Showing 901 - 920 results of 8,687 for search 'Mbuti~', query time: 3.89s Refine Results
  1. 901

    Prediction of power grid fault repair time based on multi-model fusion by Jianyue PAN, Yizhen WU, Hanlin XU

    Published 2020-01-01
    “…There are many types of power grid faults,and the reasons are complicated.The prediction of fault repair time is difficult.Due to the rise of new technologies such as deep learning,it is feasible to accurately mine the faulty worksheet and accurately predict the fault repair time.Taking the historical grid fault repair worksheet as the research object,the multi-model fusion prediction method was proposed,and the prediction results of LightGBM,XGBoost and LSTM were weighted and fused.The experimental results show that the multi-model fusion prediction method can accurately estimate the fault repair time and provide better support for the automation and intelligence of grid fault repair.…”
    Get full text
    Article
  2. 902
  3. 903

    Female Genital Mutilation: Health Consequences and Complications—A Short Literature Review by Elliot Klein, Elizabeth Helzner, Michelle Shayowitz, Stephan Kohlhoff, Tamar A. Smith-Norowitz

    Published 2018-01-01
    “…Female genital mutilation (FGM) is a procedure performed on women in developing countries and is underreported; it involves cutting or altering the female genitalia. …”
    Get full text
    Article
  4. 904
  5. 905

    Access control model for multi-source heterogeneous data in big data environment by Qiuyue SU, Xingshu CHEN, Yonggang LUO

    Published 2019-02-01
    “…The big data platform is open and shared,but with the increasing amount of data and the complex and variable user access context,the RBAC model is difficult to meet the fine-grained and flexible access control in big data environment.To solve this problem,an access control model for multi-source heterogeneous data in big data platform is proposed.The model dynamically determines role permissions based on attributes and builds a hierarchical structure based on data groups to achieve simple management of data attributes.The model is formally defined,and the implementation and workflow in Hadoop platform are described.The experimental results show that the performance overhead of the proposed scheme is relatively small.…”
    Get full text
    Article
  6. 906
  7. 907
  8. 908

    Improving the segmentation of the vertebrae using a multi-stage machine learning algorithm by Vladyslav Koniukhov

    Published 2024-11-01
    “…The aim is to research the possibility of improving segmentation of vertebrae:  Th8, Th9, Th10, Th11 using a multi-stage method of segmentation of the spine using machine learning to improve the accuracy of automation of vertebrae segmentation. …”
    Get full text
    Article
  9. 909
  10. 910
  11. 911
  12. 912
  13. 913

    A Comprehensive Multi-Dimensional Risk Monitoring Model for Illegal Financial Activities by Zhong-qiang Zhou, Ling Li, Ping Huang

    Published 2024-12-01
    “…This study proposes a comprehensive, multi-dimensional risk monitoring model tailored to detect illegal financial activities, based on four core dimensions: investor behavior, intermediary platforms, investment products, and regional factors. …”
    Get full text
    Article
  14. 914

    Research on distributed multi-access edge computing based on mimic defense theory by Hongyi ZHU, Xiaoyuan LU, Yi LI

    Published 2019-09-01
    Subjects: “…multi-access edge computing…”
    Get full text
    Article
  15. 915

    Multi-threshold algorithm about image segmentation based on polynomial uniform approximation by Yan-jun WEI, Bo-qin FENG, Wei-guo WU

    Published 2016-10-01
    “…Aiming at those shortcomings of previous multi-threshold image segmentation algorithm such as large complexity and instability caused by the image histogram glitch interference,a new multi-threshold image segmentation algorithm was proposed using Bernstein polynomial to uniformly approximate histogram curve.First,according to the approximation theory of Weierstrass to construct Bernstein polynomial for the histogram curve,then more difficult peak value calculating of the histogram was reduced to the Bernstein polynomial extremal generating,that was exported easily by the first and second derivative of Bernstein polynomial function,and finally obtain the actual peak value of the image histogram by picking up these extremes and polar values and filtering through classification algorithm,and finish multi-threshold image segmentation.Experimental results show that the algorithm is insensitive for histogram glitch interference,the overall is stable,the redundant computation and time complexity are smaller,with less time and high efficiency,the approximate performance and segmentation effect are better.…”
    Get full text
    Article
  16. 916
  17. 917
  18. 918

    Precision assembly error analysis of parts based on multi-constraint surface matching by Wenbin Tang, Tong Yan, Jinshan Sun, Yadong Li

    Published 2025-01-01
    “…This paper introduces an advanced precision assembly error analysis method based on multi-constraint surface matching, aimed at overcoming these limitations. …”
    Get full text
    Article
  19. 919

    Immunoinformatic strategy for developing multi-epitope subunit vaccine against Helicobacter pylori. by Md Nahian, Md Rasel Khan, Fabiha Rahman, Hossain Mohammed Reza, Imren Bayil, Tanjum Ahmed Nodee, Tabassum Basher, Mostafizur Rahaman Sany, Rabeya Najnin Munmun, S M Ariful Habib, Lincon Mazumder, Mrityunjoy Acharjee

    Published 2025-01-01
    “…In this study, we employed an immunoinformatic strategy to design a set of candidate multi-epitope subunit vaccines by combining the most potent B and T cell epitopes from three targeted antigenic proteins (BabA, CagA, and VacA). …”
    Get full text
    Article
  20. 920