-
921
Role of Biological Age in the Determination of Long‐Term Cause‐Specific Death Following Percutaneous Coronary Interventions
Published 2025-03-01“…Background We tested whether biologic age, as estimated by deficits, functional impairments, or Age‐Gap or their combination, provide improved estimation of cause‐specific death as compared with chronological age. …”
Get full text
Article -
922
SVR Data-Driven Optimization of Generator Leading Phase Operation Limit
Published 2021-08-01“…Based on the generator power angle equation, the objective function equation of reactive power is established. …”
Get full text
Article -
923
A Novel Fault Diagnosis Method for Rolling Bearing Based on Improved Sparse Regularization via Convex Optimization
Published 2018-01-01“…In this paper, the generalized minimax-concave (GMC) penalty is firstly researched to promote the sparsity of signal, which is based on traditional L1-norm and Huber function. It is designed to estimate the sparse solutions more accurately and maintain the convexity of the cost function. …”
Get full text
Article -
924
Multivariate decomposition of gender differentials in cognitive impairment among older adults in India based on Longitudinal Ageing Study in India, 2017–2018
Published 2025-04-01“…Cognitive impairment is measured using the Harmonized Cognitive Assessment Protocol (HCAP) which includes five broad domains (memory, orientation, arithmetic function, executive function, and object naming). A multivariate decomposition analysis was performed using STATA 17 software to identify covariates'contributions, which explain the group differences to average predictions. …”
Get full text
Article -
925
How Do We Teach the Skills and Values in Social Sciences and History Courses?
Published 2017-12-01“…Withdrawal, controlling difficulty, disorder in functionality and social isolation dimensions were researched during the investigation of internet addiction risk of high school students. …”
Get full text
Article -
926
Dual Control of the Extremal Multidimensional Regression Object
Published 2022-08-01“…The statement of the problem of the dual control of the regression object with multidimensional-matrix input and output variables and dynamic programming functional equations for its solution are given. The problem of the dual control of the extremal regression object, i.e. object response function of which has an extremum, is considered. …”
Get full text
Article -
927
Revisiting Blasius Flow by Fixed Point Method
Published 2014-01-01“…Through introducing two transformations not only for independent variable bur also for function, the difficulty originated from the semi-infinite interval and asymptotic boundary condition is overcome. …”
Get full text
Article -
928
Targeting to BMP9 to restrain flare-up of fibrodysplasia ossificans progressiva
Published 2024-12-01“…Due to heterotopic bone formation in various organs, patients experience intense pain, restricted mobility, difficulty with eating and speaking, hearing loss, scoliosis, and impaired pulmonary function. …”
Get full text
Article -
929
A Three-Block Inexact Heterogeneous Alternating Direction Method of Multipliers for Elliptic PDE-Constrained Optimization Problems with a Control Gradient Penalty Term
Published 2024-10-01“…Then, a heterogeneous strategy is introduced to formulate the augmented Lagrangian function for the subproblems. Subsequently, we propose a three-block inexact heterogeneous alternating direction method of multipliers (three-block ihADMM). …”
Get full text
Article -
930
Novel application of CHUANG BI FU biologic protein sponge in promoting peripheral nerve injury repair by regulating vascular regeneration
Published 2025-05-01“…Results It was found that CHUANG BI FU can promote axonal elongation, promote neuromuscular reinnervation function, and promote angiogenesis of regenerating nerves, thereby achieving the function of promoting damaged nerve regeneration. …”
Get full text
Article -
931
Tooth position prediction method based on adaptive geometry optimization.
Published 2025-01-01“…Finally, a jointly supervised loss function is constructed, which can simultaneously capture the intrinsic differences, spatial relationships and uncertainties of the tooth position prediction disorder distribution, and can effectively supervise the tooth spatial structure relationships and prevent tooth collisions and misalignments. …”
Get full text
Article -
932
Feature dependence graph based source code loophole detection method
Published 2023-01-01“…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
Get full text
Article -
933
Feature dependence graph based source code loophole detection method
Published 2023-01-01“…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
Get full text
Article -
934
TSL:predicting popularity of Facebook content based on tie strength
Published 2019-10-01“…The rapid development of online social networks leads to an explosion of information,however,there are great differences in the popularity of different messages,and accurate prediction is always a great difficulty is the current study.Popularity prediction of online content aims to predict the popularity in the future based on its early diffusion status.Existing models for popularity prediction were mostly based on discovering network features or fitting the equation into a varying time function that the accuracy of current popularity prediction model was not high enough.Therefore,with the help of the weak ties theory in sociology,the concept of tie strength was introduced and a multilinear regression equation was constructed combined with the early popularity.A TSL model to predict the popularity of Facebook’s well-known pages was proposed.The main contribution of this article was to solve the problem and few or no work based on sociology.A high linear correlation between the proportion of faithful fans was existed in Facebook homepage with frequent shares in the early and the future popularity.Compared with other baseline models,an experimental study of Facebook (including 1.54 million shares) illustrates the effectiveness of the proposed TSL model,and the performance is better than the existing similar methods.…”
Get full text
Article -
935
The Duration of the Cycle to Get the P Amplitude on A Discrete Electrocardiogram
Published 2023-07-01“…Apart from these interpretations, an amplitude value is required that corresponds to the amount of depolarization of the atrial muscle cells. The difficulty faced by researchers is the lack of discrete ecg data available for experiments, so it only depends on amplitude data as a function of Physionet output time. …”
Get full text
Article -
936
Automatic extraction of actin networks in plants.
Published 2023-08-01“…Yet, the precise structure-function relationships of properties of the actin network in plants are still to be unravelled, including details of how the network configuration depends upon cell type, tissue type and developmental stage. …”
Get full text
Article -
937
Case Report on the Management of Bird Feathers and Droplet Infection in Lungs
Published 2025-05-01“…It is believed that pollutants affect lung function by causing airway inflammation. At least in some circumstances, many common infections can spread through the air. …”
Get full text
Article -
938
La frontière ? Quelle frontière ? La dynamique transnationale de l’orpaillage clandestin en Guyane française
Published 2021-10-01“…The garimpeiros approach the different territories in function of their own evaluation grid where a region richness in gold or the pressure by authorities to prohibit their activities are much more relevant than the country the area they consider belongs to, thus reducing borders to mere material contingencies. …”
Get full text
Article -
939
FAULT DIAGNOSIS METHOD OF ROLLING BEARING BASED ON ICEEMD-FastICA
Published 2024-04-01“…This method utilized the kurtosis criterion to reconstruct the Intrinsic Mode Function (IMF) obtained from ICEEMD and combined it with Fast Independent Component Analysis (FastICA) for noise reduction and unmixing, significantly reducing the noise in the measured signals. …”
Get full text
Article -
940
FDTransUnet: An aluminum surface defect segmentation model based on feature differentiation.
Published 2025-01-01“…Finally, a composite loss function is constructed to address the problem of unbalanced foreground and background sizes of defective samples and to improve segmentation accuracy. …”
Get full text
Article