-
17741
Undrained bearing capacity of obliquely-eccentrically loaded shallow foundations overlying a heterogeneous and inherently anisotropic clay deposit
Published 2025-01-01“…Furthermore, the inherent anisotropy is accounted for by adopting different values of undrained shear strength along different directions within the soil medium, employing an iterative-based algorithm. The results of numerical simulations are utilized to investigate the influences of natural soil heterogeneity and inherent anisotropy on the ultimate bearing capacity, failure envelope, and failure mechanism of shallow foundations subjected to the various combinations of vertical-horizontal (V-H) and vertical-moment (V-M) loads.…”
Get full text
Article -
17742
Importance Analysis of Causative Nodes for Accident Chains of Railway Locomotive Operation Based on STPA-PageRank Method
Published 2025-02-01“…Then, the complex network theory and PageRank algorithm were utilised to calculate the importance of every node in directed-weighted network formed by those accident chains. …”
Get full text
Article -
17743
Inhibition of tumour necrosis factor alpha by Etanercept attenuates Shiga toxin-induced brain pathology
Published 2025-02-01“…Analysis of microglial populations using a novel human-in-the-loop deep learning algorithm for the segmentation of microscopic imaging data indicated specific morphological changes, which were reduced to healthy condition after inhibition of TNF-α. …”
Get full text
Article -
17744
Factor Graph-Based Planning as Inference for Autonomous Vehicle Racing
Published 2024-01-01“…We exploit the locality feature of the factor graph structure to integrate the minimum curvature path and local planning computations into a unified algorithm. This diverges from the conventional separation of global and local planning modules, where curvature minimization occurs at the global level. …”
Get full text
Article -
17745
Secure channel estimation model for cognitive radio network physical layer security using two-level shared key authentication
Published 2025-01-01“…The change in channel capacity and utilization augments the need for security through 2-level key shared authentication. The deep learning algorithm verifies the authentication completeness for maximum channel capacity utilization irrespective of adversary interference. …”
Get full text
Article -
17746
Short-Term Traffic Prediction considering Spatial-Temporal Characteristics of Freeway Flow
Published 2021-01-01“…Second, the hybrid model constructed by long short-term memory and K-nearest neighbor (LSTM-KNN) algorithm using transformed grey wolf optimization is discussed. …”
Get full text
Article -
17747
On the enhancement of estimator efficiency of population variance through stratification, transformation, and formulation with application to COVID-19 data
Published 2025-02-01“…This work introduces a novel data-driven machine learning algorithm aiming stratification problem, formally based on subjective approach. …”
Get full text
Article -
17748
Precision Imaging for Early Detection of Esophageal Cancer
Published 2025-01-01“…We employed the Yolov5 model, a state-of-the-art object detection algorithm, to predict early ECA based on the provided images. …”
Get full text
Article -
17749
Modelling COVID-19 in the North American region with a metapopulation network and Kalman filter
Published 2025-03-01“…The model is informed by COVID-19 case data, which are assimilated using the Ensemble Adjustment Kalman filter (EAKF), a Bayesian inference algorithm. Additionally, commuting and mobility data are used to build and adjust the network and movement across locations on a daily basis. …”
Get full text
Article -
17750
A New Asymmetric Fully Homomorphic Encryption Scheme for Cloud Banking Data
Published 2021-01-01“…Our current research provides a new algorithm for a publicly-keyed encryption system to keep bank data from tampering and theft when stored on the cloud computing platform, and our new system achieves fully Homomorphic Encryption, which allows mathematical operations to be performed on the encrypted text without the need for the original text. …”
Get full text
Article -
17751
An Ultrafast Image Simulation Technique with Spatially Variable Point-spread Functions
Published 2025-01-01“…Simulated images are essential in algorithm development and instrument testing for optical telescopes. …”
Get full text
Article -
17752
Weakly-Supervised Deep Shape-From-Template
Published 2025-01-01“…WS-DeepSfT addresses the limitations of existing SfT techniques by combining a weakly-supervised deep neural network (DNN) for registration and a classical As-Rigid-As-Possible (ARAP) algorithm for 3D reconstruction. Unlike previous deep learning-based SfT methods, which require extensive synthetic data and depth sensors for training, WS-DeepSfT only requires regular RGB video of the deforming object and a segmentation mask to discriminate the object from the background. …”
Get full text
Article -
17753
Object-to-Manipulation Graph for Affordance Navigation
Published 2024-05-01“…We first introduce a new dataset for affordance navigation, collected by the proposed affordance algorithm. In order to avoid the high cost of labor, the groundtruth of each episode which is annotated with the interaction data provided by the AI2-THOR simulator. …”
Get full text
Article -
17754
On the Effect of the Patient Table on Attenuation in Myocardial Perfusion Imaging SPECT
Published 2025-01-01“…Methods Jaszczak phantom scans are acquired according to quality control and MPI procedures. An algorithm is developed to automatically remove the patient table from the CT for attenuation correction. …”
Get full text
Article -
17755
AI based predictive acceptability model for effective vaccine delivery in healthcare systems
Published 2024-11-01“…A sample dataset containing 7150 data records with 31 demographic and socioeconomic attributes from PDHS (2017–2018) is used in this paper. Using the LightGBM algorithm, the proposed model constructed on the basis of different machine-learning procedures achieved 98% accuracy to accurately predict the acceptability of vaccines included in the immunization program. …”
Get full text
Article -
17756
Unbiased Feature Selection in Learning Random Forests for High-Dimensional Data
Published 2015-01-01“…Aiming at debiasing feature selection in RFs, we propose a new RF algorithm, called xRF, to select good features in learning RFs for high-dimensional data. …”
Get full text
Article -
17757
The last remnants of the Italian Apennine glaciers: 3-D modeling of the Lower Calderone Glacieret by the IDW spatial interpolation of GPR data
Published 2024-01-01“…We applied a proprietary auto-picking algorithm to track reflections accurately and objectively within three pseudo-3-D GPR data sets that were acquired over the Lower Glacieret in different years. …”
Get full text
Article -
17758
A Deformation Reconstruction Strategy for Integrated Truss Structures Subjected to Thermal–Mechanical Load
Published 2025-01-01“…The proposed approach utilizes Ko displacement theory as the core algorithm, while the least squares optimization method is employed to determine the integration with unknown initial values during the reconstruction process. …”
Get full text
Article -
17759
Identification of Nicotinic Acetylcholine Receptor for N‐Acetylcysteine to Rescue Nicotine‐induced Injury Using Beating Cilia in Primary Tissue Derived Airway Organoids
Published 2025-01-01“…The organoids display apical‐out and basal‐in polarity and are enriched in beating cilia, which are sensitive to smoking challenge and NAC treatment. An algorithm is developed to measure ciliary beating activity by analyzing the altered beating pattern of cilia in response to nicotine challenge and NAC treatment. …”
Get full text
Article -
17760
An Ensemble Learning Based Framework for Traditional Chinese Medicine Data Analysis with ICD-10 Labels
Published 2015-01-01“…The base learners are sorted by accuracy and diversity through nondominated sort (NDS) algorithm and combined through a deep ensemble learning strategy. …”
Get full text
Article