-
4641
Deadline Aware Retransmission Threshold Setting Protocol in Cyber-Physical Systems
Published 2015-09-01“…Many time-sensitive applications impose high requirement on real-time response. There exist many algorithms and routing protocols for efficient data packet delivery. …”
Get full text
Article -
4642
Radiology in gastroenterology (According to data of the 16th Russian gastroenterological week, Moscow, October 11–13, 2010)
Published 2011-02-01“…Features of application of ultrasound investigation, roentgenologic procedures, magnetic-resonance tomography as stand alone methods and at complex investigation are underlined. Algorithms of diagnostics of various diseases, noninvasive medical procedures are proposed. …”
Get full text
Article -
4643
Status Data and Communication Aspects in Dynamically Clustered Network-on-Chip Monitoring
Published 2012-01-01“…The analysis shows that the monitoring system should be carefully designed in terms of data diffusion and routing and monitoring algorithms to obtain the potential performance improvement.…”
Get full text
Article -
4644
Underdetermined DOA Estimation via Independent Component Analysis and Time-Frequency Masking
Published 2010-01-01“…This paper presents an algorithm for the estimation of the direction of arrival (DOA) in underdetermined situations, that is, there is more sources than sensors. …”
Get full text
Article -
4645
Mathematical Model for Thermal Processes of Single-Core Power Cable
Published 2012-10-01“…These algorithms can be added in the software of microprocessor devices. …”
Get full text
Article -
4646
ANALYSIS OF CELLULAR REACTION TO IFN-γ STIMULATION BY A SOFTWARE PACKAGE GeneExpressionAnalyser
Published 2016-10-01“…The software package GeneExpressionAnalyser for analysis of the DNA microarray experi-mental data has been developed. The algorithms of data analysis, differentially expressed genes and biological functions of the cell are described. …”
Get full text
Article -
4647
An Inventory Controlled Supply Chain Model Based on Improved BP Neural Network
Published 2013-01-01“…The results show that the improved algorithm not only significantly exceeds the standard algorithm but also outperforms some other improved BP algorithms both on convergence rate and prediction accuracy.…”
Get full text
Article -
4648
Adaptive Optimal 𝑚-Stage Runge-Kutta Methods for Solving Reaction-Diffusion-Chemotaxis Systems
Published 2011-01-01“…Yet, theorems about stability and convergence of the algorithm are provided in analyzing robustness and efficiency. …”
Get full text
Article -
4649
Fairy-tale therapy as a way to combat phobias
Published 2020-12-01“…The article considers the fairy tale as a tool that presents algorithms for solving specific problems or conflict situations, the consequences of circumstances with a concentrated component of low-frequency emotions, as well as a way to give strength to further fight against fears or even annihilating them. …”
Get full text
Article -
4650
Dynamic Resource Management in 802.11 Wireless Mesh Networks
Published 2012-01-01“…The iterative heuristic algorithms that we propose controls the communication load of each mesh AP in a distributed manner. …”
Get full text
Article -
4651
MODELING THE RISKS OF DEVELOPING AND IMPLEMENTING THE INFRASTRUCTURE PROJECT BASED ON NETWORK PLANNING METHODS
Published 2020-02-01“…The software implementation of discrete optimization algorithms for the project plan and simulation tests has been implemented in the framework of an automated scenario modeling system using Python.…”
Get full text
Article -
4652
Matrix Formulation of EISs of Graphs and Its Application to WSN Covering Problems
Published 2021-01-01“…By these matrices’ complete characterization of these three structures of graphs, three algorithms are further designed which can find all these kinds of subsets of graphs mathematically. …”
Get full text
Article -
4653
Application and Legal Governance of Computational Technologies in Credit Investigation: An Interdisciplinary Perspective
Published 2022-01-01“…By analyzing the computational technologies and algorithms most commonly used in credit data collection and data storage, data transmission and data access, data analysis and processing, data calculation, result output and effect evaluation, this paper summarizes and proposes a unified general process of modern credit investigation, pointing out that in this general process, low data quality, privacy violation, algorithmic bias are the main challenges in the big data era, and countermeasures like data quality control, privacy protection, and algorithm governance need to be to be taken seriously into account in order to further explore the great potential of the credit investigation under the legal framework.…”
Get full text
Article -
4654
A Primer for Disease Gene Prioritization Using Next-Generation Sequencing Data
Published 2013-12-01“…The recent development of many computational algorithms and programs has vastly improved the ability to translate sequence data into valuable information for disease gene identification. …”
Get full text
Article -
4655
Multilayer Deep Deterministic Policy Gradient for Static Safety and Stability Analysis of Novel Power Systems
Published 2023-01-01“…The proposed multilayer deep deterministic policy gradient is compared with other deep learning algorithms. The feasibility, effectiveness, and superiority of the proposed method are verified by numerical simulations.…”
Get full text
Article -
4656
MAXIMUM POWEWR POINT TRACKING SYSTEM FOR PHOTOVOLTAIC STATION: A REVIEW
Published 2015-11-01“…The location of the MPP is not known in advance, but can be located, either through calculation models or by search algorithms. Therefore MPPT techniques are important to maintain the PV array’s high efficiency. …”
Get full text
Article -
4657
Identifying Smart Strategies for Effective Agriculture Solution Using Data Mining Techniques
Published 2022-01-01“…Use of the CART and random forest algorithms is a data mining technique that may be used to various datasets. …”
Get full text
Article -
4658
Image classification with rotation-invariant variational quantum circuits
Published 2025-01-01“…Variational quantum algorithms are gaining attention as an early application of noisy intermediate-scale quantum (NISQ) devices. …”
Get full text
Article -
4659
Dark Signals in the Choroidal Vasculature on Optical Coherence Tomography Angiography: An Artefact or Not?
Published 2017-01-01“…Optical phenomena and image processing algorithms may create imaging artefacts. Therefore, OCTA images require careful interpretation. …”
Get full text
Article -
4660
Surface Approximation using Growing Self-Organizing Nets and Gradient Information
Published 2007-01-01“…Also, we show that in the adaptation stage the network utilizes efficient transformations, expressed as versors in the conformal geometric algebra framework, which build the shape of the object independent of its position in space (coordinate free). Our algorithms were tested with several images, including medical images (CT and MR images). …”
Get full text
Article