Suggested Topics within your search.
Suggested Topics within your search.
-
261
Cognitive Radio for Smart Grid: Theory, Algorithms, and Security
Published 2011-01-01“…Furthermore, compressed sensing algorithms such as Bayesian compressed sensing and the compressed sensing Kalman filter is employed for recovering the sparse smart meter transmissions. …”
Get full text
Article -
262
INFORMATION-ALGORITHMIC SUPPORT FOR DEVELOPMENT OF SOLID PHARMACEUTICAL FORM
Published 2018-10-01Get full text
Article -
263
Multinomial logistic regression algorithm for the classification of patients with parkinsonisms
Published 2025-03-01“…It can also distinguish between multiple types of parkinsonisms simultaneously and offers the flexibility to easily accommodate new groups.…”
Get full text
Article -
264
Improving Prediction Algorithms for Cardiometabolic Risk in Children and Adolescents
Published 2013-01-01“…We discuss the use of MetS scores and algorithms in an attempt to predict later cardiometabolic risk in children and adolescents and offer suggestions for developing clinically useful algorithms in this population. …”
Get full text
Article -
265
Parallel lightweight Block Cipher algorithm for Multicore CPUs
Published 2024-10-01“…To achieve high performance, lightweight speck cipher algorithms have been presented and implemented on CPU platforms with various improvements. …”
Get full text
Article -
266
Optimization Algorithm for Cutting Masonry with a Robotic Saw
Published 2025-04-01“…This article describes the optimization algorithm, including step-by-step calculations, and provides a practical example and a comparison of the results with earlier algorithms. …”
Get full text
Article -
267
Algorithms of diagnosis and therapy of a primary depressive episode
Published 2023-07-01“…A therapeutic algorithm for the PDE treatment was also developed and proposed: at the first stage – use of existing antidepressants with proven clinical effectiveness; at the second – switching from a drug in case of its ineffectiveness within 3–4 weeks to another drug with a different mechanism of action; at the third – in case of the previous stage ineffectiveness, using a combination antidepressant therapy (combining drugs of different groups); at the fourth – application of therapeutic schemes using diuretics, pathogenetic psychotherapy and electroconvulsive therapy. …”
Get full text
Article -
268
Naïve Bayes is an interpretable and predictive machine learning algorithm in predicting osteoporotic hip fracture in-hospital mortality compared to other machine learning algorithm...
Published 2025-01-01“…Interpretation of models found the most important features were chronic kidney disease, cardiovascular comorbidities and markers of bone metabolism; NB also offers direct intuitive interpretation. Overall, NB has much potential as an algorithm, due to its simplicity and interpretability whilst maintaining competitive predictive performance.…”
Get full text
Article -
269
Enhancing feature selection for multi-pose facial expression recognition using a hybrid of quantum inspired firefly algorithm and artificial bee colony algorithm
Published 2025-02-01“…In order to evaluate the efficacy of the proposed QIFABC algorithm, feature selection is also conducted using QIFA, FA, and ABC algorithms. …”
Get full text
Article -
270
Research on Multi-Target Point Path Planning Based on APF and Improved Bidirectional RRT* Fusion Algorithm
Published 2025-05-01“…This study also aims to improve the RRT* algorithm by using optimization strategies such as bidirectional sampling and adding an adaptive target bias strategy to improve its efficiency in obtaining global paths. …”
Get full text
Article -
271
Apply Block Ciphers Using Tiny Encryption Algorithm (TEA)
Published 2010-06-01“…The paper presents how a block cipher could be constructed in general, it includes an observation of the history, inventors, and algorithms of the TEA block ciphers. It also discuss the manner did the programming took in terms of modularity, simplicity, resource reservation, in the previous algorithm the user cannot enter the plain text as a characters, it must enter the ASCII cod of the characters we write a lot e of functions to solve this problem also we enable the user to save his message in text file to make him use it to receive a message from email ,Also the time of encryption and decryption are calculated to measure the performance of the algorithm., The implementation of TEA is made using C/C++ Borland compiler version( 4.5). …”
Get full text
Article -
272
Beyond predefined ligand libraries: a genetic algorithm approach for de novo discovery of catalysts for the Suzuki coupling reactions
Published 2025-01-01“…This work not only proves the potential of genetic algorithms in the cost-effective and scalable discovery of new catalysts but also sets the stage for future exploration beyond predefined chemical spaces, enhancing the toolkit available for catalyst design.…”
Get full text
Article -
273
On the Optimization and Parallelizing Little Algorithm for Solving the Traveling Salesman Problem
Published 2016-08-01“…We also investigated the acceleration that can be achieved by parallelizing the basic Little algorithm for directed graphs. …”
Get full text
Article -
274
Research and application of RFID location algorithm based on reference tags
Published 2010-01-01“…Several improvements of the existing reference tag-based nearest-neighbor positioning algorithm were intro-duced,including the method of dynamic setting of k value,the concept of reference tags’ credibility and the algorithm of correction based on the positioning error of nearest tags.The algorithm based on the historical track of object tags was also adopted.The indoor positioning system was built with time-division multi-use antennas connected to its RF-ports.The visual software was also developed based on the algorithm proposed.Positioning accuracy and stability in complex environments were proved by experiments to be better than that of the existing algorithm.…”
Get full text
Article -
275
Review and classification of trajectory summarisation algorithms: From compression to segmentation
Published 2021-10-01“…This not only consumes large amounts of memory, but also makes the extracting knowledge process more difficult. …”
Get full text
Article -
276
Test case minimizing based on combination chaos genetic algorithm
Published 2016-06-01“…Test case minimizing is one of the most important research fields in software testing.Uniformly distributed Chebyshev and Logistic chaos sequence were introduced in the selection,crossover and mutation of genetic algorithm.Chaos disturbance was also added in genetic testing suite to address the common problems of weak ability in local search and premature convergence,thus to optimize the test result.Experiments were conducted in randomly generated test suites and Siemens test suites.Comparisons were also made with classical methods regard to the scale of production of test suite and the execution time of the algorithms.The results of the experiment indicate that based on the same execution time of the algorithms,a smaller scale test suite can be produced by introducing chaotic sequence in genetic testing suite selection.…”
Get full text
Article -
277
From humans to algorithms: A sociotechnical framework of workplace surveillance
Published 2025-12-01“…Although existing surveillance frameworks acknowledge the role that social context plays in shaping the outcomes of surveillance, they overlook the impact organisational culture, leadership, management, and employees have on shaping its characteristics. Current frameworks also underplay the influence of digital technology and fail to account for the impact modern digital technologies, such as artificial intelligence algorithms, have on shaping the characteristics of surveillance. …”
Get full text
Article -
278
An Intrusion Detection Approach based on the Combination of Oversampling and Undersampling Algorithms
Published 2023-06-01Get full text
Article -
279
An Irregular Flight Scheduling Model and Algorithm under the Uncertainty Theory
Published 2013-01-01“…Owing to the uncertainty of the problem and insufficient data in the decision-making procedure, the traditional modeling tool (probability theory) is abandoned, the uncertainty theory is applied to address the issues, and an uncertain programming model is developed with the chance constraint. This paper also constructs a solution method to solve the model based on the classical Hungarian algorithm under uncertain conditions. …”
Get full text
Article -
280
Algorithmic Management of Workers through Food Delivery Platforms in India
Published 2025-03-01“…By placing food delivery platforms in the context of broader discussions around digital labour, control, and automation, this research illustrates how algorithmic management not only automates management functions but also heightens job insecurity through the reintroduction of piece-rate pay. …”
Get full text
Article