-
581
Target Detection Method for Soil-Dwelling Termite Damage Based on MCD-YOLOv8
Published 2025-03-01“…This study developed an improved YOLOv8 model, named MCD-YOLOv8, for identifying traces of soil-dwelling termite activity, based on the Monte Carlo random sampling algorithm and a lightweight module. …”
Get full text
Article -
582
Treatment tactics for acute anterior cruciate ligament ruptures
Published 2024-10-01“…Dynamic intraligamentous stabilization, in comparison with early anterior cruciate ligament plastic, shows a more rapid recovery of the level of physical activity in the next year after surgery; and in the long-term period, in terms of the number of relapses of instability, the results are no worse, which may influence changes in the algorithm for choosing surgical treatment.…”
Get full text
Article -
583
White Shark Optimization for Solving Workshop Layout Optimization Problem
Published 2025-04-01“…The workshop is a crucial site for ensuring the smooth operation of production activities within an enterprise, playing a significant role in its long–term development. …”
Get full text
Article -
584
Integrating Frequency Setting, Timetabling, and Route Assignment to Synchronize Transit Lines
Published 2019-01-01“…Synchronization of different transit lines is an important activity to increase the level of service in transportation systems. …”
Get full text
Article -
585
User Experience Optimization Researcb on Personalized Pusb Approacb of IPTV Service Based on Label of Contents
Published 2014-07-01“…iMusci Karaok is a service on IPTV developed and operated by China Telecom. It is needed to introduce active personalized push approach of content in order to improve user experience, due to higher cost of remote controller than PC and mobile phone. …”
Get full text
Article -
586
Comprehensive and advanced T cell cluster analysis for discriminating seropositive and seronegative rheumatoid arthritis
Published 2025-07-01“…For advanced analysis, two distinct datasets derived from a self-organizing map algorithm, FlowSOM, were used: one encompassing all CD3+ T cells and another focusing on activated T cell subsets. …”
Get full text
Article -
587
Some aspects of the implementation of the release of material values during the reform of state reserves
Published 2025-03-01“…The authors of the article, based on the results of the analysis of the current legislation, proposed an algorithm of managerial activity aimed at practical solving the issue of issuing material assets from the state material reserve, in the conditions of reforming the state reserve system, eliminating the State Reserve Agency, the temporary absence of an executive body that implements a policy in the field of state reserves by making managerial decisions by executive authorities.…”
Get full text
Article -
588
Problematic Procedural Issues of Preventing Criminal Offenses on Road Passenger Transport
Published 2020-12-01“…The author has studied the state of activity of pre-trial investigation and inquiry agencies of the National Police of Ukraine and the Prosecutor’s Office on preventive activities in regard to establishing the causes and conditions that contributed to the commission of criminal offenses, including violations of traffic safety rules and operation of road passenger transport and necessary measures to eliminate them. …”
Get full text
Article -
589
Business process mining based insider threat detection system
Published 2016-10-01“…Current intrusion detection systems are mostly for detecting external attacks,but sometimes the internal staff may bring greater harm to organizations in information security.Traditional insider threat detection methods of-ten do not combine the behavior of people with business activities,making the threat detection rate to be improved.An insider threat detection system based on business process mining from two aspects was proposed,the implementation of insider threats and the impact of threats on system services.Firstly,the normal control flow model of business ac-tivities and the normal behavior profile of each operator were established by mining the training log.Then,the actual behavior of the operators was compared with the pre-established normal behavior contours during the operation of the system,which was supplemented by control flow anomaly detection and performance anomaly detection of business processes,in order to discover insider threats.A variety of anomalies were defined and the corresponding detection algorithms were given.Experiments were performed on the ProM platform.The results show the designed system is effective.…”
Get full text
Article -
590
-
591
Random Harmonic Detection and Compensation Based on Synchronous Reference Frame
Published 2017-01-01“…Algorithms for harmonic detection and compensation are important guarantees for an active power filter (APF) to achieve the harmonic control function and directly determine the overall performance. …”
Get full text
Article -
592
Cluster-based route convergence method based on network state graph model
Published 2024-12-01“…Finally, on this basis, a cluster head bootstrap algorithm, node clustering algorithm, and inter-cluster connection algorithm were proposed to achieve cluster-based routing convergence. …”
Get full text
Article -
593
Fault Detection and Protection Strategy for Multi-Terminal HVDC Grids Using Wavelet Analysis
Published 2025-02-01“…Multi-terminal HVDC (MTDC) grids, enabled by Voltage Source Converters (VSCs), provide increased operational flexibility, including the ability to reverse power flow and independently control both active and reactive power. …”
Get full text
Article -
594
Modern Aspects of the Treatment of Acute Bacterial Postoperative Endophthalmitis
Published 2017-03-01“…This phenomenon is contributed by worldwide increase of surgical activity together with an increase of life expectancy. …”
Get full text
Article -
595
An Energy-Efficient Battery Monitoring and Logging System for Agricultural Robotics with CAN Bus Integration
Published 2025-01-01“…The system is fully configurable, lightweight, and modular, supporting compatibility with CAN-based BMS devices and open platforms like Robot Operating System (ROS). A key innovation is its adaptive data acquisition algorithm, which adjusts polling frequency based on battery activity and temperature thresholds, significantly reducing power consumption without compromising responsiveness. …”
Get full text
Article -
596
Green-fitting scheduling equilibrium model of virtual power plant based on cooperative game with improved shapley value under new-type power system
Published 2025-07-01“…Simultaneously, the virtual power plant (VPP) emerges as a significant mode for aggregating decentralized resources on the demand side, which has a guaranteed role in the safe and green operation of the new-type power system. This paper firstly analyzes the green operation framework of VPP, which includes photovoltaic, distributed wind power, gas turbine, energy storage and load. …”
Get full text
Article -
597
Online incremental updating for model enhancement based on multi-perspective trusted intervals
Published 2022-12-01“…These discrepancy components originate from the deviation between the increasing business process operational state and the outdated original planning model. …”
Get full text
Article -
598
Confidence sharing: an economic strategy for efficient information flows in animal groups.
Published 2014-10-01“…We rigorously show that this algorithm competes extremely well with the best possible algorithm that operates without any computational constraints. …”
Get full text
Article -
599
THE ROLE OF ORGANIZATIONAL AND ECONOMIC MECHANISM OF STRATEGIC COMPANY MANAGEMENT IN THE NATIONAL ECONOMY
Published 2022-01-01“…The mechanism of strategic company management based on investment activity is suggested. An algorithm for improving strategic investment management is suggested. …”
Get full text
Article -
600
A Deep Reinforcement Learning Framework for Last-Mile Delivery with Public Transport and Traffic-Aware Integration: A Case Study in Casablanca
Published 2025-05-01“…Optimizing last-mile delivery operations is an essential component in making a modern city livable, particularly in the face of rapid urbanization, increasing e-commerce activity, and the growing demand for fast deliveries. …”
Get full text
Article