-
18761
The impact of environmental variables on reed stands of the intermittent Lake Cerknica, Slovenia: 40 years of change
Published 2025-01-01“…Decision tree-based data mining using the M5P algorithm effectively identified significant changes in MSAVI2. …”
Get full text
Article -
18762
Influence of MHC on genetic diversity and testicular expression of linked olfactory receptor genes
Published 2025-02-01“…We observed significantly higher allelic diversity (P < 0.01) in ORs with strong linkage disequilibrium (LD) to SLA compared to those with weak or no LD, and we identified 48 SLA class I-OR haplotypes using the expectation-maximization algorithm. The genetic diversity of SLA-linked ORs was positively correlated with their expression levels in the testis. …”
Get full text
Article -
18763
Technology applications in bovine gait analysis: A scoping review.
Published 2023-01-01“…A scoping literature review was conducted according to PRISMA guidelines. A search algorithm based on PICO framework generated three components-bovine, gait, and technology-to address our objectives. …”
Get full text
Article -
18764
A transferable approach for quantifying benthic fish sizes and densities in annotated underwater images
Published 2025-01-01“…Numeric and biomass density are estimated through a deterministic machine vision algorithm that requires a user‐provided length‐weight relationship for species of interest and calibration images. …”
Get full text
Article -
18765
Acetic Acid Production from Aspergillus terreus Isolated from Some Agricultural Soils Collected from Selected Locations within the North Gondar Zone, Amhara Region, Ethiopia
Published 2024-01-01“…A sequence similarity of 98.5% to A. terreus isolate LL2 (KIA) was obtained by comparing the Aspergillus isolate to a reference sequence in the GenBank using the BLAST algorithm. It can be concluded from this study that A. terreus isolated from agricultural soil in the north Gondar zone of Ethiopia could produce more acetic acid using barely straw as a substrate.…”
Get full text
Article -
18766
The Prediction of Metro Shield Construction Cost Based on a Backpropagation Neural Network Improved by Quantum Particle Swarm Optimization
Published 2020-01-01“…The determination coefficient, mean absolute percentage error, root mean square error, and mean absolute error, which are frequently used error analysis tools, were used to analyse the calculation errors of different models (the proposed model, a multiple regression method, a traditional BP model, a BP model optimized by the genetic algorithm, and the BP model optimized by the particle swarm optimization). …”
Get full text
Article -
18767
Comprehensive Analysis of N6-Methyladenosine RNA Methylation Regulators in the Diagnosis and Subtype Classification of Acute Myocardial Infarction
Published 2022-01-01“…The consensus clustering algorithm was conducted to categorize AMI patients into two m6A subtypes from the identified m6A regulators. …”
Get full text
Article -
18768
Generative Adversarial Networks for Unmanned Aerial Vehicle Object Detection with Fusion Technology
Published 2022-01-01“…It employs the Generative Adversarial Networks (GAN) algorithm, which iimproves object detection accuracy above benchmark models at the same time maintaining real-time efficiency in an embedded computer for UAVs. …”
Get full text
Article -
18769
Attention-Based CNN Fusion Model for Emotion Recognition During Walking Using Discrete Wavelet Transform on EEG and Inertial Signals
Published 2024-03-01“…To effectively improve the performance of the recognition system, the proposed decision fusion algorithm combines Critic method and majority voting strategy to determine the weight values that affect the final decision results. …”
Get full text
Article -
18770
Time Complexity of Training DNNs With Parallel Computing for Wireless Communications
Published 2025-01-01“…Then, we compare the results with the se-FLOPs for inference of the DNNs and for executing a popular numerical algorithm, and provide the scaling laws of these complexities with respect to the numbers of antennas and users. …”
Get full text
Article -
18771
Sequential Optimization Configuration Method for Power Quality Monitors Considering Photovoltaic Access
Published 2024-01-01“…Firstly, the improved k-means algorithm is used to reduce PV output scenarios and a calculation method for the amplitude of voltage sag considering PV access is proposed. …”
Get full text
Article -
18772
Fast 3D Transmission Tower Detection Based on Virtual Views
Published 2025-01-01“…Finally, by leveraging the projection transformation between the virtual image and the 3D point cloud, combined with a 3D region growing algorithm, the 3D points belonging to the TTs are extracted from the whole 3D point cloud. …”
Get full text
Article -
18773
Seismic and GNSS strain-based probabilistic seismic hazard evaluation for northern Chile using DAS Magnitude Scale
Published 2025-01-01“…Conclusions A PSHA map for Northern Chile, synthesizing seismic catalog data and GNSS strain rates using a Logic Tree-based algorithm, has been developed for a 475-year return period. …”
Get full text
Article -
18774
Optimized ANFIS-Based Robust Nonlinear Control of a Solar Off-Grid Charging Station for Electric Vehicles
Published 2025-01-01“…The controller gains are optimized using the grey wolf optimization algorithm, and global stability is demonstrated through Lyapunov stability analysis. …”
Get full text
Article -
18775
The technology acceptance model and adopter type analysis in the context of artificial intelligence
Published 2025-01-01“…Regression analysis was used to validate TAM, and a k-prototype clustering algorithm was applied to classify participants into adopter categories.ResultsThe psychometric analysis confirmed the validity of the extended TAM. …”
Get full text
Article -
18776
Multi-Disaster Hazard Analysis, The Case of Elazığ Province
Published 2024-07-01“…Various methods, such as the Analytic Hierarchy Process (AHP) and machine learning models, including the Random Forest algorithm, were employed to assess the severity and probability of exposure for each hazard type. …”
Get full text
Article -
18777
Access control relationship prediction method based on GNN dual source learning
Published 2022-10-01“…With the rapid development and wide application of big data technology, users’ unauthorized access to resources becomes one of the main problems that restrict the secure sharing and controlled access to big data resources.The ReBAC (Relationship-Based Access Control) model uses the relationship between entities to formulate access control rules, which enhances the logical expression of policies and realizes dynamic access control.However, It still faces the problems of missing entity relationship data and complex relationship paths of rules.To overcome these problems, a link prediction model LPMDLG based on GNN dual-source learning was proposed to transform the big data entity-relationship prediction problem into a link prediction problem with directed multiple graphs.A topology learning method based on directed enclosing subgraphs was designed in this modeled.And a directed dual-radius node labeling algorithm was proposed to learn the topological structure features of nodes and subgraphs from entity relationship graphs through three segments, including directed enclosing subgraph extraction, subgraph node labeling calculation and topological structure feature learning.A node embedding feature learning method based on directed neighbor subgraph was proposed, which incorporated elements such as attention coefficients and relationship types, and learned its node embedding features through the sessions of directed neighbor subgraph extraction and node embedding feature learning.A two-source fusion scoring network was designed to jointly calculate the edge scores by topology and node embedding to obtain the link prediction results of entity-relationship graphs.The experiment results of link prediction show that the proposed model obtains better prediction results under the evaluation metrics of AUC-PR, MRR and Hits@N compared with the baseline models such as R-GCN, SEAL, GraIL and TACT.The ablation experiment results illustrate that the model’s dual-source learning scheme outperforms the link prediction effect of a single scheme.The rule matching experiment results verify that the model achieves automatic authorization of some entities and compression of the relational path of rules.The model effectively improves the effect of link prediction and it can meet the demand of big data access control relationship prediction.…”
Get full text
Article -
18778
Multistage identification method for real-time abnormal events of streaming data
Published 2019-12-01“…The identification method proposed in this article first takes advantages of the dynamic time warping algorithm, which is widely applied in the field of audio recognition, to build an anti-aliasing model and identifies whether the perceived data are disaster signal based on the similarity fitting between them and the template waveform of historical disaster data, and second, since the real-time monitoring data are continuous streaming data, it is necessary to identify the start point of the disaster waveform before the identification of the disaster signal. …”
Get full text
Article -
18779
A novel machine learning-based immune prognostic signature for improving clinical outcomes and guiding therapy in colorectal cancer: an integrated bioinformatics and experimental s...
Published 2025-01-01“…Considering the high incidence and mortality of colorectal cancer (CRC), in this study, an integrated machine learning survival framework incorporating 93 different algorithmic combinations was utilized to determine the optimal strategy for developing an immune-related prognostic signature (IRPS) based on the average C-index across the four CRC cohorts. …”
Get full text
Article -
18780
Bilingual hate speech detection on social media: Amharic and Afaan Oromo
Published 2025-02-01“…According to the experiment, BiLSTM with FastText feature extraction is an outperforming the other algorithm by achieving a 78.05% accuracy for Bilingual Amharic Afaan Oromo hate speech detection. …”
Get full text
Article