-
6401
An early warning system based on machine learning detects huge forest loss in Ukraine during the war
Published 2025-04-01“…We employed Random Forest, a supervised machine learning classification algorithm, in conjunction with high-quality satellite imagery, to quantify the forest loss in Ukraine during the war, between 2022 and 2023. …”
Get full text
Article -
6402
Early-life management practices and their association with dairy herd longevity, productivity, and profitability
Published 2025-08-01“…Cluster stability assessment was used to determine the best clustering algorithm and number of clusters. Associations between herd longevity, productivity, profitability, and early-life management practices were assessed using multivariate linear regression models. …”
Get full text
Article -
6403
Digital mapping of peat thickness and extent in Finland using remote sensing and machine learning
Published 2025-03-01“…In this study, we present a workflow for producing peat occurrence maps for the whole of Finland. For this, we used random forest classification to map areas with peat thicknesses of ≥ 10 cm, ≥30 cm, ≥40 cm, and > 60 cm. …”
Get full text
Article -
6404
The Use of Economic and Mathematical Modeling in Assessing the Competitiveness of Tourism Industry Enterprises
Published 2020-12-01“…The implementation of such a system is directly related to the analysis and assessment of the whole variety of conditions and factors for the functioning of the subjects of the tourism industry.…”
Get full text
Article -
6405
Hybrid Model for 6G Network Traffic Prediction and Wireless Resource Optimization
Published 2025-01-01“…Large-scale 6G traffic data with varied channel conditions and user scenarios was used to validate the model. An algorithm is presented to describe the training process of the proposed hybrid model. …”
Get full text
Article -
6406
Development and validation of an ensemble learning risk model for sepsis after abdominal surgery
Published 2024-06-01“…Routine clinical variables were implemented for model development. The Boruta algorithm was applied for feature selection. Afterwards, ensemble learning and eight other conventional algorithms were used for model fitting and validation based on all features and selected features. …”
Get full text
Article -
6407
A formal notation of legal rules applicable in the local space
Published 2024-12-01“…Following these assumptions, the general form of the behavioural test algorithm was formulated. The presented issues demonstrate complex relationships to space and its integrating rule in relation to legal rules. …”
Get full text
Article -
6408
Rapid test for the qualitative simultaneous determination of cardiac fatty acid-binding protein and cardiac troponin I in the diagnosis of acute coronary syndrome
Published 2019-09-01“…Further studies will clarify the place of this technique in the modern algorithm for the management of patients with ACS and evaluate the possibility of using the rapid test in predicting the course of the disease.…”
Get full text
Article -
6409
Identification of key genes as diagnostic biomarkers for IBD using bioinformatics and machine learning
Published 2025-07-01“…Immune cell abundance quantification and statistical correlation analyses with IBD-associated transcripts were conducted via the CIBERSORTx deconvolution algorithm. To complement these findings, blood expression quantitative trait loci (eQTL) data from GTExv8.ALL.Whole_Blood were integrated with IBD genome-wide association statistics from the FinnGen consortium. …”
Get full text
Article -
6410
Identification of 17 novel epigenetic biomarkers associated with anxiety disorders using differential methylation analysis followed by machine learning-based validation
Published 2025-02-01“…Methods A comparative differential methylation analysis was performed on whole blood samples from 94 anxiety disorder patients and 296 control samples using targeted bisulfite sequencing. …”
Get full text
Article -
6411
Wearable sensor-based fall detection for elderly care using ensemble machine learning techniques
Published 2025-06-01“…The suggested strategy outperformed modern fall identification techniques when tested using the labeled KFall database, achieving average precision of 95 percent, 96 percent, as well as 98 percent for Non-Falls, Pre-Falls, as well as detectable fall incidents, correspondingly. The whole assessment proved the algorithmic learning structure's efficacy. …”
Get full text
Article -
6412
Space-time spectrum sharing based on game theory:dynamic access and penalty strategy
Published 2023-12-01“…To tackle the challenge of inefficient utilization of spatiotemporal spectrum resources in heterogeneous networks, a reliable spectrum sharing strategy based on game theory was proposed for scenarios where multiple secondary users dynamically access through sensing spatiotemporal spectrum opportunities.Firstly, secondary users sensed the activity state of primary users through channel sampling and subsequently seek suitable spatiotemporal spectrum opportunities.Each secondary user aimed to access more spectrum resources while preventing quality degradation between primary users.Consequently, a negotiation of individual utilities between secondary and primary users was needed, in order to reach a mixed Nash equilibrium.When the secondary user's transmission power was abnormal, its behavior would be regarded as a violation.Then, a backoff time compensation algorithm was presented to penalize the secondary users, according to the number of violations and active nodes in the network.Finally, simulation results validate the effectiveness of the spatiotemporal spectrum opportunities sharing strategy with the penalty mechanism.…”
Get full text
Article -
6413
Prediction of magnetohydrodynamics fluid flow with viscous dissipation through artificial neural network
Published 2025-07-01“…The Levenberg–Marquardt algorithm to predict the Nusselt Number (NN) and Skin Friction Coefficients (SFCs). …”
Get full text
Article -
6414
Cross-Layer Power-Control-Based Real-Time Routing Protocol for Wireless Sensor Networks
Published 2013-11-01“…Simulation results show that the energy consumption of the network is reduced while real-time end-to-end data transmission is guaranteed.…”
Get full text
Article -
6415
Error-Tolerant and Energy-Efficient Coverage Control Based on Biological Attractor Selection Model in Wireless Sensor Networks
Published 2012-02-01“…A coverage problem is one of the important issues to prolong the lifetime of a wireless sensor network while guaranteeing that the target region is monitored by a sufficient number of active nodes. …”
Get full text
Article -
6416
Beamforming and resource optimization in UAV integrated sensing and communication network with edge computing
Published 2023-09-01“…To address the dependence of traditional integrated sensing and communication network mode on ground infrastructure, the unmanned aerial vehicle (UAV) with edge computing server and radar transceiver was proposed to solve the problems of high-power consumption, signal blocking, and coverage blind spots in complex scenarios.Firstly, under the conditions of satisfying the user’s transmission power, radar estimation information rate and task offloading proportion limit, the system energy consumption was minimized by jointly optimizing UAV radar beamforming, computing resource allocation, task offloading, user transmission power, and UAV flight trajectory.Secondly, the non-convex optimization problem was reformulated as a Markov decision process, and the proximal policy optimization method based deep reinforcement learning was used to achieve the optimal solution.Simulation results show that the proposed algorithm has a faster training speed and can reduce the system energy consumption effectively while satisfying the sensing and computing delay requirements.…”
Get full text
Article -
6417
AXIAL TENSILE STRENGTH ANALYSIS OF UNBONDED FLEXIBLE PIPE CONTAINING COMPOSITE TENSILE ARMORS
Published 2020-01-01“…As offshore oil industry moves into ultra-deep water,replacing the steel tensile armors of unbonded flexible pipe with composite is becoming a scheme that can effectively reduce weight and provide better mechanical properties.The anisotropic parameters of composite are obtained by meso-mechanical method,then a model of axisymmetric structure response for composite flexible pipe with composite armored layer is established,which is based on both thick-wall cylinder theory and the differential equation of curved beam,and also the algorithm of cyclic iterative is combined.Failure models of different type of flexible pipes are obtained,and iso-strength method is used for composite armored pipe.A case study shows that composite armors can effectively enhance the tensile strength of unbonded flexible pipe while effectively reduce the overall weight.Results state that volume fraction,elastic modulus and strength of fiber are the important parameters which affect the axial stiffness and tensile strength of unbonded flexible pipe.…”
Get full text
Article -
6418
Multi-objective optimization placement strategy for SDN security controller considering Byzantine attributes
Published 2021-06-01“…By giving the software defined network distributed control plane Byzantine attributes, its security can be effectively improved.In the process of realizing Byzantine attributes, the number and location of controllers, and the connection relationship between switches and controllers can directly affect the key network performance.Therefore, a controller multi-objective optimization placement strategy for SDN security controllers considering Byzantine attributes was proposed.Firstly, a Byzantine controller placement problem (MOSBCPP) model that comprehensively considered interaction delay, synchronization delay, load difference and the number of controllers was constructed.Then, a solution algorithm based on NASG-II was designed for this model, which included the initialization function, the mutation function, the fast non-dominated sorting function and the elite strategy selection function.Simulation results show that this strategy can effectively reduce interaction delay, synchronization delay, load difference and the number of controllers, while improving control plane security.…”
Get full text
Article -
6419
An Empirical Configuration Study of a Common Document Clustering Pipeline
Published 2023-09-01“…The results suggest that BERT embeddings combined with UMAP dimension reduction to no less than 15 dimensions provides a good basis for clustering, regardless of the specific clustering algorithm used. Moreover, while UMAP performed better than PCA in our experiments, tuning the UMAP settings showed little impact on the overall performance. …”
Get full text
Article -
6420
Uplink assisted downlink channel estimation method of extra-large scale MIMO-OTFS system
Published 2023-12-01“…A low complexity downlink channel estimation method for high-speed mobile scenarios was proposed for the extra-large scale multiple-input multiple-output (MIMO) orthogonal time-frequency space (OTFS) system.Different from the existing studies, the proposed method considers the significant spatial non-stationary characteristics of extra-large scale MIMO-OTFS system.Based on the visible path region, an enhanced sparse orthogonal matching pursuit (OMP) algorithm with low complexity was proposed, uplink-assisted downlink channel estimation was achieved using the mapping relationship between the uplink and downlink channels in the frequency-division duplex (FDD) mode.Simulation results show that the proposed uplink-assisted downlink channel estimation method can accurately represent the non-stationary of the system, and achieve significant improvement in the channel estimation performance while reducing the computational complexity , and still perform well in high-mobility IoT scenarios.…”
Get full text
Article