Showing 921 - 940 results of 3,231 for search '(functional OR function) difficulty', query time: 0.14s Refine Results
  1. 921

    Role of Biological Age in the Determination of Long‐Term Cause‐Specific Death Following Percutaneous Coronary Interventions by Mandeep Singh, Paul A. Friedman, Rajiv Gulati, Abdallah El Sabbagh, Bradley R. Lewis, Amrit Kanwar, Claire E. Raphael, Mohammed A. Al‐Hijji, Zachi I. Attia, Atta Behfar, James L. Kirkland

    Published 2025-03-01
    “…Background We tested whether biologic age, as estimated by deficits, functional impairments, or Age‐Gap or their combination, provide improved estimation of cause‐specific death as compared with chronological age. …”
    Get full text
    Article
  2. 922

    SVR Data-Driven Optimization of Generator Leading Phase Operation Limit by Dengfeng LI, Mincai YANG, Yuming LIU, Ruilin XU, Xia YU, Zhaojiong LI

    Published 2021-08-01
    “…Based on the generator power angle equation, the objective function equation of reactive power is established. …”
    Get full text
    Article
  3. 923

    A Novel Fault Diagnosis Method for Rolling Bearing Based on Improved Sparse Regularization via Convex Optimization by Dongjie Zhong, Cancan Yi, Han Xiao, Houzhuang Zhang, Anding Wu

    Published 2018-01-01
    “…In this paper, the generalized minimax-concave (GMC) penalty is firstly researched to promote the sparsity of signal, which is based on traditional L1-norm and Huber function. It is designed to estimate the sparse solutions more accurately and maintain the convexity of the cost function. …”
    Get full text
    Article
  4. 924

    Multivariate decomposition of gender differentials in cognitive impairment among older adults in India based on Longitudinal Ageing Study in India, 2017–2018 by Madhurima Sharma, Indrajit Goswami

    Published 2025-04-01
    “…Cognitive impairment is measured using the Harmonized Cognitive Assessment Protocol (HCAP) which includes five broad domains (memory, orientation, arithmetic function, executive function, and object naming). A multivariate decomposition analysis was performed using STATA 17 software to identify covariates'contributions, which explain the group differences to average predictions. …”
    Get full text
    Article
  5. 925

    How Do We Teach the Skills and Values in Social Sciences and History Courses? by Neşet Mutlu, Mustafa Öztürk

    Published 2017-12-01
    “…Withdrawal, controlling difficulty, disorder in functionality and social isolation dimensions were researched during the investigation of internet addiction risk of high school students. …”
    Get full text
    Article
  6. 926

    Dual Control of the Extremal Multidimensional Regression Object by V. S. Mukha, N. F. Kako

    Published 2022-08-01
    “…The statement of the problem of the dual control of the regression object with multidimensional-matrix input and output variables and dynamic programming functional equations for its solution are given. The problem of the dual control of the extremal regression object, i.e. object response function of which has an extremum, is considered. …”
    Get full text
    Article
  7. 927

    Revisiting Blasius Flow by Fixed Point Method by Ding Xu, Jinglei Xu, Gongnan Xie

    Published 2014-01-01
    “…Through introducing two transformations not only for independent variable bur also for function, the difficulty originated from the semi-infinite interval and asymptotic boundary condition is overcome. …”
    Get full text
    Article
  8. 928

    Targeting to BMP9 to restrain flare-up of fibrodysplasia ossificans progressiva by Qiwen Li, Quan Yuan

    Published 2024-12-01
    “…Due to heterotopic bone formation in various organs, patients experience intense pain, restricted mobility, difficulty with eating and speaking, hearing loss, scoliosis, and impaired pulmonary function. …”
    Get full text
    Article
  9. 929

    A Three-Block Inexact Heterogeneous Alternating Direction Method of Multipliers for Elliptic PDE-Constrained Optimization Problems with a Control Gradient Penalty Term by Xiaotong Chen, Tongtong Wang, Xiaoliang Song

    Published 2024-10-01
    “…Then, a heterogeneous strategy is introduced to formulate the augmented Lagrangian function for the subproblems. Subsequently, we propose a three-block inexact heterogeneous alternating direction method of multipliers (three-block ihADMM). …”
    Get full text
    Article
  10. 930

    Novel application of CHUANG BI FU biologic protein sponge in promoting peripheral nerve injury repair by regulating vascular regeneration by Yunhao Cai, Jiahao Liu, Renwei Han, Zizhao Ma, Kaihang Yu, Ping Wu, Xiaokun Li, Zhouguang Wang, Jian Wang

    Published 2025-05-01
    “…Results It was found that CHUANG BI FU can promote axonal elongation, promote neuromuscular reinnervation function, and promote angiogenesis of regenerating nerves, thereby achieving the function of promoting damaged nerve regeneration. …”
    Get full text
    Article
  11. 931

    Tooth position prediction method based on adaptive geometry optimization. by Tian Ma, Yijie Zeng, Wenda Pei, Chao Li, Yuancheng Li

    Published 2025-01-01
    “…Finally, a jointly supervised loss function is constructed, which can simultaneously capture the intrinsic differences, spatial relationships and uncertainties of the tooth position prediction disorder distribution, and can effectively supervise the tooth spatial structure relationships and prevent tooth collisions and misalignments. …”
    Get full text
    Article
  12. 932

    Feature dependence graph based source code loophole detection method by Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG

    Published 2023-01-01
    “…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
    Get full text
    Article
  13. 933

    Feature dependence graph based source code loophole detection method by Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG

    Published 2023-01-01
    “…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
    Get full text
    Article
  14. 934

    TSL:predicting popularity of Facebook content based on tie strength by Xiaomeng WANG, Binxing FANG, Hongli ZHANG, Xing WANG

    Published 2019-10-01
    “…The rapid development of online social networks leads to an explosion of information,however,there are great differences in the popularity of different messages,and accurate prediction is always a great difficulty is the current study.Popularity prediction of online content aims to predict the popularity in the future based on its early diffusion status.Existing models for popularity prediction were mostly based on discovering network features or fitting the equation into a varying time function that the accuracy of current popularity prediction model was not high enough.Therefore,with the help of the weak ties theory in sociology,the concept of tie strength was introduced and a multilinear regression equation was constructed combined with the early popularity.A TSL model to predict the popularity of Facebook’s well-known pages was proposed.The main contribution of this article was to solve the problem and few or no work based on sociology.A high linear correlation between the proportion of faithful fans was existed in Facebook homepage with frequent shares in the early and the future popularity.Compared with other baseline models,an experimental study of Facebook (including 1.54 million shares) illustrates the effectiveness of the proposed TSL model,and the performance is better than the existing similar methods.…”
    Get full text
    Article
  15. 935

    The Duration of the Cycle to Get the P Amplitude on A Discrete Electrocardiogram by Sabar Setiawidayat

    Published 2023-07-01
    “…Apart from these interpretations, an amplitude value is required that corresponds to the amount of depolarization of the atrial muscle cells. The difficulty faced by researchers is the lack of discrete ecg data available for experiments, so it only depends on amplitude data as a function of Physionet output time. …”
    Get full text
    Article
  16. 936

    Automatic extraction of actin networks in plants. by Jordan Hembrow, Michael J Deeks, David M Richards

    Published 2023-08-01
    “…Yet, the precise structure-function relationships of properties of the actin network in plants are still to be unravelled, including details of how the network configuration depends upon cell type, tissue type and developmental stage. …”
    Get full text
    Article
  17. 937

    Case Report on the Management of Bird Feathers and Droplet Infection in Lungs by Sagar S. Bhovare, Akhataribano Sheikh Sayyad

    Published 2025-05-01
    “…It is believed that pollutants affect lung function by causing airway inflammation. At least in some circumstances, many common infections can spread through the air. …”
    Get full text
    Article
  18. 938

    La frontière ? Quelle frontière ? La dynamique transnationale de l’orpaillage clandestin en Guyane française by François-Michel Le Tourneau

    Published 2021-10-01
    “…The garimpeiros approach the different territories in function of their own evaluation grid where a region richness in gold or the pressure by authorities to prohibit their activities are much more relevant than the country the area they consider belongs to, thus reducing borders to mere material contingencies. …”
    Get full text
    Article
  19. 939

    FAULT DIAGNOSIS METHOD OF ROLLING BEARING BASED ON ICEEMD-FastICA by MA WeiPing, HONG KunYue, AN Ning, SONG YuZhou

    Published 2024-04-01
    “…This method utilized the kurtosis criterion to reconstruct the Intrinsic Mode Function (IMF) obtained from ICEEMD and combined it with Fast Independent Component Analysis (FastICA) for noise reduction and unmixing, significantly reducing the noise in the measured signals. …”
    Get full text
    Article
  20. 940

    FDTransUnet: An aluminum surface defect segmentation model based on feature differentiation. by Mingzhu Tang, Wencheng Wang

    Published 2025-01-01
    “…Finally, a composite loss function is constructed to address the problem of unbalanced foreground and background sizes of defective samples and to improve segmentation accuracy. …”
    Get full text
    Article