Showing 581 - 600 results of 1,060 for search 'operator’s activity algorithm', query time: 0.10s Refine Results
  1. 581

    Target Detection Method for Soil-Dwelling Termite Damage Based on MCD-YOLOv8 by Peidong Jiang, Lai Jiang, Fengyan Wu, Tengteng Che, Ming Wang, Chuandong Zheng

    Published 2025-03-01
    “…This study developed an improved YOLOv8 model, named MCD-YOLOv8, for identifying traces of soil-dwelling termite activity, based on the Monte Carlo random sampling algorithm and a lightweight module. …”
    Get full text
    Article
  2. 582

    Treatment tactics for acute anterior cruciate ligament ruptures by D. Yu. Pupynin, A. V. Lychagin, A. A. Gritsyuk

    Published 2024-10-01
    “…Dynamic intraligamentous stabilization, in comparison with early anterior cruciate ligament plastic, shows a more rapid recovery of the level of physical activity in the next year after surgery; and in the long-term period, in terms of the number of relapses of instability, the results are no worse, which may influence changes in the algorithm for choosing surgical treatment.…”
    Get full text
    Article
  3. 583

    White Shark Optimization for Solving Workshop Layout Optimization Problem by Bin Guo, Yuanfei Wei, Qifang Luo, Yongquan Zhou

    Published 2025-04-01
    “…The workshop is a crucial site for ensuring the smooth operation of production activities within an enterprise, playing a significant role in its long–term development. …”
    Get full text
    Article
  4. 584

    Integrating Frequency Setting, Timetabling, and Route Assignment to Synchronize Transit Lines by Omar J. Ibarra-Rojas, Juan C. Muñoz, Ricardo Giesen, Paul Knapp

    Published 2019-01-01
    “…Synchronization of different transit lines is an important activity to increase the level of service in transportation systems. …”
    Get full text
    Article
  5. 585

    User Experience Optimization Researcb on Personalized Pusb Approacb of IPTV Service Based on Label of Contents by Yingbo Zhu, Jianwei Diao, Bo Kang, Shengqiang Liu

    Published 2014-07-01
    “…iMusci Karaok is a service on IPTV developed and operated by China Telecom. It is needed to introduce active personalized push approach of content in order to improve user experience, due to higher cost of remote controller than PC and mobile phone. …”
    Get full text
    Article
  6. 586

    Comprehensive and advanced T cell cluster analysis for discriminating seropositive and seronegative rheumatoid arthritis by Shinji Maeda, Hiroya Hashimoto, Tomoyo Maeda, Shin-ya Tamechika, Taio Naniwa, Akio Niimi

    Published 2025-07-01
    “…For advanced analysis, two distinct datasets derived from a self-organizing map algorithm, FlowSOM, were used: one encompassing all CD3+ T cells and another focusing on activated T cell subsets. …”
    Get full text
    Article
  7. 587

    Some aspects of the implementation of the release of material values during the reform of state reserves by Yu.M. Bilokon, O.V. Storozh

    Published 2025-03-01
    “…The authors of the article, based on the results of the analysis of the current legislation, proposed an algorithm of managerial activity aimed at practical solving the issue of issuing material assets from the state material reserve, in the conditions of reforming the state reserve system, eliminating the State Reserve Agency, the temporary absence of an executive body that implements a policy in the field of state reserves by making managerial decisions by executive authorities.…”
    Get full text
    Article
  8. 588

    Problematic Procedural Issues of Preventing Criminal Offenses on Road Passenger Transport by A. V. Piddybna

    Published 2020-12-01
    “…The author has studied the state of activity of pre-trial investigation and inquiry agencies of the National Police of Ukraine and the Prosecutor’s Office on preventive activities in regard to establishing the causes and conditions that contributed to the commission of criminal offenses, including violations of traffic safety rules and operation of road passenger transport and necessary measures to eliminate them. …”
    Get full text
    Article
  9. 589

    Business process mining based insider threat detection system by Tai-ming ZHU, Yuan-bo GUO, An-kang JU, Jun MA

    Published 2016-10-01
    “…Current intrusion detection systems are mostly for detecting external attacks,but sometimes the internal staff may bring greater harm to organizations in information security.Traditional insider threat detection methods of-ten do not combine the behavior of people with business activities,making the threat detection rate to be improved.An insider threat detection system based on business process mining from two aspects was proposed,the implementation of insider threats and the impact of threats on system services.Firstly,the normal control flow model of business ac-tivities and the normal behavior profile of each operator were established by mining the training log.Then,the actual behavior of the operators was compared with the pre-established normal behavior contours during the operation of the system,which was supplemented by control flow anomaly detection and performance anomaly detection of business processes,in order to discover insider threats.A variety of anomalies were defined and the corresponding detection algorithms were given.Experiments were performed on the ProM platform.The results show the designed system is effective.…”
    Get full text
    Article
  10. 590
  11. 591

    Random Harmonic Detection and Compensation Based on Synchronous Reference Frame by Yanbo Che, Zhaojing Yin, Shuyan Yu, Qiang Sun

    Published 2017-01-01
    “…Algorithms for harmonic detection and compensation are important guarantees for an active power filter (APF) to achieve the harmonic control function and directly determine the overall performance. …”
    Get full text
    Article
  12. 592

    Cluster-based route convergence method based on network state graph model by PAN Chengsheng, LU Huangjie, SHI Huaifeng, WANG Yingzhi

    Published 2024-12-01
    “…Finally, on this basis, a cluster head bootstrap algorithm, node clustering algorithm, and inter-cluster connection algorithm were proposed to achieve cluster-based routing convergence. …”
    Get full text
    Article
  13. 593

    Fault Detection and Protection Strategy for Multi-Terminal HVDC Grids Using Wavelet Analysis by Jashandeep Kaur, Manilka Jayasooriya, Muhammad Naveed Iqbal, Kamran Daniel, Noman Shabbir, Kristjan Peterson

    Published 2025-02-01
    “…Multi-terminal HVDC (MTDC) grids, enabled by Voltage Source Converters (VSCs), provide increased operational flexibility, including the ability to reverse power flow and independently control both active and reactive power. …”
    Get full text
    Article
  14. 594

    Modern Aspects of the Treatment of Acute Bacterial Postoperative Endophthalmitis by V. N. Kazajkin, V. O. Ponomarev, H. P. Takhchidi

    Published 2017-03-01
    “…This phenomenon is contributed by worldwide increase of surgical activity together with an increase of life expectancy. …”
    Get full text
    Article
  15. 595

    An Energy-Efficient Battery Monitoring and Logging System for Agricultural Robotics with CAN Bus Integration by Soosaar Guido, Lillerand Tormi

    Published 2025-01-01
    “…The system is fully configurable, lightweight, and modular, supporting compatibility with CAN-based BMS devices and open platforms like Robot Operating System (ROS). A key innovation is its adaptive data acquisition algorithm, which adjusts polling frequency based on battery activity and temperature thresholds, significantly reducing power consumption without compromising responsiveness. …”
    Get full text
    Article
  16. 596

    Green-fitting scheduling equilibrium model of virtual power plant based on cooperative game with improved shapley value under new-type power system by Shuo Zhang, Luming Pang, Yingzi Li, Yuanli Chen, Kangxiang Li, Meixia Zheng

    Published 2025-07-01
    “…Simultaneously, the virtual power plant (VPP) emerges as a significant mode for aggregating decentralized resources on the demand side, which has a guaranteed role in the safe and green operation of the new-type power system. This paper firstly analyzes the green operation framework of VPP, which includes photovoltaic, distributed wind power, gas turbine, energy storage and load. …”
    Get full text
    Article
  17. 597

    Online incremental updating for model enhancement based on multi-perspective trusted intervals by Na Fang, Xianwen Fang, Ke Lu

    Published 2022-12-01
    “…These discrepancy components originate from the deviation between the increasing business process operational state and the outdated original planning model. …”
    Get full text
    Article
  18. 598

    Confidence sharing: an economic strategy for efficient information flows in animal groups. by Amos Korman, Efrat Greenwald, Ofer Feinerman

    Published 2014-10-01
    “…We rigorously show that this algorithm competes extremely well with the best possible algorithm that operates without any computational constraints. …”
    Get full text
    Article
  19. 599

    THE ROLE OF ORGANIZATIONAL AND ECONOMIC MECHANISM OF STRATEGIC COMPANY MANAGEMENT IN THE NATIONAL ECONOMY by О. Parfentieva, А. Grechan, A. Bezuglyi, К. Kompanets, О. Salimon

    Published 2022-01-01
    “…The mechanism of strategic company management based on investment activity is suggested. An algorithm for improving strategic investment management is suggested. …”
    Get full text
    Article
  20. 600

    A Deep Reinforcement Learning Framework for Last-Mile Delivery with Public Transport and Traffic-Aware Integration: A Case Study in Casablanca by Amine Mohamed El Amrani, Mouhsene Fri, Othmane Benmoussa, Naoufal Rouky

    Published 2025-05-01
    “…Optimizing last-mile delivery operations is an essential component in making a modern city livable, particularly in the face of rapid urbanization, increasing e-commerce activity, and the growing demand for fast deliveries. …”
    Get full text
    Article