-
5761
PCA-Based Line Detection from Range Data for Mapping and Localization-Aiding of UAVs
Published 2017-01-01“…The innovative aspects of the line detection algorithm regard the proposed hierarchical clusterization method for segmentation. …”
Get full text
Article -
5762
Asymptotic analysis of mathematical model describing a new treatment of breast cancer using AZD9496 and palbociclib
Published 2025-01-01“…Therefore, in order to reveal the hierarchy of the system of equations ,a numerical algorithm called the singularly perturbed vector field (SPVF) was applied. …”
Get full text
Article -
5763
An Energy-Efficient Sequence-Aware Top- Monitoring Scheme in Wireless Sensor Networks
Published 2013-11-01“…Conventional top- k monitoring algorithms install a filter at each sensor node and suppress unnecessary sensor updates. …”
Get full text
Article -
5764
Microwave Imaging Using CMOS Integrated Circuits with Rotating 4 × 4 Antenna Array on a Breast Phantom
Published 2017-01-01“…The confocal imaging algorithm for rotating antennas is utilized to reconstruct the breast image. …”
Get full text
Article -
5765
Information support for decision making in problem situation description
Published 2021-12-01“…As an implementation of the proposed model, the following algorithms have been developed: an algorithm for creating a dictionary of communicative fragments; algorithms for creating fragment-slot templates for sentences, texts and subject areas; an algorithm of user information support. …”
Get full text
Article -
5766
How Do We Treat Children with Anterior Cutaneous Nerve Entrapment Syndrome and Is the Biopsychosocial Model Also Being Applied? A Scoping Review
Published 2024-01-01“…More research is needed to establish an evidence-based treatment algorithm for patients with this challenging pain problem. …”
Get full text
Article -
5767
A Performance Analysis of Business Intelligence Techniques on Crime Prediction
Published 2018“…There is a need to identify the most efficient algorithm that can be used in crime prediction given the past crime data. …”
Get full text
Article -
5768
Klasifikasi Tingkat Stress dari Data Berbentuk Teks dengan Menggunakan Algoritma Support Vector Machine (SVM) dan Random Forest
Published 2024-10-01“…The results showed that the SVM algorithm with weighting using TF-IDF had the best performance compared to the Random Forest algorithm and other transformation methods used in the study. …”
Get full text
Article -
5769
Jaringan Komunitas Berbasis Similaritas Topik Bahasan dan Emosi untuk Mengidentifikasi Perilaku Pengguna Twitter
Published 2023-02-01“…Then, the behavioral network was modeled by the DeepWalk Network Embeddings algorithm to map the behavioral closeness relationship between users and the Density Peak Clustering Algorithm to group user communities with strong behavioral similarities. …”
Get full text
Article -
5770
Development of an artificial intelligence-based application for the diagnosis of sarcopenia: a retrospective cohort study using the health examination dataset
Published 2025-02-01“…Methods We developed an automated lumbar spine slice classification model using the CNN (EfficientNetV2) algorithm and an automated domain segmentation model to identify the subcutaneous fat, visceral fat, and muscle areas using the U-NET algorithm. …”
Get full text
Article -
5771
Automatic MRI Lymph Node Annotation From CT Labels
Published 2025-01-01“…We address these challenges using cross-modal supervision through image registration. Our algorithm reduces the burden of manual annotation and the reliance on large labeled datasets and eliminates the need for any MRI ground truth. …”
Get full text
Article -
5772
Comment on “Variational Iteration Method for Fractional Calculus Using He’s Polynomials”
Published 2012-01-01“…A standard variational iteration algorithm for fractional differential equations is suggested.…”
Get full text
Article -
5773
New Iterative Method for Fractional Gas Dynamics and Coupled Burger’s Equations
Published 2015-01-01“…By using initial values, the explicit solutions of the equations are solved by using a reliable algorithm. Numerical results show that the new iterative method is easy to implement and accurate when applied to time-fractional partial differential equations.…”
Get full text
Article -
5774
GLONASS AS A TOOL TO ENSURE THE SAFETY OF TRANSPORTATION OF DANGEROUS GOODS
Published 2016-05-01“…The article describes the definition of dangerous goods, shows the reasons for the increased control over the transportation of such kind of goods and special security measures, gives the peculiarities of satellite navigation systems, the algorithm of implementation of the global navigation tracking system in practice, and shows a need for further measures to ensure safety transportation of dangerous goods.…”
Get full text
Article -
5775
On star polynomials, graphical partitions and reconstruction
Published 1988-01-01“…It is shown that the partition of a graph can be determined from its star polynomial and an algorithm is given for doing so. It is subsequently shown (as it is well known) that the partition of a graph is reconstructible from the set of node-deleted subgraphs.…”
Get full text
Article -
5776
CASE PRESENTATION
Published 2022-12-01“…Special evolution in myelofibrosis – case reports Neuroendocrine tumor (bronchial carcinoid) discovered after ocular symptoms – a case report Sepsis, dyspnea and cystic cardiac mass – the importance of medical imaging in the diagnostic algorithm Fistula complications of bevacizumab therapy in metastatic colorectal cancer – oncology surgeon’s point of view: a case presentation…”
Get full text
Article -
5777
ON THE WAYS OF AUTOMATED PROCESSING OF SPATIAL GEOMETRY OF THE SYSTEM “GATE-CASTING” FOR SOLVING OF THE CLASSIFICATION PROBLEMS
Published 2007-02-01“…The system parameterization of castings, allowing to formalize spatial geometry of casting, is offered. The algorithm of taxonomy, which can be used for solving of problems of castings classification in the systems of computeraided design of foundry technologies, is described. …”
Get full text
Article -
5778
Approximate Solution of Inverse Problem for Elliptic Equation with Overdetermination
Published 2013-01-01“…Stability and coercive stability estimates of the fi rst and second orders of accuracy difference schemes for this problem are established. The algorithm for approximate solution is tested in a two-dimensional inverse problem.…”
Get full text
Article -
5779
Isolated word recognition using neural networks
Published 2003-12-01“…The system is based on feedforward neural networks trained by error backpropagation algorithm. Speaker dependent speech recognition was investigated. …”
Get full text
Article -
5780
A Lipschitz Stability Estimate for the Inverse Source Problem and the Numerical Scheme
Published 2016-01-01“…We give a numerical algorithm to compute unknown source term f(t). Also, we give a stability estimate in the case that f(t) is a piecewise constant function.…”
Get full text
Article