-
2281
A New Method for Defuzzification and Ranking of Fuzzy Numbers Based on the Statistical Beta Distribution
Published 2016-01-01Get full text
Article -
2282
A Hybrid Grey Based KOHONEN Model and Biogeography-Based Optimization for Project Portfolio Selection
Published 2014-01-01“…The problem of selection and the best option are the main subject of operation research science in decision-making theory. …”
Get full text
Article -
2283
Linguistic and didactic specificity of multimodal discourse: possibilities and effectiveness of creolized text application in English teaching
Published 2025-04-01“…The main research methods are linguistic analysis of the text, qualitative and quantitative methods, deduction, generalization. …”
Get full text
Article -
2284
Semantic SLAM using laser-vision data fusion: Enhancing autonomous navigation in unstructured environments
Published 2025-08-01“…The increasing complexity of autonomous navigation environments has necessitated the integration of multi-sensor data into Simultaneous Localisation and Mapping (SLAM) algorithms, as reliance on single-sensor data has proven insufficient. …”
Get full text
Article -
2285
Evaluating snow depth retrievals from Sentinel-1 volume scattering over NASA SnowEx sites
Published 2024-11-01“…Sentinel-1 (S1) SAR data have been used previously in an empirical algorithm to generate snow depth products with near-global coverage, subweekly temporal resolution and spatial resolutions on the order of hundreds of meters to 1 km. …”
Get full text
Article -
2286
PRe-hospital Evaluation of Sensitive TrOponin (PRESTO) Study: multicentre prospective diagnostic accuracy study protocol
Published 2019-10-01“…Introduction Within the UK, chest pain is one of the most common reasons for emergency (999) ambulance calls and the most common reason for emergency hospital admission. …”
Get full text
Article -
2287
Comparison of the efficacy and safety of various anti-inflammatory drugs in urate-lowering therapy initiation in patients with gout (preliminary data)
Published 2021-04-01“…Of the 108 patients with gout, observed in the V.A. Nasonova Research Institute of Rheumatology, 97 (94%), mostly men, entered a single-center prospective study. …”
Get full text
Article -
2288
ANALYSIS OF MULTITEMPORAL AERIAL IMAGES FOR FENYŐFŐ FOREST CHANGE DETECTION
Published 2016-10-01“…Region growing algorithm was used for segmentation of individual tree crowns. …”
Article -
2289
Enabling Power Systems With SQKD in Presence of Remote Nodes
Published 2025-01-01“…Due to the complexity of the allocation problem, this paper develops algorithms based on Density-Based Spatial Clustering of Applications with Noise algorithm (DBSCAN), Dijksra’s algorithm and genetic algorithms. …”
Get full text
Article -
2290
Handling Censoring and Censored Data in Survival Analysis: A Standalone Systematic Literature Review
Published 2021-01-01“…The study recognized the worth of understanding the how’s of handling censoring and censored data in survival analysis and the potential biases it might cause if researchers fail to identify and handle the concepts with utmost care. …”
Get full text
Article -
2291
Group k- Nearest Neighbor Query Method for Uncertainty Data in Obstructed Spaces
Published 2019-06-01“…To deal with the problem of group k nearest neighbor query method for uncertainty data in obstructed spaces, this paper presents the method of the PkOGNN(probabilistic k obstructed group nearest neighbor)query .The PkOGNN query method mainly includes four sub-algorithms: Compadist_o(),SpatialPru(),PruInterEnt() and PkOGNN(), These algorithms are respectively the calculation of the aggregate obstructed distance, the spatial pruning method, the pruning of the R-tree intermediate items according to the spatial pruning method, the final refined query method. …”
Get full text
Article -
2292
Principal Component Analysis for Weighted Data in the Procedure of Multidimensional Statistical Forecasting
Published 2021-05-01“…Purpose of the research. Let’s assume that the dynamics of the state of some object is being investigated. …”
Get full text
Article -
2293
Clinical and psychological aspects of hypoglycemia in patients with diabetes mellitus
Published 2010-09-01Get full text
Article -
2294
Assessment of GOCI-II satellite remote sensing products in Lake Taihu
Published 2024-11-01“…Additionally, further research is needed to develop more suitable retrieval algorithms for Chl-a concentration and aph in eutrophic waters to improve accuracy.…”
Get full text
Article -
2295
-
2296
Influence of Source Shape on Semi-Airborne Transient Electromagnetic Surveys
Published 2025-04-01“…A three-dimensional (3D) block model is established, and a model order reduction algorithm is applied to calculate the 3D spatial distribution of electromagnetic fields generated by both an ideal linear source and a curved source. …”
Get full text
Article -
2297
What works and what does not work in local entrepreneurship support policy?
Published 2023-09-01Get full text
Article -
2298
Hybrid deep learning for IoT-based health monitoring with physiological event extraction
Published 2025-05-01“…Whereas the CNNs extract spatial features from medical images, the LSTMs model the temporal patterns of wearable sensor data. …”
Get full text
Article -
2299
NOMA Performance Improvement with Downlink Sectorization
Published 2025-02-01“…The novelty of this research lies in applying spatial sectorization to NOMA, showing that spatial sectorization can minimize intra-sector interference, improve power efficiency, and maintain reliable communication in high-demand environments such as the Internet of Things (IoT). …”
Get full text
Article -
2300
Implementing Blockchain Technology for Secure Data Transactions in Cloud Computing Environments Challenges and Solutions
Published 2025-01-01“…In this paper, we design an optimized, cloud-based blockchain-enabled security framework for real-world scalability, performance, and regulatory constraints. The main innovation consists of a light and energy-saving blockchain construct that minimizes computing overhead and is sustained by an AI-based anomaly detection algorithm to achieve real-time threat mitigation using built-in smart contracts. …”
Get full text
Article