Showing 1,021 - 1,040 results of 3,083 for search 'life algorithm', query time: 0.09s Refine Results
  1. 1021
  2. 1022

    Research on Intelligent Recommendation Business Model of Tourism Enterprise Value Platform from the Perspective of Value Cocreation by Qiongying Wang, Daijian Tang

    Published 2021-01-01
    “…With the rapid development of China’s economy, people pay attention to their own quality of life, and tourism has become the first choice for people from all walks of life to relax themselves. …”
    Get full text
    Article
  3. 1023
  4. 1024

    Developing a cerebral palsy-specific preference-based measure for a six-dimensional classification system (CP-6D): protocol for a valuation study by Paul A Scuffham, Richard Norman, Mina Bahrampour, Joshua Byrnes, Martin Downes

    Published 2019-09-01
    “…Introduction Cerebral palsy (CP) is a lifelong condition. The CP quality of life (CPQOL) instrument is a frequently used disease-specific instrument to assess health-related quality of life (HRQoL) in people with CP, but it cannot be used to generate quality-adjusted life years (QALY) which are the basis of cost utility analysis (CUA). …”
    Get full text
    Article
  5. 1025
  6. 1026

    Observing convective activities in complex convective organizations and their contributions to precipitation and anvil cloud amounts by Z. Wang, J. Yuan

    Published 2024-12-01
    “…Many convective activities in various life stages are clustered and connected in complex convective organizations, and distinguishing their behaviors is difficult. …”
    Get full text
    Article
  7. 1027

    Spatio-temporal aware privacy-preserving scheme in LBS by Weihao LI, Sheng DING, Jiajie MENG, Hui LI

    Published 2018-05-01
    “…Location-based service (LBS) brings a lot of conveniences in people’s daily life,but the conveniences are accompanied with the leaking of privacy.A dummy-based location-preserving scheme was proposed,which took the correlation between spatial issues and temporal issues into account.Two algorithms were included in this scheme,map dividing algorithm and dummy contents determining algorithm.The map dividing algorithm divided the map into discrete location cells by Voronoi Diagram to ensure these discrete location cells were not adjacent to each other.The dummy contents determining algorithm replaced the query content in previous moment by the intending location in next moment,which efficiently avoided the adversary inferring mobile users’ sensitive information according to the correlation between spatial issues and temporal issues.The simulation experiments show that the proposed scheme is effective and efficient.…”
    Get full text
    Article
  8. 1028

    PHYSIOTHERAPY MANAGEMENT IN PATIENTS IN THE EARLY POSTOPERATIVE PERIOD IN THE ORTHOPAEDIC-TRAUMALOGICAL PRACTICE by Denitsa Vasileva

    Published 2025-05-01
    “…We believe that our proposed algorithm would be useful for clinical physiotherapy practice in patients with orthopedic injuries in the early postoperative period and would lead to better functional results and a higher quality of life. …”
    Get full text
    Article
  9. 1029

    HUMAN-ORIENTED QUALITY MANAGEMENT SYSTEM OF ENTERPRISE: CONTROL OF NON-CONFORMING PRODUCT AND UTILIZATION by Vyacheslav Feoktistovich Bezyazychny, Maria Evgenyevna Ilyina

    Published 2013-09-01
    “…The algorithm respects the interests of both consumer and manufacturer, and it can be applied at different product life cycle stages. …”
    Get full text
    Article
  10. 1030

    Time synchronization attack detection for industrial wireless network by Sichao ZHANG, Wei LIANG, Xudong YUAN, Yinlong ZHANG, Meng ZHENG

    Published 2023-06-01
    “…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
    Get full text
    Article
  11. 1031

    Time synchronization attack detection for industrial wireless network by Sichao ZHANG, Wei LIANG, Xudong YUAN, Yinlong ZHANG, Meng ZHENG

    Published 2023-06-01
    “…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
    Get full text
    Article
  12. 1032
  13. 1033

    Mining Geological Environment Monitoring and Real-Time Transmission Based on Internet of Things Technology by Yi Wang, Deqiang Zhang, Shengliang Pei, Peiyong He

    Published 2022-01-01
    “…When there are 28 visible satellites, the number of algorithm times decreases from 20,475 to 1,140, and the efficiency of the algorithm increases by 16.9 times. …”
    Get full text
    Article
  14. 1034
  15. 1035

    Different Scale Crack Contour Extraction Techniques for Bridges Incorporating Improved YOLOv5 and GCNet by Yiming Wang, Yanfang Guo

    Published 2025-01-01
    “…Bridge cracks, as the main form of damage to bridge structures, have a significant impact on the safety and service life of bridges. Aiming at the lack of accuracy and efficiency of the traditional detection methods and the existing deep learning-based detection methods, this study proposes a contour extraction model for bridge cracks at different scales based on the deep learning algorithm. …”
    Get full text
    Article
  16. 1036

    Sinusoidal Neural Networks: Towards ANN that Learns Faster by Tekin Evrim Ozmermer

    Published 2020-07-01
    “…According to the experiments, the proposed neural network can reach high accuracy rates faster than the standard neural networks, while an interesting generalization capacity is obtained for the developed algorithm. Even though the promising results are achieved, further research is necessary to test if SNNs are capable of learning faster than existing algorithms in real-life cases.…”
    Get full text
    Article
  17. 1037

    A Trusted and Energy Efficient Approach for Cluster-Based Wireless Sensor Networks by Tianshu Wang, Gongxuan Zhang, Xichen Yang, Ahmadreza Vajdi

    Published 2016-04-01
    “…In addition, experimental results show that the TEEC algorithm makes more balanced clusters with the variance value of loads around 50% and prolongs the life cycle of the network at least 10% compared to traditional methods.…”
    Get full text
    Article
  18. 1038

    Optimal control of agent-based models via surrogate modeling. by Luis L Fonseca, Lucas Böttcher, Borna Mehrad, Reinhard C Laubenbacher

    Published 2025-01-01
    “…There is a broad range of applications for such an algorithm, since ABMs are used widely in the life sciences, such as ecology, epidemiology, and biomedicine and healthcare, areas where optimal control is an important purpose for modeling, such as for medical digital twin technology.…”
    Get full text
    Article
  19. 1039

    GENDER ASPECTS FOR THE MANAGEMENT OF PERSISTENT PULMONARY HYPERTENSION IN PREMATURE INFANTS by Т. Клименко, М. Кононович

    Published 2025-04-01
    “…The created algorithm of a differentiated approach to the management of persistent pulmonary hypertension includes the calculated diagnostic coefficient of the male sex (I=1.04) as a predictor of the development of severe pulmonary hypertension by the 3rd-5th day of life. …”
    Get full text
    Article
  20. 1040

    Enhancing classification of a large lower-limb motor imagery EEG dataset for BCI in knee pain patients by Chongwen Zuo, Yi Yin, Haochong Wang, Zhiyang Zheng, Xiaoyan Ma, Yuan Yang, Jue Wang, Shan Wang, Zi-gang Huang, Chaoqun Ye

    Published 2025-08-01
    “…Traditional decoding algorithms achieved accuracies of 51.43%, 55.71%, and 76.21%, while the proposed OTFWRGD algorithm reached an average accuracy of 86.41%. …”
    Get full text
    Article