-
4701
Research on Automotive Radar Mutual Interference Mitigation Method based on V2X Communication Assistance
Published 2025-02-01“…To solve mixed integer nonlinear programming optimization problems, Q-learning algorithm is introduced. In our Q-learning algorithm, based on the action state space established by transmission power and channel resources, the optimization problem is transformed into solving using a reward function. …”
Get full text
Article -
4702
Unified Analysis of Decentralized Gradient Descent: A Contraction Mapping Framework
Published 2025-01-01“…The use of these tools yields tight convergence bounds, both in the noise-free and noisy regimes. While these bounds are qualitatively similar to results found in the literature, our approach using contractions together with the MHT decouples the algorithm dynamics (how quickly the algorithm converges to its fixed point) from its asymptotic convergence properties (how far the fixed point is from the global optimum). …”
Get full text
Article -
4703
Optimal diagnostic strategy for coronavirus disease 2019 detection in liver transplant recipients: Critical review of available evidence
Published 2021-01-01“…Liver transplant centers should validate the algorithm presented herein, which is based on existing evidence and designed to maximize patient and provider safety, while assuring accuracy in diagnosis.…”
Get full text
Article -
4704
Time-Efficient Path Planner in 3D Obstacle-Rich Environments Considering the Maximum Turn Rate of a Fixed-Wing Aerial Vehicle
Published 2025-02-01“…A time-efficient path plan algorithm is important for the real-time navigation of a fixed-wing autonomous aerial vehicle in unknown 3D obstacle-rich environments. …”
Get full text
Article -
4705
Research on Network Handover Based on User Movement Prediction in Visible Light Communication and Wi-Fi Heterogeneous Networks
Published 2025-02-01“…Extracting meaningful and important location points from massive trajectory data for clustering, an improved hidden Markov model is used to predict the user’s next location by analyzing the patterns of the user’s historical mobile trajectory data. The Q-learning algorithm is then used to determine the optimal network handover based on the current network state, while a seamless handover protocol is introduced to ensure successful network transition and uninterrupted data transmission. …”
Get full text
Article -
4706
FPGA-Based Deep Neural Network Implementation for Handwritten Digit Recognition
Published 2025-01-01“…The proposed network achieves promising results in terms of system simplicity and low consumption of hardware resources while maintaining acceptable recognition accuracy and algorithm execution speed at the same time. …”
Get full text
Article -
4707
Guide Robot Based on Image Processing and Path Planning
Published 2025-06-01“…While guide dogs remain the primary aid for visually impaired individuals, robotic guides continue to be an important area of research. …”
Get full text
Article -
4708
Linguistic Intuitionistic Fuzzy VIKOR Method with the Application of Artificial Neural Network
Published 2025-06-01“…In the LIF-VIKOR algorithm, the proposed correlation coefficient is used for ranking alternatives, while the entropy method is applied to compute weights. …”
Get full text
Article -
4709
Gaussian Process Regression with Soft Equality Constraints
Published 2025-01-01“…Additionally, we introduce an adaptive learning algorithm to optimize the selection of constraint locations to further enhance the flexibility of the method. …”
Get full text
Article -
4710
An Improved Pose Estimation Method Based on Projection Vector With Noise Error Uncertainty
Published 2019-01-01“…Finally, we use global convergence theorem to prove the global convergence of the proposed algorithm. The results show that the proposed method has good robustness and convergence while adapting to different degrees of error uncertainty, which can meet practical engineering applications.…”
Get full text
Article -
4711
Robust sparse smooth principal component analysis for face reconstruction and recognition.
Published 2025-01-01“…Consequently, the proposed RSSPCA algorithm generally outperforms existing algorithms in face reconstruction and recognition. …”
Get full text
Article -
4712
ANTIBIOTIC SENSITIVITY ISOLATION EVALUATION OF MAJOR MICROORGANISMS IN PERIODONTAL TISSUE PATHOLOGY
Published 2021-09-01“…Determination of levels antibiotic sensitivity was carried out using a disco-diffusion method with the advice and algorithm identified by order MOH Ukraine 05.04.2007 № 167 "On Approval of guidelines" Determination of the sensitivity of microorganisms to antibiotics and in accordance with the recommendations EUCAST (Eurepean Committee on Antimicrobial Susceptibility Testing). …”
Get full text
Article -
4713
Pemeringkatan Pencarian pada Buku Pedoman Akademik Filkom UB Menuju Merdeka Belajar dan Free E-Book Pembelajaran Sebagai Prototype Local Smart Micro Search Engine Menggunakan Algor...
Published 2021-10-01“…Users must master the whole to find out which documents are most suitable, which is where the process will take a lot of time. …”
Get full text
Article -
4714
Neural Networks Method in modeling of the financial company’s performance
Published 2017-11-01“…The copyright factor selection algorithm complements the developed model. Because of the functioning of the neural network, a management report on the financial performance of the company is formed. …”
Get full text
Article -
4715
Integration of bulk RNA-seq and scRNA-seq reveals transcriptomic signatures associated with deep vein thrombosis
Published 2025-04-01“…This study aimed to identify and examine the most distinctive genes linked to DVT.MethodsIn this study, the bulk RNA sequencing (bulk RNA-seq) analysis was conducted on whole blood samples from 11 DVT patients and six control groups. …”
Get full text
Article -
4716
Performance analysis and optimization of cooperative spectrum sensing for maximizing secondary throughput
Published 2011-01-01“…The relationship among SU,detection threshold,bandwidth,spectrum utilization and secondary throughput in cognitive radio networks was analyzed,which indicates the lower false alarm probability,higher spectrum utilization and larger secondary throughput with less SU in C-CSS(censoring based cooperative spectrum sensing),besides,the required detection threshold for maximizing the secondary throughput different with the traditional CSS under given SU number and the objective demand.Based on the NP criticism,an optimal cooperative spectrum sensing algorithm for maximizing the secondary throughput was proposed by solving the mathematic model to obtain the optimal party of SU and detection threshold.Theoretical analysis and simulation results show that the maximized secondary throughput achieved by the proposed optimal algorithm,while maintaining the given detection probability.…”
Get full text
Article -
4717
A Quantum Implementation Model for Artificial Neural Networks
Published 2018-02-01“…In quantum computing, the phase estimation algorithm is known to provide speedups over the conventional algorithms for the eigenvalue-related problems. …”
Get full text
Article -
4718
URALP: Unreachable Region Aware Location Privacy against Maximum Movement Boundary Attack
Published 2015-08-01“…In this paper, we present an anonymization algorithm that effectively counters such attacks while achieving k -anonymity requirements as well as minimum acceptable cloaked region size. …”
Get full text
Article -
4719
Crowd abnormal behavior detection based on motion similar entropy
Published 2017-05-01“…It is an important research content of graphic processing in the field of intelligent video surveillance to detect abnormal events.An algorithm based on entropy of motion similarity (EMS) to detect abnormal behavior was proposed.Based on the optical flow algorithm,taking the bottom flow block as the basic unit to get the scene motion information,according to the concept of social network model,the construction scene of the motion network model (MNM) was proposed,the division of the scene particles motion similarity was completed,and the distribution EMS of MNM was calculated in the time domain.Finally,the obtained image entropy was compared with the reasonable threshold,to determine whether abnormal behavior occured.Experimental results indicate that the proposed algo-rithm can detect abnormal behavior effectively and show promising performance while comparing with the state of the art methods.…”
Get full text
Article -
4720
DiffPRFs:random forest under differential privacy
Published 2016-09-01“…A differential privacy algorithm DiffPRFs based on random forests was proposed.Exponential mechanism was used to select split point and split attribute in each decision tree building process,and noise was added according to Laplace mechanism.Differential privacy protection requirement was satisfied through overall process.Compared to existed algorithms,the proposed method does not require pre-discretization of continuous attributes which significantly reduces the performance cost of preprocessing in large multi-dimensional dataset.Classification is achieved conveniently and efficiently while maintains the high accuracy.Experimental results demonstrate the effectiveness and superiority of the algorithm compared to other classification algorithms.…”
Get full text
Article