-
3821
A distributed week-ahead scheduling method for the charging / discharging of plug-in electric vehicles integrated into the grid
Published 2024-01-01“…However, the existing research works on GVI are mainly limited to day-ahead or intra-day schedules which may not fully utilize the EVs' potential in charging/discharging arrangements for the power grid. …”
Get full text
Article -
3822
New directions in mapping the Earth’s surface with citizen science and generative AI
Published 2025-03-01Get full text
Article -
3823
Reconstruction techniques for accelerating dynamic cardiovascular magnetic resonance imaging
Published 2025-01-01“…ABSTRACT: Achieving sufficient spatial and temporal resolution for dynamic applications in cardiovascular magnetic resonance (CMR) imaging is a challenging task due to the inherently slow nature of CMR. …”
Get full text
Article -
3824
Digital and online symptom checkers and health assessment/triage services for urgent health problems: systematic review
Published 2019-08-01“…Diagnostic accuracy varied between different systems but was generally low. Algorithm-based triage tended to be more risk averse than that of health professionals. …”
Get full text
Article -
3825
Trajectory Planning for Robotic Manipulators in Automated Palletizing: A Comprehensive Review
Published 2025-04-01“…This survey-type article compiles research articles published in recent years that focus on the main algorithms proposed for addressing placement and minimum-time path planning for a manipulator responsible for performing pick-and-place tasks. …”
Get full text
Article -
3826
Insight Thoughts for Intelligent Traffic Management-Based SDN
Published 2025-07-01“…The process of integrating artificial intelligence and SDN opens up prospects towards developing advanced networks that support the requirements of modern networks, such as the Internet of Things, communications, and others. The main focus is on comprehensive integration so that research is an effective contribution and keeps pace with the continuous development of smart grid management strategies. …”
Get full text
Article -
3827
Novel application of unsupervised machine learning for characterization of subsurface seismicity, tectonic dynamics and stress distribution
Published 2024-12-01“…Employing a diverse range of clustering algorithms, with particular emphasis on Fuzzy C-Means (FCM), our research meticulously dissects the intricate physical processes that govern a complex tectonic zone. …”
Get full text
Article -
3828
Cosine Similarity Template Matching Networks for Optical and SAR Image Registration
Published 2025-01-01“…These datasets serve as benchmarks for evaluating template matching algorithms in heterogeneous image scenarios, setting the stage for further advancements in template matching research.…”
Get full text
Article -
3829
DAF-Net: Dual-Aperture Feature Fusion Network for Aircraft Detection on Complex-Valued SAR Image
Published 2025-01-01Get full text
Article -
3830
Review of organizational value of science-intensive organizations configuration models (rocket and space industry organization case)
Published 2023-09-01“…The article studies main models for compiling organizational cost of scientific-intensive enterprises used in rocket and space industry. …”
Get full text
Article -
3831
RussianLanguage Thesauri: Automated Construction and Application For Natural Language Processing Tasks
Published 2018-08-01“…The authors analyzed the main characteristics of open access thesauri for scientific research, evaluated trends of their development, and their effectiveness in solving natural language processing tasks. …”
Get full text
Article -
3832
-
3833
-
3834
X-RAY MORPHOLOGICAL SEMIOTICS OF NON-TUBERCULOUS MYCOBACTERIAL PULMONARY DISEASE
Published 2018-08-01Get full text
Article -
3835
Selective Random CDD Enhanced Joint Cooperative Relay and HARQ for Delay-Tolerant Vehicular Communications
Published 2015-05-01Get full text
Article -
3836
The role of technical chart patterns in the early Bitcoin market: intraday evidence from the Mt.Gox transaction dataset
Published 2025-05-01“…Employing a pattern recognition algorithm, we identify hourly trading signals for five major chart patterns. …”
Get full text
Article -
3837
Interpretable Machine Learning for the German residential rental market – shedding light into model mechanics
Published 2025-08-01“…The study aims to investigate linear regression, decision tree and XGBoost algorithms. The research is unique in its application of IML methods to a large dataset of over 2.4 million observations in the German rental market and its application of comparative statistics using aggregate SHAP values. …”
Get full text
Article -
3838
SOME TYPES OF METASUBJECT RESULTS WHEN TEACHING MATHEMATICS
Published 2016-01-01“…The aim of the study is to allocate in the content of teaching mathematics those elements, those kinds of mathematical cognitive activities that are metasubject character, which are the basis for the formation of cognitive learning activities, as a means to study not only of mathematical objects, but some objects of other sciences.Methods. Research is based on a system-structural and activity-based approaches; literature analysis, theoretical research and experimental work.Results. …”
Get full text
Article -
3839
Employee loyalty evaluation using machine learning in technology-based small and medium-sized enterprises
Published 2025-07-01“…Small and medium-sized enterprises with high technology content and strong innovation ability are the main body of innovation with great vitality and potential. …”
Get full text
Article -
3840
Features of tactics of inspection of accident sites in the investigation of illegal interference in the activities of energy facilities using unmanned vehicles
Published 2025-06-01“…At the same time, the importance of urgently studying the volatile memory of a working device is stated.Conclusions about the achievement of the research goal: the paper proposes adaptive algorithms for the investigator's actions in various investigative situations: when the functioning of the device was suppressed by electronic warfare; when the UAV was physically damaged or destroyed; when an attacker with a UAV control device (remote control, smartphone, laptop, special glasses, etc.) was detained at the scene; when the control device is detected, but the attacker himself has disappeared; when the attacker has destroyed the control device; when information from the UAV (video and sensor readings) was transmitted not only to the operator's device, but also to another addressee; when the operator was detained on the territory of the fuel and energy complex. …”
Get full text
Article