-
5261
Fingolimod and risk of skin cancer among individuals with multiple sclerosis: a population-based cohort study protocol
Published 2025-01-01“…This study aims to describe a protocol for investigating the relationship between fingolimod use and the incidence of skin cancer among individuals with MS.Methods and analysis We will use population-based administrative health data from two Canadian provinces (British Columbia and Alberta) to conduct an observational cohort ‘trial emulation’ study with an active comparator and new-user design. Individuals with MS aged ≥18 years will be identified using a validated algorithm. …”
Get full text
Article -
5262
Tissue Puncture Event Detection in Needle Procedures using Vibroacoustic Signals - ResNet optimised Phantom Results
Published 2024-12-01“…This result is very encouraging, as several possible improvements have been identified that will be implemented in the next research steps together with a robot assisted insertion and an automatic video annotation algorithm.…”
Get full text
Article -
5263
GRU-based multi-scenario gait authentication for smartphones
Published 2022-10-01“…At present, most of the gait-based smartphone authentication researches focus on a single controlled scenario without considering the impact of multi-scenario changes on the authentication accuracy.The movement direction of the smartphone and the user changes in different scenarios, and the user’s gait data collected by the orientation-sensitive sensor will be biased accordingly.Therefore, it has become an urgent problem to provide a multi-scenario high-accuracy gait authentication method for smartphones.In addition, the selection of the model training algorithm determines the accuracy and efficiency of gait authentication.The current popular authentication model based on long short-term memory (LSTM) network can achieve high authentication accuracy, but it has many training parameters, large memory footprint, and the training efficiency needs to be improved.In order to solve the above problems a multi-scenario gait authentication scheme for smartphones based on Gate Recurrent Unit (GRU) was proposed.The gait signals were preliminarily denoised by wavelet transform, and the looped gait signals were segmented by an adaptive gait cycle segmentation algorithm.In order to meet the authentication requirements of multi-scenario, the coordinate system transformation method was used to perform direction-independent processing on the gait signals, so as to eliminate the influence of the orientation of the smartphone and the movement of the user on the authentication result.Besides, in order to achieve high-accuracy authentication and efficient model training, GRUs with different architectures and various optimization methods were used to train the gait model.The proposed scheme was experimentally analyzed on publicly available datasets PSR and ZJU-GaitAcc.Compared with the related schemes, the proposed scheme improves the authentication accuracy.Compared with the LSTM-based gait authentication model, the training efficiency of the proposed model is improved by about 20%.…”
Get full text
Article -
5264
A novel MCDM method for assessing student employability psychology using complex Pythagorean hesitant fuzzy Sugeno Weber aggregation
Published 2025-07-01“…Lastly, we explain the conclusion of our research.…”
Get full text
Article -
5265
Creep behavior of clayey soil and its model prediction in the Cangzhou land subsidence area
Published 2025-03-01Get full text
Article -
5266
The Proposal and Validation of a Distributed Real-Time Data Management Framework Based on Edge Computing with OPC Unified Architecture and Kafka
Published 2025-06-01“…This research provides a practical solution for the industrial data management system, not only helping enterprises improve the transparency level of manufacturing sites and the efficiency of resource scheduling but also providing a practical basis for further research on industrial data processing under the “edge-cloud collaboration” architecture in the academic community.…”
Get full text
Article -
5267
3D Synthetic Aperture Imaging Method in Spectrum Domain for Low-Cost Portable Ultrasound Systems
Published 2023-11-01“…Moreover, the computational speed of the fast Fourier transform (FFT) algorithm utilized for the ultrasound image synthesis in the spectrum domain makes the proposed method to be more competitive compared to the conventional time domain (TD) STA method based on the delay-and-sum (DAS) technique, especially in the case of 3D imaging in real time mode. …”
Get full text
Article -
5268
HEALTH CLAIM INSURANCE PREDICTION USING SUPPORT VECTOR MACHINE WITH PARTICLE SWARM OPTIMIZATION
Published 2023-06-01“…The derivatives aren’t needed in its computation. Several researches show that PSO give the better solutions if it is compared with GA. …”
Get full text
Article -
5269
Modelling and Simulation of a 3MW, Seventeen-Phase Permanent Magnet AC Motor with AI-Based Drive Control for Submarines Under Deep-Sea Conditions
Published 2025-08-01“…Addressing this gap, this research investigates advanced control methodologies to enhance the performance of such motors. …”
Get full text
Article -
5270
AESware: Developing AES-enabled low-power multicore processors leveraging open RISC-V cores with a shared lightweight AES accelerator
Published 2024-12-01“…Nevertheless, comprehensive research on developing low-power multicore processors with integrated security features using existing open RISC-V cores remains limited. …”
Get full text
Article -
5271
-
5272
Distinguishing glioblastoma from brain metastasis; a systematic review and meta-analysis on the performance of machine learning
Published 2025-02-01“…We systematically reviewed the studies reported the performance of machine learning (ML) algorithms for accurately discrimination of these two entities. …”
Get full text
Article -
5273
-
5274
A Novel Two-Stage Deep Learning Model for Network Intrusion Detection: LSTM-AE
Published 2023-01-01“…The constant development of network behavior and the fast growth of attacks need the development of IDS and the evaluation of many datasets produced over time through static and dynamic methods. This kind of research enables the identification of the most efficient algorithm for identifying future cyber-attacks. …”
Get full text
Article -
5275
-
5276
Using Reinforcement Learning in a Dynamic Team Orienteering Problem with Electric Batteries
Published 2024-11-01Get full text
Article -
5277
A Crime Data Analysis of Prediction Based on Classification Approaches
Published 2022-10-01“…The aim is focused on comparative study between three supervised learning algorithms. …”
Get full text
Article -
5278
Efficient MMSE-SQRD-Based MIMO Decoder for SEFDM-Based 2.4-Gb/s-Spectrum-Compressed WDM VLC System
Published 2016-01-01Get full text
Article -
5279
Numerical Solution of Dual Fully Fuzzy Equations System Using Some Meta Heuristic Methods
Published 2025-10-01“…We consider the equations system in crisp equations form as an optimization problem, and then its problems are solved. Here we compare the performance of four meta-heuristic methods, i.e., genetic algorithm (GA), chaos optimization algorithm (COA), particle swarm optimization (PSO), and grey wolf optimizer (GWO), to solve some cases in our problems. …”
Get full text
Article -
5280
Non-Destructive Thickness Measurement of Energy Storage Electrodes via Terahertz Technology
Published 2025-06-01Get full text
Article