-
17881
A Brain-Computer Interface for Teleoperation of a Semiautonomous Mobile Robotic Assistive System Using SLAM
Published 2022-01-01“…The mobile base’s SLAM algorithm has obstacle avoidance capability and path planning to assist the robot maneuver safely. …”
Get full text
Article -
17882
Human Evolution: the Limits of Technocentrism
Published 2021-06-01“…Technology is a technique that has gained recognition and has been mastered by those who did not invent it but used the algorithm proposed by the inventor, a detailed and functionally sound explanation, a method of constructing this technique. …”
Get full text
Article -
17883
Accelerating Multiple Compound Comparison Using LINGO-Based Load-Balancing Strategies on Multi-GPUs
Published 2015-01-01“…In this paper, we propose a GPU-based algorithm for MCC problem, called CUDA-MCC, on single- and multi-GPUs. …”
Get full text
Article -
17884
A Novel Approach of Label Construction for Predicting Remaining Useful Life of Machinery
Published 2021-01-01“…Furthermore, the fuzzy C-means (FCM) algorithm is innovatively used to divide the degradation data into several stages to obtain the turning point of degradation. …”
Get full text
Article -
17885
Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments
Published 2025-12-01“…The future work is proposed to build superior datasets and use accurate algorithm to improve the security models. This paper focuses on explainability as a way of making the AI model creation process and any consequent decisions explainable and transparent. …”
Get full text
Article -
17886
Development and Implementation of an FPGA-Embedded Multimedia Remote Monitoring System for Information Technology Server Room Management
Published 2024-01-01“…Additionally, the system employs the fast Fourier transform algorithm and butterfly operations to derive voltage and current AC quantities, while utilizing relative temperature differences to identify equipment faults within the server room. …”
Get full text
Article -
17887
Functional genomic imaging (FGI), a virtual tool for visualization of functional gene expression modules in heterogeneous tumor samples
Published 2025-01-01“…FGI uses weighted gene co-expression network analysis (WGCNA), followed by a modified Phenograph clustering algorithm to identify co-expression gene clusters. …”
Get full text
Article -
17888
Parametric Yield-Driven Resource Binding in High-Level Synthesis with Multi-Vth/Vdd Library and Device Sizing
Published 2012-01-01“…A parametric yield-driven resource binding algorithm is then proposed, which uses the characterized power and delay distributions and efficiently maximizes power yield under a timing yield constraint. …”
Get full text
Article -
17889
Predicting and synthesizing terahertz spoof surface plasmon polariton devices with a convolutional neural network model
Published 2025-01-01“…Three examples are provided for inversely designing several sensor devices and absorbers in the terahertz band using the proposed CNN and the genetic optimization algorithm.…”
Get full text
Article -
17890
Non-Stationary Extreme Runoff Prediction Model of Snowmelt Flood in Flood Season Based on VMD-NGO-LSTM and Its Application
Published 2024-06-01“…In order to eliminate the influence of the non-stationarity of extreme runoff in the flood season on the prediction results in the basin, the variational mode decomposition (VMD) algorithm was introduced, and a combined prediction model (VMD-NGO-LSTM) based on northern goshawk optimization (NGO) and long short-term memory neural network (LSTM) was proposed. …”
Get full text
Article -
17891
A Novel Ferroptosis-Related Gene Signature for Prognosis Prediction in Ewing Sarcoma
Published 2022-01-01“…Based on the train cohort, AURKA, RGS4, and RIPK1 were identified as key genes through the univariate Cox regression analysis, the random survival forest algorithm, and the multivariate Cox regression analysis and utilized to establish a prognostic FRG signature. …”
Get full text
Article -
17892
A review of state-of-the-art resolution improvement techniques in SPECT imaging
Published 2025-01-01“…It delves into advancements in detector design and modifications, projection sampling techniques, traditional reconstruction algorithm development and optimization, and the emerging role of deep learning. …”
Get full text
Article -
17893
A Unified Bayesian Model for Generalized Community Detection in Attribute Networks
Published 2020-01-01“…To optimize the objective function of the model, we use an effective Gibbs sampling algorithm. Experiments on a number of synthetic and real networks show that our model has superior performance compared with some baselines on community detection.…”
Get full text
Article -
17894
A Deep Learning Based Traffic State Estimation Method for Mixed Traffic Flow Environment
Published 2022-01-01“…This article presents a traffic state estimation method based on a deep learning algorithm under a low and dynamic CVs penetration rate environment. …”
Get full text
Article -
17895
C-BERT: A Mongolian reverse dictionary based on fused lexical semantic clustering and BERT
Published 2025-01-01“…Initially, the K-means algorithm was used to cluster preprocessed entries from well-known Mongolian dictionaries into 5000 clusters, forming a comprehensive training set. …”
Get full text
Article -
17896
MARKETING RESEARCH IN THE FIELD OF PUBLIC ADMINISTRATION
Published 2024-12-01“…The data collection algorithm was summarized and the analysis of the main elements of the marketing research process for the field of public administration was carried out, in particular, the question of qualitative research methods, which can be used when collecting primary information from respondents, was investigated in detail. …”
Get full text
Article -
17897
Machine vision model for drip leakage detection of pipeline.
Published 2025-01-01“…The droplet boundary extraction algorithm is proposed, and the three-dimensional model of the target droplet is established, so the volume calculation problem of the droplet is solved, which provides a way of thinking for drip leakage detection of the pipeline.…”
Get full text
Article -
17898
Automated speech therapy through personalized pronunciation correction using reinforcement learning and large language models
Published 2025-03-01“…The system employs a custom Proximal Policy Optimization (PPO) algorithm for precise pronunciation evaluation and an Large Language Models to deliver detailed, encouraging, and user-specific feedback. …”
Get full text
Article -
17899
Information Security Risk Management Model for Big Data
Published 2022-01-01“…On the other hand, this research also optimizes and improves the fuzzy mathematical analysis method and proposes a fuzzy comprehensive assessment method as the core algorithm for the risk assessment layer in the model. …”
Get full text
Article -
17900
Cost-efficient behavioral modeling of antennas by means of global sensitivity analysis and dimensionality reduction
Published 2025-01-01“…Our methodology involves a rapid global sensitivity analysis (GSA) algorithm developed to determine a set of parameter space directions that maximize antenna response variability. …”
Get full text
Article