Showing 17,581 - 17,600 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 17581

    Fungal Infection following Total Elbow Arthroplasty by Samuel S. Ornell, Khang H. Dang, Aaron J. Bois, Anil K. Dutta

    Published 2019-01-01
    “…The purpose of this report is to describe our experience and outline our treatment algorithm for a rare case of prosthetic joint infection (PJI) following a TEA. …”
    Get full text
    Article
  2. 17582

    IEEE 802.15.4 based topology control and routing for mobile Sink wireless sensor networks by TONG Jie1, YANG Fan2, QIAN De-pei1

    Published 2011-01-01
    “…Based on the standard of IEEE 802.15.4b,a cross-layer protocol design combining cluster-tree formatting and mobile routing was proposed for query-driven wireless sensor networks with mobile Sink(s).Firstly,energy consumption,network connectivity,load balancing and sub-tree depth were employed as the evaluation factors.A topology evaluation function under a multi-objective optimization model was defined to construct the stable and optimal underlying clus-ter-tree network.Secondly,the beacon frame scheduling based distributed sleep synchronization algorithm in IEEE 802.15.4 MAC was improved,which was used to maintain the network synchronization and topology correction on low duty-cycle.Thirdly,the parent-child relationships established during the topology formatting according to "first beacon","best links","top level" rules were exploited to build the two-way routing paths between mobile Sink(s) and the nodes within N-Hop range.Eventually,the topology control schemes at MAC layer and the query routing approach at network layer were completely implemented in the protocol stack of TinyOS.The experimental results show that the evaluation function can effectively reflect the quality of network formatting.Jointed with the sleep synchronization mechanism un-der the topology generated using the rule of "best links",the N-Hop reactive routing exhibits high energy-efficiency.…”
    Get full text
    Article
  3. 17583

    Reusable attribute-based signature with attribute revocation and authenticated key agreement by ZHANG Zhishuo, YANG Huixi, HUANG Wen, LIAO Yongjian, ZHOU Shijie

    Published 2024-04-01
    “…Additionally, an attribute-Hash filter algorithm was introduced to facilitate a direct attribute revocation mechanism within the proposed VP-ABS scheme. …”
    Get full text
    Article
  4. 17584

    A novel oversampling method based on Wasserstein CGAN for imbalanced classification by Hongfang Zhou, Heng Pan, Kangyun Zheng, Zongling Wu, Qingyu Xiang

    Published 2025-02-01
    “…It generates an initial balanced dataset from minority class samples using the CGAN oversampling approach and then uses a noise and boundary recognition method based on K-means and $$k$$ k nearest neighbors algorithm to address the noise and boundary-blurring issues. …”
    Get full text
    Article
  5. 17585

    An individual-level probabilistic model and solution for control of infectious diseases by Ye Xia

    Published 2024-10-01
    “…Moreover, the same theoretical result shows why the simple algorithm of repeated integration can find numerical solutions for virtually all initial conditions. …”
    Get full text
    Article
  6. 17586

    Invariant Measures Based on the U-Correlation Integral: An Application to the Study of Human Voice by Juan F. Restrepo, Gastón Schlotthauer

    Published 2018-01-01
    “…These invariants were estimated through an automated algorithm based on the recently proposed U-correlation integral. …”
    Get full text
    Article
  7. 17587

    Estimation for Akshaya Failure Model with Competing Risks under Progressive Censoring Scheme with Analyzing of Thymic Lymphoma of Mice Application by Tahani A. Abushal, Jitendra Kumar, Abdisalam Hassan Muse, Ahlam H. Tolba

    Published 2022-01-01
    “…We apply the Metropolis–Hasting algorithm to generate MCMC samples from the posterior density function. …”
    Get full text
    Article
  8. 17588

    Sintesis Dimensi Manipulator Paralel Bidang Dua Derajat Kebebasan Dengan Rantai Kinematik Paralelogram Simetris by Adriyan Adriyan

    Published 2021-10-01
    “…An optimization process using non-sorted dominated genetic algorithm II (NSGA-II) was carried out for maximization of (<em>i</em>) <em>r</em><sub>MIC</sub> (the radius of the maximum inscribed circle) and GCI (global conditioning index), and (ii) <em>r</em><sub>MIC</sub> and GTI (global transmission index). …”
    Get full text
    Article
  9. 17589

    Shield-Roof Interaction in Longwall Panels: Insights from Field Data and Their Application to Ground Control by Jingyi Cheng, Zhijun Wan, Yinlin Ji

    Published 2018-01-01
    “…Early warning of severe roof weighting can be achieved by establishing a warning model based on the decision tree algorithm. Apart from this, we can also assess the working condition of yield valve and diagnose fluid leakage of shield cylinder using the SSRI system. …”
    Get full text
    Article
  10. 17590

    Type-II Fuzzy Decision Support System for Fertilizer by Ather Ashraf, Muhammad Akram, Mansoor Sarwar

    Published 2014-01-01
    “…The complexity of our algorithm is O(mnr), where m is the height of the raster, n is the width of the raster, and r is the number of expert rules.…”
    Get full text
    Article
  11. 17591
  12. 17592

    A Novel Sparse Array for Localization of Mixed Near-Field and Far-Field Sources by Yinsheng Wang, WeiJia Cui, Yuxi Du, Bin Ba, Fengtong Mei

    Published 2021-01-01
    “…The largest consecutive lags and composition method of ESNA are also given, under a given number of sensors.Our algorithm has moderate computation complexity, which provides a higher resolution and improves the parameters’ estimation accuracy. …”
    Get full text
    Article
  13. 17593

    Double-layered wrap-around sensor network for three-dimensional positioning of acoustic emission sources and its effect on monitoring crack propagation in rock samples by Jing Yang, Zonglong Mu, Guangjian Liu, Shaokun Gong, Atif Javed, Jinglong Cao, Bofei Yang, Fang Yuan

    Published 2018-09-01
    “…Furthermore, based on the polar formation algorithm, acoustic emission source was positioned to explore the propagation of microscopic cracks in cylindrical rock samples and this was further validated by the acoustic emission activity index. …”
    Get full text
    Article
  14. 17594

    Secure Microprocessor-Controlled Prosthetic Leg for Elderly Amputees: Preliminary Results by S. Krut, Ch. Azevedo Coste, P. Chabloz

    Published 2011-01-01
    “…The patient behaves naturally, while the controller analyses his movements in order to detect his intention to sit down. The detection algorithm is based on a reference pattern, calibrated individually, to which the sensor data are compared, and submitted to a set of tests allowing the discrimination of the intention to sit down from other activities. …”
    Get full text
    Article
  15. 17595

    Hybrid multiscale landmark and deformable image registration by Dana Paquin, Doron Levy, Lei Xing

    Published 2007-07-01
    “…Vese, A multiscale image representationusing hierarchical $(BV,L^2)$ decompositions, Multiscale Modeling andSimulations, vol. 2, no. 4, pp. 554--579, 2004, is reviewed, and animage registration algorithm is developed based on combining themultiscale decomposition with landmark and deformable techniques.Successful registration of medical images is achieved by firstobtaining a hierarchical multiscale decomposition of the images andthen using landmark-based registration to register the resultingcoarse scales. …”
    Get full text
    Article
  16. 17596

    Effect of Bodybuilding and Fitness Exercise on Physical Fitness Based on Deep Learning by Manman Sun, Lijun Wang

    Published 2022-01-01
    “…In this paper, based on the deep learning algorithm, compared with the recurrent neural network, the gated recurrent neural network is more suitable for processing sequence problems. …”
    Get full text
    Article
  17. 17597

    A Dynamic Framework for Community-Facility Siting with Inter-Community Competition by Sisi Zhu, Haoying Han, Anran Dai

    Published 2025-01-01
    “…This framework includes the BOMSDM itself, the data collection and processing method, and the constrained NSGA-II as the computational algorithm. Under this framework, the BOMSDM, along with three comparative frameworks derived from traditional models—including a random allocation non-incremental model, a random allocation incremental model, and an average allocation non-incremental model—was applied to a real-world scenario in Shaoxing. …”
    Get full text
    Article
  18. 17598

    Space-Time Resource Integrated Optimization Method for Time-of-Day Division at Intersection Based on Multidimensional Traffic Flows by Zijun Liang, Xuejuan Zhan, Wei Kong, Yun Xiao

    Published 2023-01-01
    “…By analyzing the traffic-flow data of 8, 4, 2, and 1 dimensions commonly used at the intersection, the dynamic Fisher algorithm is used to complete the time segment division of the traffic-flow sequence of different dimensions. …”
    Get full text
    Article
  19. 17599

    Optimizing the Location of Virtual Stations in Free-Floating Bike-Sharing Systems with the User Demand during Morning and Evening Rush Hours by Zhuo Sun, Yiming Li, Yi Zuo

    Published 2019-01-01
    “…As an alternative solution, this article proposes a clustering algorithm, which can solve this problem in real time. …”
    Get full text
    Article
  20. 17600

    Issues occult hepatitis B virus infection by I. A. Morozov, L. Yu. Ilchenko, N. I. Gromova, I. G. Fyedorov, I. V. Gordeychuk, A. K. Knyazhentseva, E. V. Zverkova, M. I. Mikhaylov

    Published 2012-07-01
    “…Molecular biologic enzymelinked immunoassay (ELISA), polymerase chain reaction (PCR) and morphological (immunohistochemistry, electron microscopy) methods were utilized for diagnostics.Results. Novel two-stage algorithm of diagnostics of CHB occult form was developed. …”
    Get full text
    Article