-
1081
Big Data Cleaning Based on Improved CLOF and Random Forest for Distribution Networks
Published 2024-01-01“…However, due to the difficulty in determining the LOF threshold, a method of dynamically calculating the threshold based on the transformer districts and time is proposed. …”
Get full text
Article -
1082
Study of the diagnostic significance of telomere length in patients with cerebral atherosclerosis
Published 2020-06-01“…For a set of significant risk factors selection, the method of step-by-step inclusion / exclusion of signs was used (stepwise exclusion threshold value of P > 0.15 and inclusion threshold value of P < 0.03). …”
Get full text
Article -
1083
On the Relationship Between the Gini Coefficient and Skewness
Published 2024-12-01“…We showed the differences in improving the accuracy of GC calculations based on small‐sample adjustments among various calculation methods, including the polygon (trapezoidal set) area method and the rotated Lorenz curve method. …”
Get full text
Article -
1084
Dynamic Monitoring of Goaf Stress Field and Rock Deformation Driven by Optical Diber Sensing Technology
Published 2025-04-01“…Addressing the critical technological needs for the real-time monitoring of stress distribution in mining areas, a new method for inverting goaf pressure using distributed optical fiber monitoring data is proposed. …”
Get full text
Article -
1085
Assessing Sangguniang Kabataan Programs: A Baseline Study in Developing a Comprehensive Plan for the Development of the Youth in Cuenca, Batangas
Published 2023-03-01“…The Sangguniang Kabataan is an essential part of the government to develop the youth in the society and to encourage a meaningful youth participation in different sectors in the community. This study assesses the Sangguniang Kabataan performance in Cuenca, Batangas as it encapsulates the strength and weaknesses of the programs together with the needs, comments, and suggestions of the youth as guided by the National Youth Commission’s Nine Centers of Meaningful Youth Participation in line with some selected United Nations Sustainable Developmental Goals through a mixed-method study. …”
Get full text
Article -
1086
Dynamics of a Delay-Varying Computer Virus Propagation Model
Published 2012-01-01“…It is found that the model may undergo a Hopf bifurcation. Next, we use different methods to prove the global asymptotic stability of the equilibria: the virus-free equilibrium by using the direct Lyapunov method and virus equilibrium by using a geometric approach. …”
Get full text
Article -
1087
Simulating the impact of electron beam energy deposition on lead target temperature
Published 2024-06-01“…Leveraging FLUKA software, we simulate the intricate interplay between electrons and the target surface, analyzing variations in deposited energy across different target thicknesses. Beyond elucidating the electron-target interaction, our investigation extends to predicting crucial parameters such as the maximum operational threshold and surface temperature distribution of the target. …”
Get full text
Article -
1088
Research on incremental deployment mechanism of network modality for polymorphic network environment
Published 2023-06-01“…Polymorphic networks support diverse network requirements and can coexist, evolve, and change on a unified physical or logical infrastructure in the form of network modality.They can maximize the innovation vitality of network technology driven by new applications.The evolution and development of modality require the incremental deployment of modality to meet the needs of convenience and privacy protection in the multi-user deployment process.However, the deployment of current network functions still uses the one-by-one deployment method, resulting in high complexity of the deployment of new modality, and mutual exposure of processing logic between different users.To address these issues, an incremental deployment mechanism for polymorphic network environments was proposed.Firstly, an incremental deployment mechanism for network modality was designed.Then, the incremental deployment of modality was abstracted as a graph merging problem based on this mechanism, and an adjacency list-based merge parsing graph algorithm was designed.The simulation results indicate that the proposed mechanism can achieve fast and correct merging of network modality, support incremental modality deployment, and greatly reduce the application deployment and service provision threshold of new network systems.…”
Get full text
Article -
1089
Vehicle detection and recognition algorithm based on function improvement of YOLOv3
Published 2023-12-01“…In view of this defect, the loss function of YOLOv3 algorithm was improved, the wide-height coordinate error was modified into the form of proportion, the non-maximum suppression method of the original model was improved and the overlap threshold was changed from the fixed value to the form of attenuation function. …”
Get full text
Article -
1090
Research on incremental deployment mechanism of network modality for polymorphic network environment
Published 2023-06-01“…Polymorphic networks support diverse network requirements and can coexist, evolve, and change on a unified physical or logical infrastructure in the form of network modality.They can maximize the innovation vitality of network technology driven by new applications.The evolution and development of modality require the incremental deployment of modality to meet the needs of convenience and privacy protection in the multi-user deployment process.However, the deployment of current network functions still uses the one-by-one deployment method, resulting in high complexity of the deployment of new modality, and mutual exposure of processing logic between different users.To address these issues, an incremental deployment mechanism for polymorphic network environments was proposed.Firstly, an incremental deployment mechanism for network modality was designed.Then, the incremental deployment of modality was abstracted as a graph merging problem based on this mechanism, and an adjacency list-based merge parsing graph algorithm was designed.The simulation results indicate that the proposed mechanism can achieve fast and correct merging of network modality, support incremental modality deployment, and greatly reduce the application deployment and service provision threshold of new network systems.…”
Get full text
Article -
1091
Short-term load forecasting based on multi-frequency sequence feature analysis and multi-point modified FEDformer
Published 2025-01-01“…Throughout the forecasting process, a weighted threshold α is set, and a hybrid weighting method is utilized to combine the forecast results from different models, culminating in the final short-term load forecast results. …”
Get full text
Article -
1092
Applying Classical and Intelligence Techniques for Digital Image Contrast Enhancement
Published 2008-12-01“…By studying the classical and fuzzy logic methods, we proposed a method named (Fuzzy Hyperbolic Threshold), the proposed method gave very good results. …”
Get full text
Article -
1093
Gain Saturation of Encapsulated CdTe-Ag Quantum Dot Composite in SiO<sub>2</sub>
Published 2024-12-01“…This analysis enabled us to find the limit of the commonly used fitting method in terms of a threshold length and a saturation length, where amplification begins and saturation ends, respectively.…”
Get full text
Article -
1094
Electronic Information Signal Recognition Based on a Stochastic Neural Network Algorithm
Published 2022-01-01“…This paper uses the method of duty cycle, average amplitude difference function, and FFT to calculate the energy duty cycle for feature extraction and uses TSVD-SCN algorithm to classify and recognize different intrusion vibration feature vectors. …”
Get full text
Article -
1095
A monitoring and warning system for expressway slopes using FBG sensing technology
Published 2018-05-01“…The maximum magnitudes of cumulative strain and displacement in the present monitored expressway slope were 198 με and 5.06 mm, respectively. Critical threshold values of different warning levels for expressway slopes have been proposed using statistical analysis method based on comparative analysis of history monitored data from slopes in the same region. …”
Get full text
Article -
1096
The Non-Orthogonal Multiple Access (NOMA) Dynamic Power Allocation in 5G Networks
Published 2022-07-01“… Abstract The thought of non-orthogonal multiple access (NOMA) are given as a potential radio access method for versatile correspondence networks past the fourth era (4G). …”
Get full text
Article -
1097
Entrepreneurship and Economic Freedom: Do Objective and Subjective Data Reflect the Same Tendencies?
Published 2016-09-01“…Findings: To determine the degree of economic freedom in a country, the effective enforcement of intellectual property rights legislation and quick access to utilities are the two variables with the most informational content. 86,8% of the original grouped cases was classified correctly – this is above the widely accepted threshold of 75%. Implications & Recommendations: A new trend in entrepreneurial research is to build compound indices based on different data sources. …”
Get full text
Article -
1098
The Experimental Investigation of the Development Potential of Low-Permeability Reservoirs in the Daqing Oilfield
Published 2020-01-01“…The throat radius distributions of the different low-permeability cores were determined by the constant velocity mercury injection method, the movable fluid distribution characteristics were determined by nuclear magnetic resonance, and the nonlinear fluid flow characteristics were analyzed via fluid flow experimentation. …”
Get full text
Article -
1099
Application of causal forests to randomised controlled trial data to identify heterogeneous treatment effects: a case study
Published 2025-02-01“…The modal initial (root) splits of the causal forest were extracted, and the mean value was used as a threshold to partition the population into subgroups with different treatment effects. …”
Get full text
Article -
1100
Optical Fiber Vibration Signal Recognition Based on the EMD Algorithm and CNN-LSTM
Published 2025-03-01“…Experimental results demonstrate that this method effectively identifies three different types of vibration signals collected from a real-world environment, achieving a recognition accuracy of 97.3% for intrusion signals. …”
Get full text
Article