-
301
-
302
Features of measles diagnostics and prevention at the present stage
Published 2021-06-01“…The algorithm for diagnosing measles, presented in this article, allows to suspect this disease at the early stages. …”
Get full text
Article -
303
Malware detection approach based on improved SOINN
Published 2019-12-01“…To deal with the problems of dynamic update of detection model and high computation costs in malware detection model based on batch learning,a novel malware detection approach is proposed by combing SOINN and supervised classifiers,to reduce computation costs and enable the detection model to update dynamically with the assistance of SOINN′s incremental learning characteristic.Firstly,the improved SOINN was given.According to the whole alignment algorithm,search the adjusted weights of neurons under all input sequences in the learning cycle and then calculate the average value of all adjusted weights as the final result,to avoid SOINN′s stability under different input sequences and representativeness of original data,therefore improve malware detection accuracy.Then a data preprocessing algorithm was proposed based on nonnegative matrix factor and Z-score normalization to transfer the malware behavior feature vector from high dimension and high order to low dimension and low order,to speed up and avoid overfitting and further improve detection accuracy.The results of experiments show that proposed approach supports dynamic updating of detection model and has a significantly higher accuracy of detecting unknown new samples and lower computation costs than tradition methods.…”
Get full text
Article -
304
Novel genotyping algorithms for rare variants significantly improve the accuracy of Applied Biosystems™ Axiom™ array genotyping calls: Retrospective evaluation of UK Biobank array...
Published 2022-01-01“…We developed a novel addition to the genotyping algorithm, Rare Heterozygous Adjusted (RHA), to significantly improve PPV in variants with minor allele frequency below 0.01%. …”
Get full text
Article -
305
Development and Design of an Optimal Fuzzy Logic Two Degrees of Freedom-Proportional Integral Derivative Controller for a Two-Area Power System Using the Bee Algorithm
Published 2025-02-01“…This study introduces a fuzzy logic-based two-degree-of-freedom PID (FL2DOF-PID) controller that is optimized using the Bee Algorithm (BA) to control the load frequency in a two-area linked power system that has both reheat thermal power plants and hydro power plants. …”
Get full text
Article -
306
On Some Approaches to the Solution of the Problem «Useful Proof-of-work for Blockchains»
Published 2018-08-01Get full text
Article -
307
Machine learning-based prediction of antimicrobial resistance and identification of AMR-related SNPs in Mycobacterium tuberculosis
Published 2025-07-01“…The employment of machine learning on whole-genome sequencing data (WGS) presents significant potential for uncovering the genomic mechanisms underlying drug resistance in MTB. …”
Get full text
Article -
308
Suitability of different machine learning algorithms for the classification of the proportion of grassland-based forages at the herd level using mid-infrared spectral information f...
Published 2024-12-01“…Our results suggest that in general, LASSO and PLS-DA machine learning algorithms perform better for dietary GBF classification than RF or SVM algorithms.…”
Get full text
Article -
309
Research on SaaS Support Architecture and Key Technologies
Published 2013-12-01“…The problems of performance and scalability by consistent hashing feedback algorithm and three stages of dynamical extending and deploying strategy were solved. …”
Get full text
Article -
310
Hybridization of Galactic Swarm and Evolution Whale Optimization for Global Search Problem
Published 2020-01-01“…The Whale Optimization Algorithm mimics the unusual social behaviors and the hunting activities of humpback whales. …”
Get full text
Article -
311
Integrated optimization model for production and equipment dispatching in underground mines
Published 2018-09-01“…Each step of stope mining has a significant effect on the whole mining plan; therefore, it is very important to form a reasonable configuration to achieve the mining plan target. …”
Get full text
Article -
312
Differential Study on Estimation Models for Indica Rice Leaf SPAD Value and Nitrogen Concentration Based on Hyperspectral Monitoring
Published 2024-12-01“…For prediction of leaf SPAD value and LNC, the model constructed with the RF algorithm based on whole growth periods of spectral reflectance performed the best, with R<sup>2</sup> values of 0.99 and 0.98 and NRMSE values of 2.99% and 4.61%. …”
Get full text
Article -
313
A Proposed Genetic Risk Score for Dilated Cardiomyopathy Susceptibility in the Chinese Han Population
Published 2025-05-01Get full text
Article -
314
Optimization of the parameters of truss beams with two posts
Published 2021-11-01“…The proposed method and algorithm testify to the efficiency and rationality of the obtained optimal parameter of the structure as a whole.…”
Get full text
Article -
315
Optimizing Vehicle Body Cross-Sections Using a Parametric Mathematical Model
Published 2024-12-01“…Then, the stochastic gradient genetic algorithm is used to optimize the solution and determine the geometric parameters of each section. …”
Get full text
Article -
316
MODELING OF ANALYSIS OF TEXT DOCUMENTS AND BRIEF COMMUNICATIONS BASED ON VERBAL ASSOCIATIONS
Published 2018-03-01Get full text
Article -
317
Novel barrier-reinforcing method based on mobile nodes re-deployment in WSN
Published 2017-06-01“…Barrier coverage in wireless sensor networks plays a key role in intrusion detection system.How to build a robust barrier is a key problem in this research area.In order to fix the weak points caused by nodes’ energy consumption,a reinforcing method was proposed to strengthen the barrier by re-deploying some mobile nodes,in which set-based max-flow algorithm was employed to calculate the number of weak points.The vulnerability degree of each weak point was analyzed so that the mobile nodes can move to these spots to reinforce the whole barrier.Experiment results show that the algorithm can effectively strengthen the barrier,extend the survival time of the barrier and the algorithm complexity is relatively lower.…”
Get full text
Article -
318
Novel barrier-reinforcing method based on mobile nodes re-deployment in WSN
Published 2017-06-01“…Barrier coverage in wireless sensor networks plays a key role in intrusion detection system.How to build a robust barrier is a key problem in this research area.In order to fix the weak points caused by nodes’ energy consumption,a reinforcing method was proposed to strengthen the barrier by re-deploying some mobile nodes,in which set-based max-flow algorithm was employed to calculate the number of weak points.The vulnerability degree of each weak point was analyzed so that the mobile nodes can move to these spots to reinforce the whole barrier.Experiment results show that the algorithm can effectively strengthen the barrier,extend the survival time of the barrier and the algorithm complexity is relatively lower.…”
Get full text
Article -
319
An effective routing scheme of sparse wireless sensor networks
Published 2016-04-01Get full text
Article -
320
An effective routing scheme of sparse wireless sensor networks
Published 2016-04-01Get full text
Article