Showing 18,761 - 18,780 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 18761

    The impact of environmental variables on reed stands of the intermittent Lake Cerknica, Slovenia: 40 years of change by Nik Ojdanič, Alenka Gaberščik, Igor Zelnik, Aleksandra Golob

    Published 2025-01-01
    “…Decision tree-based data mining using the M5P algorithm effectively identified significant changes in MSAVI2. …”
    Get full text
    Article
  2. 18762

    Influence of MHC on genetic diversity and testicular expression of linked olfactory receptor genes by Mingue Kang, Byeongyong Ahn, Jae Yeol Shin, Hye-Sun Cho, Jongan Lee, Chankyu Park

    Published 2025-02-01
    “…We observed significantly higher allelic diversity (P < 0.01) in ORs with strong linkage disequilibrium (LD) to SLA compared to those with weak or no LD, and we identified 48 SLA class I-OR haplotypes using the expectation-maximization algorithm. The genetic diversity of SLA-linked ORs was positively correlated with their expression levels in the testis. …”
    Get full text
    Article
  3. 18763

    Technology applications in bovine gait analysis: A scoping review. by Amir Nejati, Anna Bradtmueller, Elise Shepley, Elsa Vasseur

    Published 2023-01-01
    “…A scoping literature review was conducted according to PRISMA guidelines. A search algorithm based on PICO framework generated three components-bovine, gait, and technology-to address our objectives. …”
    Get full text
    Article
  4. 18764

    A transferable approach for quantifying benthic fish sizes and densities in annotated underwater images by Peter C. Esselman, Shadi Moradi, Joseph Geisz, Christopher Roussi

    Published 2025-01-01
    “…Numeric and biomass density are estimated through a deterministic machine vision algorithm that requires a user‐provided length‐weight relationship for species of interest and calibration images. …”
    Get full text
    Article
  5. 18765

    Acetic Acid Production from Aspergillus terreus Isolated from Some Agricultural Soils Collected from Selected Locations within the North Gondar Zone, Amhara Region, Ethiopia by Kidist Alemayehu, Tamene Milkessa Jiru, Nega Berhane

    Published 2024-01-01
    “…A sequence similarity of 98.5% to A. terreus isolate LL2 (KIA) was obtained by comparing the Aspergillus isolate to a reference sequence in the GenBank using the BLAST algorithm. It can be concluded from this study that A. terreus isolated from agricultural soil in the north Gondar zone of Ethiopia could produce more acetic acid using barely straw as a substrate.…”
    Get full text
    Article
  6. 18766

    The Prediction of Metro Shield Construction Cost Based on a Backpropagation Neural Network Improved by Quantum Particle Swarm Optimization by Lanjun Liu, Denghui Liu, Han Wu, Xinyu Wang

    Published 2020-01-01
    “…The determination coefficient, mean absolute percentage error, root mean square error, and mean absolute error, which are frequently used error analysis tools, were used to analyse the calculation errors of different models (the proposed model, a multiple regression method, a traditional BP model, a BP model optimized by the genetic algorithm, and the BP model optimized by the particle swarm optimization). …”
    Get full text
    Article
  7. 18767

    Comprehensive Analysis of N6-Methyladenosine RNA Methylation Regulators in the Diagnosis and Subtype Classification of Acute Myocardial Infarction by Xianpei Wang, Ying Wu, Ruoyao Guo, Linwei Zhao, Juanjuan Yan, Chuanyu Gao

    Published 2022-01-01
    “…The consensus clustering algorithm was conducted to categorize AMI patients into two m6A subtypes from the identified m6A regulators. …”
    Get full text
    Article
  8. 18768

    Generative Adversarial Networks for Unmanned Aerial Vehicle Object Detection with Fusion Technology by Nageswara Guptha M, Y. K. Guruprasad, Yuvaraja Teekaraman, Ramya Kuppusamy, Amruth Ramesh Thelkar

    Published 2022-01-01
    “…It employs the Generative Adversarial Networks (GAN) algorithm, which iimproves object detection accuracy above benchmark models at the same time maintaining real-time efficiency in an embedded computer for UAVs. …”
    Get full text
    Article
  9. 18769

    Attention-Based CNN Fusion Model for Emotion Recognition During Walking Using Discrete Wavelet Transform on EEG and Inertial Signals by Yan Zhao, Ming Guo, Xiangyong Chen, Jianqiang Sun, Jianlong Qiu

    Published 2024-03-01
    “…To effectively improve the performance of the recognition system, the proposed decision fusion algorithm combines Critic method and majority voting strategy to determine the weight values that affect the final decision results. …”
    Get full text
    Article
  10. 18770

    Time Complexity of Training DNNs With Parallel Computing for Wireless Communications by Pengyu Cong, Chenyang Yang, Shengqian Han, Shuangfeng Han, Xiaoyun Wang

    Published 2025-01-01
    “…Then, we compare the results with the se-FLOPs for inference of the DNNs and for executing a popular numerical algorithm, and provide the scaling laws of these complexities with respect to the numbers of antennas and users. …”
    Get full text
    Article
  11. 18771

    Sequential Optimization Configuration Method for Power Quality Monitors Considering Photovoltaic Access by Xiaorui Liang, Qiming Zhong, Huaying Zhang, Ying Wang, Huicong Liu

    Published 2024-01-01
    “…Firstly, the improved k-means algorithm is used to reduce PV output scenarios and a calculation method for the amplitude of voltage sag considering PV access is proposed. …”
    Get full text
    Article
  12. 18772

    Fast 3D Transmission Tower Detection Based on Virtual Views by Liwei Zhou, Jiaying Tan, Jing Fu, Guiwei Shao

    Published 2025-01-01
    “…Finally, by leveraging the projection transformation between the virtual image and the 3D point cloud, combined with a 3D region growing algorithm, the 3D points belonging to the TTs are extracted from the whole 3D point cloud. …”
    Get full text
    Article
  13. 18773

    Seismic and GNSS strain-based probabilistic seismic hazard evaluation for northern Chile using DAS Magnitude Scale by Ranjit Das, Claudio Meneses, Hua Wang

    Published 2025-01-01
    “…Conclusions A PSHA map for Northern Chile, synthesizing seismic catalog data and GNSS strain rates using a Logic Tree-based algorithm, has been developed for a 475-year return period. …”
    Get full text
    Article
  14. 18774

    Optimized ANFIS-Based Robust Nonlinear Control of a Solar Off-Grid Charging Station for Electric Vehicles by Bibi Tabassam Gul, Iftikhar Ahmad, Habibur Rehman, Ammar Hasan

    Published 2025-01-01
    “…The controller gains are optimized using the grey wolf optimization algorithm, and global stability is demonstrated through Lyapunov stability analysis. …”
    Get full text
    Article
  15. 18775

    The technology acceptance model and adopter type analysis in the context of artificial intelligence by Fabio Ibrahim, Johann-Christoph Münscher, Monika Daseking, Nils-Torge Telle

    Published 2025-01-01
    “…Regression analysis was used to validate TAM, and a k-prototype clustering algorithm was applied to classify participants into adopter categories.ResultsThe psychometric analysis confirmed the validity of the extended TAM. …”
    Get full text
    Article
  16. 18776

    Multi-Disaster Hazard Analysis, The Case of Elazığ Province by Fethi Ahmet Canpolat

    Published 2024-07-01
    “…Various methods, such as the Analytic Hierarchy Process (AHP) and machine learning models, including the Random Forest algorithm, were employed to assess the severity and probability of exposure for each hazard type. …”
    Get full text
    Article
  17. 18777

    Access control relationship prediction method based on GNN dual source learning by Dibin SHAN, Xuehui DU, Wenjuan WANG, Aodi LIU, Na WANG

    Published 2022-10-01
    “…With the rapid development and wide application of big data technology, users’ unauthorized access to resources becomes one of the main problems that restrict the secure sharing and controlled access to big data resources.The ReBAC (Relationship-Based Access Control) model uses the relationship between entities to formulate access control rules, which enhances the logical expression of policies and realizes dynamic access control.However, It still faces the problems of missing entity relationship data and complex relationship paths of rules.To overcome these problems, a link prediction model LPMDLG based on GNN dual-source learning was proposed to transform the big data entity-relationship prediction problem into a link prediction problem with directed multiple graphs.A topology learning method based on directed enclosing subgraphs was designed in this modeled.And a directed dual-radius node labeling algorithm was proposed to learn the topological structure features of nodes and subgraphs from entity relationship graphs through three segments, including directed enclosing subgraph extraction, subgraph node labeling calculation and topological structure feature learning.A node embedding feature learning method based on directed neighbor subgraph was proposed, which incorporated elements such as attention coefficients and relationship types, and learned its node embedding features through the sessions of directed neighbor subgraph extraction and node embedding feature learning.A two-source fusion scoring network was designed to jointly calculate the edge scores by topology and node embedding to obtain the link prediction results of entity-relationship graphs.The experiment results of link prediction show that the proposed model obtains better prediction results under the evaluation metrics of AUC-PR, MRR and Hits@N compared with the baseline models such as R-GCN, SEAL, GraIL and TACT.The ablation experiment results illustrate that the model’s dual-source learning scheme outperforms the link prediction effect of a single scheme.The rule matching experiment results verify that the model achieves automatic authorization of some entities and compression of the relational path of rules.The model effectively improves the effect of link prediction and it can meet the demand of big data access control relationship prediction.…”
    Get full text
    Article
  18. 18778

    Multistage identification method for real-time abnormal events of streaming data by Hao Luo, Kexin Sun, Junlu Wang, Chengfeng Liu, Linlin Ding, Baoyan Song

    Published 2019-12-01
    “…The identification method proposed in this article first takes advantages of the dynamic time warping algorithm, which is widely applied in the field of audio recognition, to build an anti-aliasing model and identifies whether the perceived data are disaster signal based on the similarity fitting between them and the template waveform of historical disaster data, and second, since the real-time monitoring data are continuous streaming data, it is necessary to identify the start point of the disaster waveform before the identification of the disaster signal. …”
    Get full text
    Article
  19. 18779

    A novel machine learning-based immune prognostic signature for improving clinical outcomes and guiding therapy in colorectal cancer: an integrated bioinformatics and experimental s... by Yuanchun Zhao, Dexu Xun, Jiajia Chen, Xin Qi

    Published 2025-01-01
    “…Considering the high incidence and mortality of colorectal cancer (CRC), in this study, an integrated machine learning survival framework incorporating 93 different algorithmic combinations was utilized to determine the optimal strategy for developing an immune-related prognostic signature (IRPS) based on the average C-index across the four CRC cohorts. …”
    Get full text
    Article
  20. 18780

    Bilingual hate speech detection on social media: Amharic and Afaan Oromo by Teshome Mulugeta Ababu, Michael Melese Woldeyohannis, Emuye Bawoke Getaneh

    Published 2025-02-01
    “…According to the experiment, BiLSTM with FastText feature extraction is an outperforming the other algorithm by achieving a 78.05% accuracy for Bilingual Amharic Afaan Oromo hate speech detection. …”
    Get full text
    Article