-
461
Knowledge discovery from database: MRI radiomic features to assess recurrence risk in high-grade meningiomas
Published 2025-01-01“…The pipeline using MinMax_PCC_Cluster_19 of T2WI yielded the highest efficiency with an IBS of 0.189, 0.175, 0.185 and C-index of 0.783, 0.66, 0.649 in the train, test and validation sets. …”
Get full text
Article -
462
Research on Influence of Water-Cement Ratio on Reinforcement Effect for Permeation Grouting in Sand Layer
Published 2020-01-01Get full text
Article -
463
Analysis of College Students’ Public Opinion Based on Machine Learning and Evolutionary Algorithm
Published 2019-01-01“…The experiment result shows that the new pipeline works well, and the predictor has high accuracy on predicting fresh samples. …”
Get full text
Article -
464
Rapid Identification of Drug-Resistant Tuberculosis Genes Using Direct PCR Amplification and Oxford Nanopore Technology Sequencing
Published 2022-01-01“…The pipeline was validated by Sanger sequencing and exhibited 100% concordance with the identified variants. …”
Get full text
Article -
465
-
466
A Multitask Multiview Neural Network for End-to-End Aspect-Based Sentiment Analysis
Published 2021-09-01“…Existing methods deal with both subtasks one by one in a pipeline manner, in which there lies some problems in performance and real application. …”
Get full text
Article -
467
PPCM: Combing Multiple Classifiers to Improve Protein-Protein Interaction Prediction
Published 2015-01-01“…This pipeline will be useful for predicting PPI in nonmodel species.…”
Get full text
Article -
468
Influence of Support Stiffness on Dynamic Characteristics of the Hydraulic Pipe Subjected to Basic Vibration
Published 2018-01-01“…This study can get a significant access to the structural design of the pipeline under basic vibration.…”
Get full text
Article -
469
Kajian Perancangan dan Evaluasi PLTMH Jorong Patamuan Kabupaten Pasaman dalam Mengatasi Kekurangan Listrik Pedesaan
Published 2017-08-01“…The main channel is composed of a trunk made of concrete channels open with a size of 40 x 40 x 40 cm and a pipeline for rapid pipeline with a length of 28 m using the pipe 8 inches or 20 cm. …”
Get full text
Article -
470
Effect of Compressed Gas on Deep Mine Long-Distance Backfill Pipe Flushing: From Laboratory to Industrial Tests
Published 2024-01-01“…The criterion for the completion of pipeline cleaning is to reduce the water solid content of the flushing pipeline from the initial value to 1%. …”
Get full text
Article -
471
ENERGY EFFICIENCY AND ASSESSMENT METHODS OF TECHNOLOGICAL SYSTEMS OF WATER SUPPLY AND WATER DISPOSAL
Published 2016-09-01“…The article describes the management system of energy efficiency of pipeline water supply and water disposal systems. The management system is based on information base of statistic data of power, hydraulic and industrial indexes of wastewater management. …”
Get full text
Article -
472
Optimization of Engineering Pipe-Line Networks at Hydraulic Calculation
Published 2006-08-01“…The given paper proposes a methodology for hydraulic calculation of engineering pipeline networks. This methodology allows to reduce cost of the networks up to 5% at the stage of designing while ensuring the same technological parameters and reliability…”
Get full text
Article -
473
Spherical harmonics texture extraction for versatile analysis of biological objects.
Published 2025-01-01“…Additionally, this technique can also be applied through a Python package to provide extra feature extraction for any object classification pipeline or downstream analysis.…”
Get full text
Article -
474
Finite strain formulation of the discrete equilibrium gap principle: application to direct parameter estimation from large full-fields measurements
Published 2025-01-01“…Additionally, we developed an estimation pipeline to quantify the robustness of our new EGM formulation to noise, and we compared its performance to other classical estimation methods, namely the Finite Element Model Updating (FEMU) method and the Virtual Fields Method (VFM). …”
Get full text
Article -
475
COVFlow: phylodynamics analyses of viruses from selected SARS-CoV-2 genome sequences
Published 2023-10-01“…We illustrate the potential of this tool by studying two sets of sequences from the Delta variant in two French regions. This pipeline can facilitate the use of virus sequence data at the local level, for instance, to track the dynamics of a particular lineage or variant in a region of interest. …”
Get full text
Article -
476
Assessing Air-Pocket Pressure Peaks During Water Filling Operations Using Dimensionless Equations
Published 2025-01-01“…Air pockets can become trapped at high points in pipelines with irregular profiles, particularly during service interruptions. …”
Get full text
Article -
477
Pulsating Bubble Collapse and Jet Characteristics Near the Nozzle of Underwater Tube
Published 2025-01-01“…This study provides valuable insights into the dynamic behavior of bubble collapse near the nozzle of a submerged tube, which can provide safety measures for pipeline equipment.…”
Get full text
Article -
478
Investigation of the Sedimentation Property of Backfill Material on the Basis of Rheological Test: A Case Study of Iron Tailings
Published 2018-01-01“…A correlation between the pipeline rheology and filling material sedimentation performance was established, which provides a practical guide to avoid pipeline blocking while transporting the filling material.…”
Get full text
Article -
479
Construction of a pathogenic microorganism detection method based on third-generation nanopore sequencing data
Published 2025-02-01“…Results Compared with two previous methods, i.e., pathogen identification via microbiological culture or a previously reported metagenomic pipeline, pathogens were detected in 23 out of the 40 samples using our method, with the same results as those of the previous two methods. …”
Get full text
Article -
480
Method on intrusion detection for industrial internet based on light gradient boosting machine
Published 2023-04-01“…Intrusion detection is a critical security protection technology in the industrial internet, and it plays a vital role in ensuring the security of the system.In order to meet the requirements of high accuracy and high real-time intrusion detection in industrial internet, an industrial internet intrusion detection method based on light gradient boosting machine optimization was proposed.To address the problem of low detection accuracy caused by difficult-to-classify samples in industrial internet business data, the original loss function of the light gradient boosting machine as a focal loss function was improved.This function can dynamically adjust the loss value and weight of different types of data samples during the training process, reducing the weight of easy-to-classify samples to improve detection accuracy for difficult-to-classify samples.Then a fruit fly optimization algorithm was used to select the optimal parameter combination of the model for the problem that the light gradient boosting machine has many parameters and has great influence on the detection accuracy, detection time and fitting degree of the model.Finally, the optimal parameter combination of the model was obtained and verified on the gas pipeline dataset provided by Mississippi State University, then the effectiveness of the proposed mode was further verified on the water dataset.The experimental results show that the proposed method achieves higher detection accuracy and lower detection time than the comparison model.The detection accuracy of the proposed method on the gas pipeline dataset is at least 3.14% higher than that of the comparison model.The detection time is 0.35s and 19.53s lower than that of the random forest and support vector machine in the comparison model, and 0.06s and 0.02s higher than that of the decision tree and extreme gradient boosting machine, respectively.The proposed method also achieved good detection results on the water dataset.Therefore, the proposed method can effectively identify attack data samples in industrial internet business data and improve the practicality and efficiency of intrusion detection in the industrial internet.…”
Get full text
Article