-
1561
Diagnostics of leaks with unknown amplitudes against the background of interference caused by accidental consumption in the hydraulic system for the forest complex
Published 2024-01-01“…The formation of algorithms for leak detection is considered. It is shown that the solution to the problem of specific leak detection may vary depending on the type of hydraulic system and the technologies used. …”
Get full text
Article -
1562
Landslide and Collapse Susceptibility Analysis in Wenchuan Earthquake-damaged Area Based on Ensemble Learning Methods
Published 2025-07-01“…Then, two advanced ensemble learning algorithms (XGBoost and LightGBM) were applied alongside two traditional algorithms (logistic regression and random forest) to construct landslide and collapse susceptibility assessment models for Wenchuan County. …”
Get full text
Article -
1563
Automated Construction and Mining of Text-Based Modern Chinese Character Databases: A Case Study of Fujian
Published 2025-04-01Get full text
Article -
1564
A Unified Approach to Image Recognition and Cryptography via Flexible Weak Inverse Property Quasigroups
Published 2025-01-01Get full text
Article -
1565
Identification of anaerobic bacterial strains by pyrolysis-gas chromatography-ion mobility spectrometry
Published 2025-05-01Get full text
Article -
1566
Hurst exponent based approach for influence maximization in social networks
Published 2022-05-01“…For assessing the self-similarity trend in a node’s activity pattern, Hurst exponent (H) has been computed. Based on the results achieved, proposed algorithm has been found to perform better than other state-of-art algorithms for initial adopter identification.…”
Get full text
Article -
1567
Frequency Characteristics of Rhythm Non-Assimilation in Canine Ventricular Fibrillation
Published 2010-08-01Get full text
Article -
1568
Classification of Hybrid and Peking Duck DOD Varieties Based on Feather Images Using CNN
Published 2025-07-01Get full text
Article -
1569
Data mining techniques for the study of online learning from an extended approach
Published 2019-05-01“…Methodologically, an artificial intelligence algorithm for supervised learning (J48) was used to analyze the data of 336 participants with the aim of obtaining classification rules (patterns) of internet use. …”
Get full text
Article -
1570
The Genetic Puzzle of the Stress-Induced Cardiomyopathy (Takotsubo Syndrome): State of Art and Future Perspectives
Published 2025-06-01“…The lack of a clear Mendelian inheritance pattern suggests a multifactorial etiology and pathogenesis, likely involving complex gene–environment interactions and a polygenic background. …”
Get full text
Article -
1571
Co-Optimization of Market and Grid Stability in High-Penetration Renewable Distribution Systems with Multi-Agent
Published 2025-06-01“…For EV integration, a differentiated scheduling strategy categorizes vehicles based on usage patterns and charging elasticity. The methodological innovations primarily include an enhanced scheduling algorithm for coordinated optimization of renewable energy and energy storage, and a dynamic coordinated optimization method for EV clusters. …”
Get full text
Article -
1572
Integrated Vehicle Dynamics Modeling, Path tracking, and Simulation: A MATLAB Implementation Approach
Published 2024-03-01Get full text
Article -
1573
Non-compaction cardiomyopathy. Part II: limitations of imaging techniques and genetic screening, clinical observations
Published 2020-12-01“…A promising solution is the development of a multistep algorithm for the diagnosis of NCM with the integration of familial, morphological, genetic and clinical data.The article presents a brief literary review on NCM diagnosis with a discussion of own research and comparative characteristics of clinical and genetic data. …”
Get full text
Article -
1574
Simulating Co-Evolution and Knowledge Transfer in Logistic Clusters Using a Multi-Agent-Based Approach
Published 2025-04-01Get full text
Article -
1575
Determining Promotions at UD. Jakarta Pixel using Web-Based FP-Growth Association Model
Published 2025-03-01“…Jakarta Pixel. The research results indicate that the FP-Growth algorithm successfully analyzes customer purchasing patterns, identifies relationships between frequently purchased products, and enables the store to design more targeted promotions according to customer preferences. …”
Get full text
Article -
1576
Artificial intelligence analysis in cyber domain: A review
Published 2022-04-01“…The application of Big Data Analytics is identified through the Cyber Research Alliance for cybersecurity as the foremost preference for future studies and advancement in the field of cybersecurity. …”
Get full text
Article -
1577
-
1578
Spatial Regionalization of the Arctic Ocean Based on Ocean Physical Property
Published 2025-03-01Get full text
Article -
1579
Revealing the Influence of Semantic Similarity on Survey Responses: A Synthetic Data Generation Approach
Published 2025-01-01“…Questionnaires are essential for measuring self-reported attitudes, beliefs, and behaviour in many research fields. Semantic similarity of the questions is recognized as a source of covariance in the human data, implying that response patterns partly arise from the questionnaire itself. …”
Get full text
Article -
1580
Assessing the Soldier Survivability Tradespace Using a Single IMU
Published 2023-01-01Get full text
Article