Showing 381 - 400 results of 1,339 for search 'algorithms and theoretical (developments OR development)', query time: 0.18s Refine Results
  1. 381

    A proposed model using glycation metrics and circulating biomarkers for the prevention of cardiovascular disease by Timothy Valk, Carol McMorrow

    Published 2025-08-01
    “…This relationship implies that glycated blood biomarkers could potentially be used as a proxy for assessing in situ myocardial changes.MethodsLaboratory tests for troponin I (cTnI), hemoglobin A1c (A1c), fructosamine, and low-density lipoprotein (LDL), were chosen to calculate the proxy for in situ glycation. An algorithm was developed incorporating these variables as individual measurements and as calculated metrics of glycation. …”
    Get full text
    Article
  2. 382

    A novel muirhead mean operators based decision algorithm with applications in the orientation of basketball players using circular q-rung orthopair fuzzy information by Changyou Wang

    Published 2025-07-01
    “…The decision-making accuracy improves when these operators maintain criterion relationships because they produce unbiased and dependable evaluations of player abilities and expertise. The development includes constructing key theoretical properties while creating a reliable multi-criteria decision-making (MCDM) algorithm that enables efficient computations. …”
    Get full text
    Article
  3. 383
  4. 384

    Optimizing FACTS Device Placement Using the Fata Morgana Algorithm: A Cost and Power Loss Minimization Approach in Uncertain Load Scenario-Based Systems by Mohammad Aljaidi, Pradeep Jangir, Sunilkumar P. Agrawal, Sundaram B. Pandya, Anil Parmar, Ali Fayez Alkoradees, Arpita, Aseel Smerat

    Published 2025-01-01
    “…The FATA algorithm is evaluated against recently developed and improved optimization techniques, such as rime-ice formation phenomenon based Improved RIME (IRIME) Algorithm, Newton–Raphson-Based Optimization (NRBO), Resistance Capacitance Algorithm (RCA), Krill Optimization Algorithm (KOA), and Grey Wolf Optimizer (GWO), across multiple optimization objectives: reduction in generation cost, reduction in power loss and combined generation cost plus power loss, termed as Gross cost function. …”
    Get full text
    Article
  5. 385

    Tramp Ship Routing and Scheduling with Integrated Carbon Intensity Indicator (CII) Optimization by Haiying Yang, Feiyang Ren, Jingbo Yin, Siqi Wang, Rafi Ullah Khan

    Published 2025-04-01
    “…A bi-objective optimization model is developed, with two objective functions aimed at maximizing fleet profit and improving CII ratings. …”
    Get full text
    Article
  6. 386

    Review of Acoustic Emission Detection Technology for Valve Internal Leakage: Mechanisms, Methods, Challenges, and Application Prospects by Dongjie Zheng, Xing Wang, Lingling Yang, Yunqi Li, Hui Xia, Haochuan Zhang, Xiaomei Xiang

    Published 2025-07-01
    “…This study provides a systematic reference for the engineering application and theoretical development of the acoustic emission-based technology for detecting internal leakage in valves.…”
    Get full text
    Article
  7. 387

    Machine learning-based coalbed methane well production prediction and fracturing parameter optimization by HU Qiujia, LIU Chunchun, ZHANG Jianguo, CUI Xinrui, WANG Qian, WANG Qi, LI Jun, HE Shan

    Published 2025-04-01
    “…The proposed model and fracturing parameter optimization algorithm provide theoretical support and practical references for efficient CBM development in the southern Qinshui Basin.…”
    Get full text
    Article
  8. 388

    Control system for noise-resistant electronic speed controller of a brushless electric motor for an unmanned aerial vehicle by M. V. Parinov, A. N. Yurov, Ya. V. Skitskiy

    Published 2024-02-01
    “…Examples are given in the form of an oscillogram. Based on theoretical research, an invariant algorithmic apparatus was developed for building software for various types of microcontrollers. …”
    Get full text
    Article
  9. 389

    The concept and content of the contract of participation in shared construction and its legal characteristics by A. E. Kolieva, G. G. Khachiev, F. G. Konova

    Published 2022-09-01
    “…One of the main issues of these studies was the equity participation agreement as a form of expression of legal relations between developers and participants in shared construction, which provides protection of the rights of all parties to the specified transaction. …”
    Get full text
    Article
  10. 390

    Applications of density functional theory and machine learning in nanomaterials: A review by Nangamso Nathaniel Nyangiwe

    Published 2025-07-01
    “…The development and creation of nanomaterials carry enormous prospects in advancing technology in electronics, energy storage and medicine. …”
    Get full text
    Article
  11. 391
  12. 392

    Blockchain covert communication scheme based on the cover of normal transactions by Pengkun JIANG, Wenyin ZHANG, Jiuru WANG, Shanyun HUANG, Wanshui SONG

    Published 2022-08-01
    “…With the development of computer technology, the situation of modern network attack and defense is becoming increasingly severe, and the problem of secure transmission of secret information needs to be solved urgently.Covert communication technology embeds secret information into the carrier and transmits the information safely through the covert channel.However, the traditional covert channels face the challenges of data damaging, attack, detection and so on, which cannot meet the higher security requirements.As a public data platform, blockchain can embed secret information under the cover of a large number of transactions.With its tamper proof, anonymity, decentralization and other characteristics, blockchain can well solve the problems of traditional covert channels and achieve secure covert communication.However, the existing blockchain covert communication schemes are limited by low communication efficiency and poor security.How to improve safety and efficiency of covert communication is a research focus of blockchain covert communication.Motivated by this issue, a blockchain covert communication scheme based on the cover of normal transactions was proposed.The hash algorithm was used to build a transmission-free password table to embed secret information without changing any transaction data.Using the elliptic curve feature, transactions with hidden information can be quickly screened out from a large number of transactions, to extract secret information quickly.This scheme improves the security and efficiency of covert communication and has strong portability.Theoretical analysis shows that attackers cannot distinguish between ordinary transactions and special transactions.This scheme has high anti-detection and scalability.Besides, the experimental results of the bitcoin test network show the high efficiency of this scheme.…”
    Get full text
    Article
  13. 393

    MATHEMATICAL MODEL OF COMPLEX PROTECTION OF AN INFOCOMMUNICATION OBJECT BASED ON "PLAYING WITH NATURE" by I. S. Klimenko

    Published 2022-08-01
    “…Theoretical and methodological approaches to the complex protection of info-communication objects, which are based on game theory, determine the relevance and practical significance of the development of mathematical models of real systems in the format offinite matrix games. …”
    Get full text
    Article
  14. 394

    Semi-automated modeling of combined stained glasses by Andrii Petrushevskyi

    Published 2022-06-01
    “…The basic tools and algorithm of their use necessary for creation of the professional project of a stained-glass cloth are developed. …”
    Get full text
    Article
  15. 395

    Transparency in artificial intelligence by Stefan Larsson, Fredrik Heintz

    Published 2020-05-01
    “…Finally, we draw a possible categorisation of aspects related to transparency in AI, or what we interchangeably call AI transparency, and argue for the need of developing a multidisciplinary understanding, in order to contribute to the governance of AI as applied on markets and in society.…”
    Get full text
    Article
  16. 396
  17. 397

    机器学习算法在食用植物油掺伪鉴别中应用的 研究进展Research progress on application of machine learning algorithms in adulteration identification of edible vegetable oils... by 吕壮,黄金,兰梓溶,代婷玉,许宙,陈茂龙,焦叶,文李,程云辉,丁利 LYU Zhuang, HUANG Jin, LAN Zirong, DAI Tingyu, XU Zhou, CHEN Maolong, JIAO Ye, WEN Li, CHENG Yunhui, DING Li

    Published 2025-07-01
    “…In order to provide a theoretical basis for the selection of algorithms in the adulteration identification of edible vegetable oils, the classification of machine learning algorithms and their application process in the adulteration identification of edible vegetable oils were briefly introduced. …”
    Get full text
    Article
  18. 398
  19. 399

    Optimising complexity and learning for photonic reservoir computing with gain-controlled multimode fibres by Giulia Marcucci, Luana Olivieri, Juan Sebastian Totero Gongora

    Published 2025-08-01
    “…Our results pave the way to developing optimised nonlinear photonic reservoirs leveraging structured complexity and controllable nonlinearity as fundamental design principles.…”
    Get full text
    Article
  20. 400

    Gear of functioning management accounting at agricultural enterprises by O.D. Panchenko

    Published 2020-08-01
    “…The algorithm for the introduction of management accounting system is proposed. …”
    Get full text
    Article