-
15501
Re-identification assistance and multi-stage association for pedestrian multi-object tracking
Published 2025-07-01“…Then, based on the Intersection over Union (IoU) between the predicted bounding box and the detection bounding box, the Hungarian algorithm is used to match the targets between frames. …”
Get full text
Article -
15502
State of Charge Estimation on Lithium-Ion Batteries Using Particle Swarm Optimization Method
Published 2025-04-01“…The high accuracy of 87.972% of PSO also shows that this method is reliable for applications that require precise SoC predictions. It is hoped that the results of this research can become a basis for further research in the field of battery management and metaheuristic algorithm optimization. …”
Get full text
Article -
15503
Collaborative Forecasting of Multiple Energy Loads in Integrated Energy Systems Based on Feature Extraction and Deep Learning
Published 2025-02-01“…First, the complete ensemble empirical mode decomposition with adaptive noise algorithm decomposes load data, and a dynamic time warping-based k-medoids clustering algorithm reconstructs subsequences aligned with system load components. …”
Get full text
Article -
15504
System Development for Liquid Chemicals Point Injection Based on Convolutional Neural Network Models
Published 2021-06-01“…They showed that the predicted error on the validation data was 0.18758. …”
Get full text
Article -
15505
Molecular sub-classification of renal epithelial tumors using meta-analysis of gene expression microarrays.
Published 2011-01-01“…These signatures were organized into an algorithm to sub-classify renal neoplasms. The use of these signatures according to our algorithm was validated on several independent datasets.…”
Get full text
Article -
15506
Detection of Multiple Small Biased GPS Spoofing Attacks on Autonomous Vehicles Using Time Series Analysis
Published 2025-01-01“…This detection is facilitated through time series analysis at 25 and 50 s intervals to build a profile of data errors and distribution to predict the probability of such attacks. To evaluate the algorithm's effectiveness, five different test datasets depicting four types of spoofing scenarios—turn-by-turn, overshoot, stop, and multiple small biased attacks—were created using data from the publicly accessible Honda Research Institute Driving Dataset (HDD). …”
Get full text
Article -
15507
Tire Pressure Monitoring System Using Feature Fusion and Family of Lazy Classifiers
Published 2025-01-01“…Empirically, the research achieved 97.92% accuracy using the local weighted learning (LWL) algorithm, demonstrating the effectiveness of combined statistical, histogram, and ARMA features in enhancing TPMS predictive capabilities.…”
Get full text
Article -
15508
Feature-Based Classification of Amino Acid Substitutions outside Conserved Functional Protein Domains
Published 2013-01-01“…The new algorithm is based on the informational spectrum method (ISM), a feature-based technique, and statistical analysis. …”
Get full text
Article -
15509
An Approach to Finding a Robust Deep Learning Model
Published 2025-01-01“…This approach, supplemented with a model selection algorithm designed as a meta-algorithm, is versatile and applicable to any machine learning model, provided that it is appropriate for the task at hand. …”
Get full text
Article -
15510
Slewing and Active Vibration Control of a Flexible Single-Link Manipulator
Published 2025-01-01“…This research encompasses dynamic modeling, slewing control, and vibration control for the system. Theoretical predictions are compared with experimental results to validate both the theoretical model and the proposed vibration control algorithm.…”
Get full text
Article -
15511
A Hybrid Grey Based KOHONEN Model and Biogeography-Based Optimization for Project Portfolio Selection
Published 2014-01-01“…Next, each portfolio was evaluated using grey relational analysis (GRA) and then scheduled risk of the project was predicted using Mamdani fuzzy inference method. Finally, the multiobjective biogeography-based optimization algorithm was utilized for drawing risk and rank Pareto analysis. …”
Get full text
Article -
15512
Ability of verbal autopsy data to detect deaths due to uncontrolled hyperglycaemia: testing existing methods and development and validation of a novel weighted score
Published 2019-10-01“…There were 8699 relevant deaths in Agincourt and 1663 in Karonga.Results Of the Agincourt deaths, there were 77 study physician classified cases and 58 computer algorithm classified cases. Agreement between study physician classified cases and computer algorithm classified cases was poor (Cohen’s kappa 0.14). …”
Get full text
Article -
15513
Integrated systems biology analysis of KSHV latent infection reveals viral induction and reliance on peroxisome mediated lipid metabolism.
Published 2017-03-01“…To identify the underlying cellular mechanisms of KSHV alteration of host signaling and endothelial cell activation, we identified changes in the host proteome, phosphoproteome and transcriptome landscape following KSHV infection of endothelial cells. A Steiner forest algorithm was used to integrate the global data sets and, together with transcriptome based predicted transcription factor activity, cellular networks altered by latent KSHV were predicted. …”
Get full text
Article -
15514
THE MODEL OF FORECASTING THE EXCHANGE RATE OF THE RUBLE IN OPERATIONAL PLANNING AND MANAGEMENT FINANCIAL AND ECONOMIC ACTIVITY
Published 2022-05-01“…It is recommended that the author's algorithm of calculation of the sustainability and adequacy of the obtained characteristics.…”
Get full text
Article -
15515
Research on the invulnerability of regional network based on topology analysis
Published 2021-11-01“…To measure the overall impact of different attacks a network region may encounter, an evaluation algorithm can be used to capture the difference in invulnerability of regional network topologies.Specifically, the vulnerability of regional network and that of connection topology between regions both internally and externally was analyzed.To find predictions between regions as supplemental topology data and create the Internet topology, data would be measured in various ways and verified.Using stratified probability sampling, multiple damage simulations could predict the worst-case scenarios in real conditions.Damage was simulated multiple times based on stratified probability sampling to approximate the damage situation of the area under real conditions.A significance tester was realized to measure the impact of damage from the overall level and special weak points respectively, discover the difference of the damage between the areas, and calculate the regional invulnerability ranking.Finally, the ranking and clustering results of forty-eight regions were given.…”
Get full text
Article -
15516
Measuring Respiration Rate from Speech
Published 2025-02-01“…The best model shows the predicted respiration rate from speech within ±3 BPM for 82% of test subjects. …”
Get full text
Article -
15517
Research on the invulnerability of regional network based on topology analysis
Published 2021-11-01“…To measure the overall impact of different attacks a network region may encounter, an evaluation algorithm can be used to capture the difference in invulnerability of regional network topologies.Specifically, the vulnerability of regional network and that of connection topology between regions both internally and externally was analyzed.To find predictions between regions as supplemental topology data and create the Internet topology, data would be measured in various ways and verified.Using stratified probability sampling, multiple damage simulations could predict the worst-case scenarios in real conditions.Damage was simulated multiple times based on stratified probability sampling to approximate the damage situation of the area under real conditions.A significance tester was realized to measure the impact of damage from the overall level and special weak points respectively, discover the difference of the damage between the areas, and calculate the regional invulnerability ranking.Finally, the ranking and clustering results of forty-eight regions were given.…”
Get full text
Article -
15518
Multifactor Stock Selection Strategy Based on Machine Learning: Evidence from China
Published 2022-01-01“…The main findings are as follows: the support vector regression has the most stable successful rate for predicting, while ridge regression and linear regression have the most unstable successful rate with more extreme cases; algorithm of support vector regression fitting higher-degree polynomials in Chinese A-share market is optimized, compared with the traditional linear regression both in terms of stock return and retracement control; the results of support vector regression significantly outperforming the CSI 500 index prove further.…”
Get full text
Article -
15519
Optimal transport reveals dynamic gene regulatory networks via gene velocity estimation.
Published 2025-05-01“…Our algorithm overcomes this limitation by estimating gene velocities using optimal transport. …”
Get full text
Article -
15520
Ga-based MPC for satellite’s attitude and orbit control
Published 2025-07-01“…We propose a novel method that utilizes a nonlinear control strategy optimized by a Genetic Algorithm (GA) in conjunction with Model Predictive Control (MPC), focusing on managing both attitude and orbit simultaneously. …”
Get full text
Article