the risk management system.AIM. This study aimed to analise of the key tools of the risk-based approach and optimise their application in medicinal product risk management systems.RESULTS. …”
Get full text
Article -
12
Assistance algorithm of nursing for amiodarone intravenous infusion
Published 2014-10-01“…This study aimed at identifying scientific publication on phlebitis caused by amiodarone and proposes a nursing care algorithm for interventions in intravenous amiodarone administration grounded in the Infusion Nursing Society and the Center for Disease Control and Prevention. …”
Get full text
Article -
13
Using the Backpropagation Algorithm to Distinguish Arabic Alphabet
Published 2024-02-01“…The hidden numbers of nodes are 10, the number of cycles is 500, and the error is 0.001, using the Matlab R2013a program. The aim of the study It is the use of the network algorithm to recognize the characters, by training the network to recognize the characters in two cases. …”
Get full text
Article -
14
Assistance algorithm of nursing for amiodarone intravenous infusion
Published 2014-10-01“…This study aimed at identifying scientific publication on phlebitis caused by amiodarone and proposes a nursing care algorithm for interventions in intravenous amiodarone administration grounded in the Infusion Nursing Society and the Center for Disease Control and Prevention. …”
Get full text
Article -
15
CALCULATION ALGORITHM TRUSS UNDER CRANE BEAMS
Published 2016-12-01“…Aim.The task of reducing the deflection and increase the rigidity of single-span beams are made. …”
Get full text
Article -
16
Algorithm Domination As A New Surveillance System
Published 2024-12-01“…In this way, people can be easily manipulated and directed by algorithms. The study aims to reveal how algorithm domination occurs and how it works from a theoretical perspective.…”
Get full text
Article -
17
Stability of feature selection algorithm: A review
Published 2022-04-01“…High stability of the feature selection algorithm is equally important as the high classification accuracy when evaluating feature selection performance. …”
Get full text
Article -
18
Improved Firefly Algorithm Based on Heuristic Information
Published 2019-02-01“…Firefly Algorithm (FA) is an optimization algorithm based on swarm intelligence which mimics the social behavior of fireflies based on the flashing and attraction characteristics of fireflies With the aim to address the disadvantages of the firefly algorithm of slow convergence speed and ease of falling into the local optimum in the later period of the evolution process, the firefly algorithm is improved herein Two kinds of heuristic information are proposed into the algorithm to guide the convergence of the algorithm The first one takes the current global best as the heuristic information referencing the “global optimal” idea in particle swarm optimization, therefore, an algorithm called FAGO (Firefly Algorithm based on Global Optimization) is formed The second one is called FABE (Firefly Algorithm based on Bayesian Estimation) using the optimal moving direction calculated by Bayesian estimation as heuristic information The improved algorithms in this study are applied to numerical simulations of several classical test functions and compared with traditional FA and some other′s research are carried out The simulation results show that the proposed algorithms can well accelerate the convergence speed and improve the convergence accuracy…”
Get full text
Article -
19
On routing algorithms in the internet of vehicles: a survey
Published 2023-12-01“…Our study comprehensively reviews diverse routing algorithms and their associated assessment methodologies. …”
Get full text
Article -
20
Algorithm for finding subcritical paths on network diagrams
Published 2023-02-01“…In order to optimize and balance resources used in projects, it becomes necessary to locate in these models not only the critical path of the maximum weighted length, but also the subcritical paths closest to it having a shorter length in relation to it. The aim of the work is to synthesize and analyze an algorithm for finding k-shortest paths between the input and output network vertices, on which basis the above-mentioned subcritical paths can be identified.Methods. …”
Get full text
Article