-
17581
Fungal Infection following Total Elbow Arthroplasty
Published 2019-01-01“…The purpose of this report is to describe our experience and outline our treatment algorithm for a rare case of prosthetic joint infection (PJI) following a TEA. …”
Get full text
Article -
17582
IEEE 802.15.4 based topology control and routing for mobile Sink wireless sensor networks
Published 2011-01-01“…Based on the standard of IEEE 802.15.4b,a cross-layer protocol design combining cluster-tree formatting and mobile routing was proposed for query-driven wireless sensor networks with mobile Sink(s).Firstly,energy consumption,network connectivity,load balancing and sub-tree depth were employed as the evaluation factors.A topology evaluation function under a multi-objective optimization model was defined to construct the stable and optimal underlying clus-ter-tree network.Secondly,the beacon frame scheduling based distributed sleep synchronization algorithm in IEEE 802.15.4 MAC was improved,which was used to maintain the network synchronization and topology correction on low duty-cycle.Thirdly,the parent-child relationships established during the topology formatting according to "first beacon","best links","top level" rules were exploited to build the two-way routing paths between mobile Sink(s) and the nodes within N-Hop range.Eventually,the topology control schemes at MAC layer and the query routing approach at network layer were completely implemented in the protocol stack of TinyOS.The experimental results show that the evaluation function can effectively reflect the quality of network formatting.Jointed with the sleep synchronization mechanism un-der the topology generated using the rule of "best links",the N-Hop reactive routing exhibits high energy-efficiency.…”
Get full text
Article -
17583
Reusable attribute-based signature with attribute revocation and authenticated key agreement
Published 2024-04-01“…Additionally, an attribute-Hash filter algorithm was introduced to facilitate a direct attribute revocation mechanism within the proposed VP-ABS scheme. …”
Get full text
Article -
17584
A novel oversampling method based on Wasserstein CGAN for imbalanced classification
Published 2025-02-01“…It generates an initial balanced dataset from minority class samples using the CGAN oversampling approach and then uses a noise and boundary recognition method based on K-means and $$k$$ k nearest neighbors algorithm to address the noise and boundary-blurring issues. …”
Get full text
Article -
17585
An individual-level probabilistic model and solution for control of infectious diseases
Published 2024-10-01“…Moreover, the same theoretical result shows why the simple algorithm of repeated integration can find numerical solutions for virtually all initial conditions. …”
Get full text
Article -
17586
Invariant Measures Based on the U-Correlation Integral: An Application to the Study of Human Voice
Published 2018-01-01“…These invariants were estimated through an automated algorithm based on the recently proposed U-correlation integral. …”
Get full text
Article -
17587
Estimation for Akshaya Failure Model with Competing Risks under Progressive Censoring Scheme with Analyzing of Thymic Lymphoma of Mice Application
Published 2022-01-01“…We apply the Metropolis–Hasting algorithm to generate MCMC samples from the posterior density function. …”
Get full text
Article -
17588
Sintesis Dimensi Manipulator Paralel Bidang Dua Derajat Kebebasan Dengan Rantai Kinematik Paralelogram Simetris
Published 2021-10-01“…An optimization process using non-sorted dominated genetic algorithm II (NSGA-II) was carried out for maximization of (<em>i</em>) <em>r</em><sub>MIC</sub> (the radius of the maximum inscribed circle) and GCI (global conditioning index), and (ii) <em>r</em><sub>MIC</sub> and GTI (global transmission index). …”
Get full text
Article -
17589
Shield-Roof Interaction in Longwall Panels: Insights from Field Data and Their Application to Ground Control
Published 2018-01-01“…Early warning of severe roof weighting can be achieved by establishing a warning model based on the decision tree algorithm. Apart from this, we can also assess the working condition of yield valve and diagnose fluid leakage of shield cylinder using the SSRI system. …”
Get full text
Article -
17590
Type-II Fuzzy Decision Support System for Fertilizer
Published 2014-01-01“…The complexity of our algorithm is O(mnr), where m is the height of the raster, n is the width of the raster, and r is the number of expert rules.…”
Get full text
Article -
17591
Postmortem Analysis of Decayed Online Social Communities: Cascade Pattern Analysis and Prediction
Published 2018-01-01Get full text
Article -
17592
A Novel Sparse Array for Localization of Mixed Near-Field and Far-Field Sources
Published 2021-01-01“…The largest consecutive lags and composition method of ESNA are also given, under a given number of sensors.Our algorithm has moderate computation complexity, which provides a higher resolution and improves the parameters’ estimation accuracy. …”
Get full text
Article -
17593
Double-layered wrap-around sensor network for three-dimensional positioning of acoustic emission sources and its effect on monitoring crack propagation in rock samples
Published 2018-09-01“…Furthermore, based on the polar formation algorithm, acoustic emission source was positioned to explore the propagation of microscopic cracks in cylindrical rock samples and this was further validated by the acoustic emission activity index. …”
Get full text
Article -
17594
Secure Microprocessor-Controlled Prosthetic Leg for Elderly Amputees: Preliminary Results
Published 2011-01-01“…The patient behaves naturally, while the controller analyses his movements in order to detect his intention to sit down. The detection algorithm is based on a reference pattern, calibrated individually, to which the sensor data are compared, and submitted to a set of tests allowing the discrimination of the intention to sit down from other activities. …”
Get full text
Article -
17595
Hybrid multiscale landmark and deformable image registration
Published 2007-07-01“…Vese, A multiscale image representationusing hierarchical $(BV,L^2)$ decompositions, Multiscale Modeling andSimulations, vol. 2, no. 4, pp. 554--579, 2004, is reviewed, and animage registration algorithm is developed based on combining themultiscale decomposition with landmark and deformable techniques.Successful registration of medical images is achieved by firstobtaining a hierarchical multiscale decomposition of the images andthen using landmark-based registration to register the resultingcoarse scales. …”
Get full text
Article -
17596
Effect of Bodybuilding and Fitness Exercise on Physical Fitness Based on Deep Learning
Published 2022-01-01“…In this paper, based on the deep learning algorithm, compared with the recurrent neural network, the gated recurrent neural network is more suitable for processing sequence problems. …”
Get full text
Article -
17597
A Dynamic Framework for Community-Facility Siting with Inter-Community Competition
Published 2025-01-01“…This framework includes the BOMSDM itself, the data collection and processing method, and the constrained NSGA-II as the computational algorithm. Under this framework, the BOMSDM, along with three comparative frameworks derived from traditional models—including a random allocation non-incremental model, a random allocation incremental model, and an average allocation non-incremental model—was applied to a real-world scenario in Shaoxing. …”
Get full text
Article -
17598
Space-Time Resource Integrated Optimization Method for Time-of-Day Division at Intersection Based on Multidimensional Traffic Flows
Published 2023-01-01“…By analyzing the traffic-flow data of 8, 4, 2, and 1 dimensions commonly used at the intersection, the dynamic Fisher algorithm is used to complete the time segment division of the traffic-flow sequence of different dimensions. …”
Get full text
Article -
17599
Optimizing the Location of Virtual Stations in Free-Floating Bike-Sharing Systems with the User Demand during Morning and Evening Rush Hours
Published 2019-01-01“…As an alternative solution, this article proposes a clustering algorithm, which can solve this problem in real time. …”
Get full text
Article -
17600
Issues occult hepatitis B virus infection
Published 2012-07-01“…Molecular biologic enzymelinked immunoassay (ELISA), polymerase chain reaction (PCR) and morphological (immunohistochemistry, electron microscopy) methods were utilized for diagnostics.Results. Novel two-stage algorithm of diagnostics of CHB occult form was developed. …”
Get full text
Article