Suggested Topics within your search.
Suggested Topics within your search.
-
841
An Intelligent Gestational Diabetes Mellitus Recognition System Using Machine Learning Algorithms
Published 2023-02-01“… Diabetes mellitus is also called gestational diabetes when a woman has high blood sugar while she is pregnant. …”
Get full text
Article -
842
Exact Algorithms for Practical Instances of the Railcar Loading Problem at Marine Container Terminals
Published 2022-01-01“…A complementary solution algorithm for the case when a rail car has multiple wells is also provided. …”
Get full text
Article -
843
Algorithms for General System of Generalized Resolvent Equations with Corresponding System of Variational Inclusions
Published 2012-01-01“…The convergence criteria of approximate solutions of general system of generalized resolvent equations obtained by the proposed iterative algorithm are also presented. Our results represent the generalization, improvement, supplement, and development of Ahmad and Yao corresponding ones.…”
Get full text
Article -
844
IOT Monitoring System for Ship Operation Management Based on YOLOv3 Algorithm
Published 2022-01-01“…Compared with traditional and in-depth training, this data algorithm is not only more practical and accurate but also more efficient in learning algorithms and various environments. …”
Get full text
Article -
845
Algorithmic Failure? The Weimar Triangle as a Subregional Emulation of Global Governance Structures
Published 2024-06-01“…These disturbances are expressed not only in fluctuations in the cooperation levels within the Triangle, but also in increasingly long periods of institutional inertia. …”
Get full text
Article -
846
Lossless image authentication algorithm based on adaptive combinations of image basic blocks
Published 2012-06-01“…As the existing block-wise lossless image authentication algorithms were inadequate in the division of image authentication blocks,a novel lossless image authentication algorithm based on adaptive combinations of image basic blocks was proposed.The image authentication block was composed of some basic image blocks by the source image characteristics and requirements of watermarking image fidelity,and the authentication code was generated by a digital signature algorithm and embedded into the authentication block via a lossless watermarking algorithm.Moreover,the robust transmission of the image ID was achieved via multi-embedding,and using the ID and authentication block ID the image authentication algorithm could prevent vector quantizationattack.Theoretical analyses and experimental results demonstrate that the algorithm not only improves the existing tamper localization accuracy but also has strong adaptability and can resist vector quantization attack.…”
Get full text
Article -
847
Research on cardiac image segmentation algorithm based on improved level set modeling
Published 2025-07-01“…In contrast, the proposed approach breaks down a complex problem into several simpler sub-problems that can be solved sequentially to enable faster and more accurate resolution using the ADMM algorithm. This approach also effectively addresses the challenges posed by level-set equations. …”
Get full text
Article -
848
Amending the algorithm of aerosol–radiation interactions in WRF-Chem (v4.4)
Published 2025-02-01“…The difference in planet boundary layer height can reach up to <span class="inline-formula">∼100</span> m in China and <span class="inline-formula">∼200</span> m in the Sahara, which also results in a greater surface haze. The results show that correcting the estimation algorithm of aerosol radiative effects is necessary in WRF-Chem.…”
Get full text
Article -
849
Iterative algorithm for locating nodes in WSN based on modifying average hopping distances
Published 2009-01-01“…The procedure of the iterative locating algorithm based on modifying average hopping distances and the simulation results were also shown. …”
Get full text
Article -
850
Efficient Dual Domain Decoding of Linear Block Codes Using Genetic Algorithms
Published 2012-01-01“…The complexity of this algorithm is also discussed and compared to other algorithms.…”
Get full text
Article -
851
Connectivity Node Set Generation Algorithm of Mine WSN Based on the Maximum Distance
Published 2016-07-01“…The strategy not only determines the routine work of the sensor networks but also affects energy consumption, survival time, and quality of service (QoS). …”
Get full text
Article -
852
Design of Combined Sliding Mode Controller Back Stepping Using Genetic Algorithm
Published 2013-01-01“…To resolve this problem, the numerical algorithm which is a genetic algorithm is used here and we have the optimal parameters of the proposed controller. …”
Get full text
Article -
853
Hybrid Algorithm of Fixed Point for Weak Relatively Nonexpansive Multivalued Mappings and Applications
Published 2012-01-01“…In this paper, the notion of multivalued resolvent of maximal monotone operator has been also presented which is a weak relatively nonexpansive multivalued mapping and can be used to find the zero point of maximal monotone operator.…”
Get full text
Article -
854
Optimization Design of Blades Based on Multi-Objective Particle Swarm Optimization Algorithm
Published 2025-02-01“…This article proposes an optimization algorithm framework that integrates two objectives: aerodynamic shape optimization and structural optimization. …”
Get full text
Article -
855
Estimation of Quantum Fisher Information via Stein's Identity in Variational Quantum Algorithms
Published 2025-07-01“…The Quantum Fisher Information Matrix (QFIM) plays a crucial role in quantum optimization algorithms such as Variational Quantum Imaginary Time Evolution and Quantum Natural Gradient Descent. …”
Get full text
Article -
856
Variational Bayesian EM Algorithm for Quantile Regression in Linear Mixed Effects Models
Published 2024-10-01“…The choice of hyperparameters in the NBP prior is crucial, and we employed the Variational Bayesian Expectation–Maximization (VBEM) for model estimation and variable selection. The Gibbs sampling algorithm is a commonly used Bayesian method, and it can also be combined with the EM algorithm, denoted as GBEM. …”
Get full text
Article -
857
Multiobjective Optimization of Irreversible Thermal Engine Using Mutable Smart Bee Algorithm
Published 2012-01-01“…The results have been checked with some of the most common optimizing algorithms like Karaboga’s original artificial bee colony, bees algorithm (BA), improved particle swarm optimization (IPSO), Lukasik firefly algorithm (LFFA), and self-adaptive penalty function genetic algorithm (SAPF-GA). …”
Get full text
Article -
858
Chaotic sequences based watermarking wireless physical layer security authentication algorithm
Published 2025-07-01“…Relying on specific cryptographic algorithms alone in the tradition was difficult to cope with password cracking abilities of high-intensity and high-computility. …”
Get full text
Article -
859
Energy-efficient collaborative transmission algorithm based on potential game theory for beamforming
Published 2019-09-01“…This paper proposes an energy-efficient collaborative transmission algorithm based on potential game theory for beamforming. …”
Get full text
Article -
860
Research on geomagnetic indoor high-precision positioning algorithm based on generative model
Published 2023-06-01“…Aiming at the current bottleneck of constructing a fine geomagnetic fingerprint library that required a lot of labor costs, two generative models called the conditional variational autoencoder and the conditional confrontational generative network were proposed, which could collect a small number of data samples for a given location, and generate pseudo-label fingerprints.At the same time, in order to solve the problem of low positioning accuracy of single-point geomagnetic fingerprints, a geomagnetic sequence positioning algorithm based on attention mechanism of convolutional neural network-gated recurrent unit was designed, which could effectively use the spatial and temporal characteristics of fingerprints to achieve precise positioning.In addition, a real-time, portable mobile terminal data collection and positioning system was also designed and built.The actual test shows that the proposed model can effectively construct the available geomagnetic fingerprint database, and the average error of the proposed algorithm can reach 0.16 m.…”
Get full text
Article