Search alternatives:
method » methods (Expand Search)
Showing 1,081 - 1,100 results of 3,553 for search 'different threshold method', query time: 0.11s Refine Results
  1. 1081

    Big Data Cleaning Based on Improved CLOF and Random Forest for Distribution Networks by Jie Liu, Yijia Cao, Yong Li, Yixiu Guo, Wei Deng

    Published 2024-01-01
    “…However, due to the difficulty in determining the LOF threshold, a method of dynamically calculating the threshold based on the transformer districts and time is proposed. …”
    Get full text
    Article
  2. 1082

    Study of the diagnostic significance of telomere length in patients with cerebral atherosclerosis by M. S. Yehorova, D. S. Krasnienkov, V. H. Hurianov, V. Ye. Kondratiuk

    Published 2020-06-01
    “…For a set of significant risk factors selection, the method of step-by-step inclusion / exclusion of signs was used (stepwise exclusion threshold value of P > 0.15 and inclusion threshold value of P < 0.03). …”
    Get full text
    Article
  3. 1083

    On the Relationship Between the Gini Coefficient and Skewness by Meng Lian, Long Chen, Cang Hui, Fuyuan Zhu, Peijian Shi

    Published 2024-12-01
    “…We showed the differences in improving the accuracy of GC calculations based on small‐sample adjustments among various calculation methods, including the polygon (trapezoidal set) area method and the rotated Lorenz curve method. …”
    Get full text
    Article
  4. 1084

    Dynamic Monitoring of Goaf Stress Field and Rock Deformation Driven by Optical Diber Sensing Technology by Jing Chai, Zhe Yan, Yibo Ouyang, Dingding Zhang, Jianfeng Yang, Gaoyi Yang, Chenyang Ma

    Published 2025-04-01
    “…Addressing the critical technological needs for the real-time monitoring of stress distribution in mining areas, a new method for inverting goaf pressure using distributed optical fiber monitoring data is proposed. …”
    Get full text
    Article
  5. 1085

    Assessing Sangguniang Kabataan Programs: A Baseline Study in Developing a Comprehensive Plan for the Development of the Youth in Cuenca, Batangas by Renniel Jayson Jacinto Rosales

    Published 2023-03-01
    “…The Sangguniang Kabataan is an essential part of the government to develop the youth in the society and to encourage a meaningful youth participation in different sectors in the community. This study assesses the Sangguniang Kabataan performance in Cuenca, Batangas as it encapsulates the strength and weaknesses of the programs together with the needs, comments, and suggestions of the youth as guided by the National Youth Commission’s Nine Centers of Meaningful Youth Participation in line with some selected United Nations Sustainable Developmental Goals through a mixed-method study. …”
    Get full text
    Article
  6. 1086

    Dynamics of a Delay-Varying Computer Virus Propagation Model by Jianguo Ren, Yonghong Xu, Yongchang Zhang, Yongquan Dong, Guosheng Hao

    Published 2012-01-01
    “…It is found that the model may undergo a Hopf bifurcation. Next, we use different methods to prove the global asymptotic stability of the equilibria: the virus-free equilibrium by using the direct Lyapunov method and virus equilibrium by using a geometric approach. …”
    Get full text
    Article
  7. 1087

    Simulating the impact of electron beam energy deposition on lead target temperature by Walid Oueslati

    Published 2024-06-01
    “…Leveraging FLUKA software, we simulate the intricate interplay between electrons and the target surface, analyzing variations in deposited energy across different target thicknesses. Beyond elucidating the electron-target interaction, our investigation extends to predicting crucial parameters such as the maximum operational threshold and surface temperature distribution of the target. …”
    Get full text
    Article
  8. 1088

    Research on incremental deployment mechanism of network modality for polymorphic network environment by Jiong LI, Yuxiang HU, Pengshuai CUI, Le TIAN, Yongji DONG

    Published 2023-06-01
    “…Polymorphic networks support diverse network requirements and can coexist, evolve, and change on a unified physical or logical infrastructure in the form of network modality.They can maximize the innovation vitality of network technology driven by new applications.The evolution and development of modality require the incremental deployment of modality to meet the needs of convenience and privacy protection in the multi-user deployment process.However, the deployment of current network functions still uses the one-by-one deployment method, resulting in high complexity of the deployment of new modality, and mutual exposure of processing logic between different users.To address these issues, an incremental deployment mechanism for polymorphic network environments was proposed.Firstly, an incremental deployment mechanism for network modality was designed.Then, the incremental deployment of modality was abstracted as a graph merging problem based on this mechanism, and an adjacency list-based merge parsing graph algorithm was designed.The simulation results indicate that the proposed mechanism can achieve fast and correct merging of network modality, support incremental modality deployment, and greatly reduce the application deployment and service provision threshold of new network systems.…”
    Get full text
    Article
  9. 1089

    Vehicle detection and recognition algorithm based on function improvement of YOLOv3 by SONG Huajie, ZHOU Lei

    Published 2023-12-01
    “…In view of this defect, the loss function of YOLOv3 algorithm was improved, the wide-height coordinate error was modified into the form of proportion, the non-maximum suppression method of the original model was improved and the overlap threshold was changed from the fixed value to the form of attenuation function. …”
    Get full text
    Article
  10. 1090

    Research on incremental deployment mechanism of network modality for polymorphic network environment by Jiong LI, Yuxiang HU, Pengshuai CUI, Le TIAN, Yongji DONG

    Published 2023-06-01
    “…Polymorphic networks support diverse network requirements and can coexist, evolve, and change on a unified physical or logical infrastructure in the form of network modality.They can maximize the innovation vitality of network technology driven by new applications.The evolution and development of modality require the incremental deployment of modality to meet the needs of convenience and privacy protection in the multi-user deployment process.However, the deployment of current network functions still uses the one-by-one deployment method, resulting in high complexity of the deployment of new modality, and mutual exposure of processing logic between different users.To address these issues, an incremental deployment mechanism for polymorphic network environments was proposed.Firstly, an incremental deployment mechanism for network modality was designed.Then, the incremental deployment of modality was abstracted as a graph merging problem based on this mechanism, and an adjacency list-based merge parsing graph algorithm was designed.The simulation results indicate that the proposed mechanism can achieve fast and correct merging of network modality, support incremental modality deployment, and greatly reduce the application deployment and service provision threshold of new network systems.…”
    Get full text
    Article
  11. 1091

    Short-term load forecasting based on multi-frequency sequence feature analysis and multi-point modified FEDformer by Kaiyuan Hou, Xiaotian Zhang, Junjie Yang, Jiyun Hu, Guangzhi Yao, Jiannan Zhang

    Published 2025-01-01
    “…Throughout the forecasting process, a weighted threshold α is set, and a hybrid weighting method is utilized to combine the forecast results from different models, culminating in the final short-term load forecast results. …”
    Get full text
    Article
  12. 1092

    Applying Classical and Intelligence Techniques for Digital Image Contrast Enhancement by Alyaa taqi

    Published 2008-12-01
    “…By studying the classical and fuzzy logic methods, we proposed a method named (Fuzzy Hyperbolic Threshold), the proposed method gave very good results. …”
    Get full text
    Article
  13. 1093

    Gain Saturation of Encapsulated CdTe-Ag Quantum Dot Composite in SiO<sub>2</sub> by Minwoo Kim, Agna Antony, Inhong Kim, Minju Kim, Kwangseuk Kyhm

    Published 2024-12-01
    “…This analysis enabled us to find the limit of the commonly used fitting method in terms of a threshold length and a saturation length, where amplification begins and saturation ends, respectively.…”
    Get full text
    Article
  14. 1094

    Electronic Information Signal Recognition Based on a Stochastic Neural Network Algorithm by Jiaye Wang

    Published 2022-01-01
    “…This paper uses the method of duty cycle, average amplitude difference function, and FFT to calculate the energy duty cycle for feature extraction and uses TSVD-SCN algorithm to classify and recognize different intrusion vibration feature vectors. …”
    Get full text
    Article
  15. 1095

    A monitoring and warning system for expressway slopes using FBG sensing technology by Yongqiang Hu, Chengyu Hong, Yifan Zhang, Guowei Li

    Published 2018-05-01
    “…The maximum magnitudes of cumulative strain and displacement in the present monitored expressway slope were 198 με and 5.06 mm, respectively. Critical threshold values of different warning levels for expressway slopes have been proposed using statistical analysis method based on comparative analysis of history monitored data from slopes in the same region. …”
    Get full text
    Article
  16. 1096

    The Non-Orthogonal Multiple Access (NOMA) Dynamic Power Allocation in 5G Networks by Noor Alzubaidi, Ismael Sharhan Hubri

    Published 2022-07-01
    “… Abstract The thought of non-orthogonal multiple access (NOMA) are given as a potential radio access method for versatile correspondence networks past the fourth era (4G). …”
    Get full text
    Article
  17. 1097

    Entrepreneurship and Economic Freedom: Do Objective and Subjective Data Reflect the Same Tendencies? by Burak Erkut

    Published 2016-09-01
    “…Findings: To determine the degree of economic freedom in a country, the effective enforcement of intellectual property rights legislation and quick access to utilities are the two variables with the most informational content. 86,8% of the original grouped cases was classified correctly – this is above the widely accepted threshold of 75%. Implications & Recommendations: A new trend in entrepreneurial research is to build compound indices based on different data sources. …”
    Get full text
    Article
  18. 1098

    The Experimental Investigation of the Development Potential of Low-Permeability Reservoirs in the Daqing Oilfield by Yazhou Zhou, Daiyin Yin

    Published 2020-01-01
    “…The throat radius distributions of the different low-permeability cores were determined by the constant velocity mercury injection method, the movable fluid distribution characteristics were determined by nuclear magnetic resonance, and the nonlinear fluid flow characteristics were analyzed via fluid flow experimentation. …”
    Get full text
    Article
  19. 1099

    Application of causal forests to randomised controlled trial data to identify heterogeneous treatment effects: a case study by Eleanor Van Vogt, Anthony C. Gordon, Karla Diaz-Ordaz, Suzie Cro

    Published 2025-02-01
    “…The modal initial (root) splits of the causal forest were extracted, and the mean value was used as a threshold to partition the population into subgroups with different treatment effects. …”
    Get full text
    Article
  20. 1100

    Optical Fiber Vibration Signal Recognition Based on the EMD Algorithm and CNN-LSTM by Kun Li, Yao Zhen, Peng Li, Xinyue Hu, Lixia Yang

    Published 2025-03-01
    “…Experimental results demonstrate that this method effectively identifies three different types of vibration signals collected from a real-world environment, achieving a recognition accuracy of 97.3% for intrusion signals. …”
    Get full text
    Article