Suggested Topics within your search.
Suggested Topics within your search.
-
15581
Wound imaging software and digital platform to assist review of surgical wounds using patient smartphones: The development and evaluation of artificial intelligence (WISDOM AI stud...
Published 2024-01-01“…Secondary objectives focused on specificity, positive predictive value (PPV), and negative predictive value (NPV) for various wound features.…”
Get full text
Article -
15582
Robust techno-economic optimization of energy hubs under uncertainty using active learning with artificial neural networks
Published 2025-07-01“…Results demonstrate significant improvements in system reliability, cost efficiency, and flexible operation, validating the effectiveness of ANN-based AL to optimize EHs management and ensure sustainable operation complexities. The AL algorithm enhances the ANN model’s predictive ability, resulting in a 57.9% decrease in operating costs and a 0.010682 loss of energy supply probability (LESP) value. …”
Get full text
Article -
15583
-
15584
Cooperative Method of Request PLANNING IN IDENTITY Management systems
Published 2019-06-01Get full text
Article -
15585
-
15586
RESEARCH OF THE PERFORMANCE OF SOCIAL PROCESSES ON THE EXAMPLE OF REGISTRATION OF ENROLLEES FOR STATE EXAMS
Published 2019-06-01Get full text
Article -
15587
IDENTIFICATION OF SIGNALS IN Multi-Static CROSS-CORRELATION PASSIVE RadarS
Published 2019-06-01Get full text
Article -
15588
TRANSFORMATION OF CLINICAL DATA CLUSTERS AT THE STAGE OF INITIAL DIAGNOSIS
Published 2019-06-01Get full text
Article -
15589
INFORMED VOLUNTARY CONSENT IN PAEDIATRICIAN PRACTICE ORIGINAL ARTICLE
Published 2012-03-01Get full text
Article -
15590
Calculation of stationary points in linear bilevel programming problems
Published 2019-06-01Get full text
Article -
15591
TRUE CROSSING SELECTION OF BEARINGS BY REPLACEMENT METHOD IN TRIANGULATION TASK SOLUTION
Published 2019-06-01Get full text
Article -
15592
-
15593
RADIOCOMMUNICATION SYSTEMS WITH PSEUDORANDOM FREQUENCY HOPPING OF PHASE-SHIFT KEYING SIGNALS
Published 2019-06-01Get full text
Article -
15594
LOSSLESS COMPRESSION OF THE HALFTONE IMAGES BASED ON RUN-LENGTH ENCODING
Published 2019-06-01Get full text
Article -
15595
Learning by precedents based on the analysis of the features properties
Published 2019-06-01Get full text
Article -
15596
THE MODEL OF FORECASTING THE EXCHANGE RATE OF THE RUBLE IN OPERATIONAL PLANNING AND MANAGEMENT FINANCIAL AND ECONOMIC ACTIVITY
Published 2022-05-01“…It is recommended that the author's algorithm of calculation of the sustainability and adequacy of the obtained characteristics.…”
Get full text
Article -
15597
Robust Monocular Visual-Inertial Odometry for Agricultural Vehicles Based on IMU-Augmented 3D Feature Point Correction
Published 2025-01-01“…These results demonstrate its superiority over existing VIO algorithms in terms of localization precision and stability.…”
Get full text
Article -
15598
GRAVITY ANOMALIES OF THE CRUST AND UPPER MANTLE FOR CENTRAL AND SOUTH ASIA
Published 2016-12-01Get full text
Article -
15599
Development of a Conditional Generative Adversarial Network Model for Television Spectrum Radio Environment Mapping
Published 2024-01-01“…Xgboost, SVM, and kriging variogram models were explored to generate ground truth datasets for the CGAN model training, and the best algorithm was employed. A CGAN REM model was developed using U-Net as a generator and PatchGan as a discriminator. …”
Get full text
Article -
15600
Research and practice on self-organization architecture of smart pipe in mobile internet
Published 2018-09-01“…According to the 3GPP specification,a new self-organization network of smart pipe in mobile internet was addressed.By introducing integrated policy control function,the external signals were supervised periodically,and the best optimized network strategies were predicted by the recurrent neural network algorithm,delivered by PCRF,and updated automatically with feedback of the regulations.This solution was effectively applied in scenarios such as speed limit of large traffic users,network protection under high load,and online advertisement recommendation etc.…”
Get full text
Article