-
1001
Reducing the Amount of Data for Creating Routes in a Dynamic DTN via Wi-Fi on the Basis of Static Data
Published 2017-01-01“…The routes are constructed based on the prehistory of the movement of objects, which is stored in the database in the csv format. This database has a large volume and contains unnecessary and incorrect information. …”
Get full text
Article -
1002
Impact of Orthodontic Treatment on Periodontal Tissues: A Narrative Review of Multidisciplinary Literature
Published 2016-01-01“…The aim of this review is to describe the most commonly observed changes in periodontium caused by orthodontic treatment in order to facilitate specialists’ collaboration and communication. An electronic database search was carried out using PubMed abstract and citation database and bibliographic material was then used in order to find other appropriate sources. …”
Get full text
Article -
1003
Fast reused code tracing method based on simhash and inverted index
Published 2016-11-01“…First of all, a code database with three-level inverted in-dex structures was constructed. …”
Get full text
Article -
1004
Privacy-preserving indoor localization scheme based on Wi-Fi fingerprint with outsourced computing
Published 2024-02-01“…To solve the privacy-preserving problem of both the user and the server in indoor positioning, outsourcing part of the calculation to cloud server in the process of using Paillier encryption was considered.The scheme not only protected the privacy of the user and the positioning server, but also avoided excessive computing and communication overhead.The main idea of the scheme was that the fingerprint database in the offline stage was established by the server firstly.The k-anonymity algorithm was combined with Paillier encryption in the online stage by the user, and the encrypted Wi-Fi fingerprints were sent to the positioning server.An aggregation of the received Wi-Fi fingerprints and database fingerprints were performed by the server.Then they were outsourced to the cloud server for decryption and distance calculation by the positioning server.Finally, the positioning result was obtained.Theoretical analysis and experimental results show that the proposed scheme is safe, effective and practical.…”
Get full text
Article -
1005
Research on campus question answering system supported by retrieval-augmented generation technology
Published 2024-11-01“…An approach that integrates large language models and domain knowledge for QA system construction was proposed, relying on the campus’s <italic>Everything You Need to Know</italic> project, and using campus information such as procedural guides, frequently asked questions, and normative documents as an external data corpus. A campus knowledge database was constructed, with the RAG Infinity database. …”
Get full text
Article -
1006
Optimal azimuth positioning algorithm for base station antenna based on Gaussian distribution
Published 2018-07-01“…In order to improve the accuracy and efficiency of the discovery of the antenna-feeder problem,an optimal direction angle solution based on Gaussian distribution was proposed to diagnose the antenna-feeder coverage problems of operators.First of all,the location direction information between each MR sampling point reported by the UE and the base station was calculated,and then the proportion of MR sampling points in each interval was calculated,Based on the Gaussian distribution feature,the angle range with the largest proportion of MR sampling points was the appropriate azimuth,which was based on the user hotspot distribution of the sector.Finally,the date of optimal azimuth was compared with the base station azimuth in the background antenna database to detect antenna feeder problems,such as cross feeder,improper antenna coverage direction and incorrect background antenna database,and so on.The field verification shows that,the cost,accuracy and efficiency of the antenna-feeder problems are obviously improved compared with the existing methods.…”
Get full text
Article -
1007
Person re-identification using mid-level features with vertical global appearance constraint
Published 2017-04-01“…Mid-level features with the semantic information can provide stronger discrimination in the person re-identification than low-level features.But like the low-level features,the mid-level features also use local feature matching methods and easily leads mismatch problem when different pedestrians have similar appearance features in some local areas.Considering the same pedestrians are more similar than different pedestrians in the vertical direction since pedestrians are almost always in a standing position,global vertical appearance constraints was introduced.Furtherly,a method for person re-identification was proposed which fuses the low-level densely patch-matching and the mid-level features with the global vertical appearance constraints.Experimental results show that the proposed algorithm can achieve a higher hit rate than the existing methods on the most challenging public VIPeR database and CUHK01 database.…”
Get full text
Article -
1008
Lower Order Krawtchouk Moment-Based Feature-Set for Hand Gesture Recognition
Published 2016-01-01“…The paper measures the effectiveness of shape recognition capability of 2D Krawtchouk features at lower orders on the basis of Jochen-Triesch’s database and hand gesture database of 10 Indian Sign Language (ISL) alphabets. …”
Get full text
Article -
1009
Optimizing field work practices in vocational schools by developing a management information system
Published 2024-05-01“…The method used in development is the SLDC waterfall model. Management, database, and website feasibility data are obtained through feasibility sheets. …”
Get full text
Article -
1010
Perbandingan Instance Segmentation Image Pada Yolo8
Published 2024-08-01“…Perbandingan segmentasi pada dataset Penn-Fundan Database menggunakan yolov8 dengan model yolov8n-seg, yolov8s-seg, yolov8m-seg, yolov8l-seg, yolov8x-seg. …”
Get full text
Article -
1011
Mechanism of <italic>Coptis chinensis</italic> in Treatment of Type 2 Diabetes Mellitus Based on Network Pharmacology and Molecular Docking
Published 2021-12-01“…The corresponding target of active ingredients and related targets of type 2 diabetes mellitus were retrieved through UniProt database and CTD database; Cytoscape 3.6.1 software was used to make the visual network diagram of "<italic>Coptis chinensis</italic>-active ingredients-targets", and STRING database was used to construct the PPI network diagram of intersection targets, and the core targets were analyzed by GO function enrichment and KEGG pathway enrichment. …”
Get full text
Article -
1012
Sistem Identifikasi Kesehatan Berdasarkan Detak Jantung, Kadar Oksigen, dan Suhu Tubuh Menggunakan Metode Fuzzy Mamdani
Published 2023-10-01“…Kemudian, kedua data sensor tersebut dikirim ke Google Firebase dengan memanfaatkan fitur layanan realtime database sehingga data dapat ditampilkan secara langsung di aplikasi android. …”
Get full text
Article -
1013
Fournier Gangrene Associated with Sodium-Glucose Cotransporter-2 Inhibitors: A Pharmacovigilance Study with Data from the U.S. FDA Adverse Event Reporting System
Published 2020-01-01“…The analysis of SGLT2 inhibitor-associated FG reports in the FAERS database identified signals between the drug and adverse events of interest. …”
Get full text
Article -
1014
CCR7 and CD48 as Predicted Targets in Acute Rejection Related to M1 Macrophage after Pediatric Kidney Transplantation
Published 2024-01-01“…A differential expression genes (DEGs) analysis was performed based on the dataset GSE174020 from the NCBI gene Expression Synthesis Database (GEO) and then combined with the GSE5099 M1 macrophage-related gene identified in the Molecular Signatures Database. …”
Get full text
Article -
1015
Comprehensive analysis of the expression and prognostic value of ARMCs in pancreatic adenocarcinoma
Published 2025-01-01“…Methods We used the The Cancer Genome Atlas (TCGA) database for survival analysis. Then, Gene Expression Profiling Interactive Analysis (GEPIA), the cBioPortal database, the Human Protein Atlas (HPA), Kaplan-Meier Plotter, LinkedOmics Database, Gene ontology (GO) and Kyoto encyclopedia of genes and genomes (KEGG), Cytoscape and Timer were used to analyze the relationship between ARMCs and PAAD. …”
Get full text
Article -
1016
Visual Analysis of Research Progress on the Impact of Cadmium Stress on Horticultural Plants over 25 Years
Published 2025-01-01“…By utilizing a visualizing bibliometric analysis software CiteSpace, this study integrated and analyzed a total of 4318 relevant research records—2311 from the Web of Science (WOS) database and 2007 from the China National Knowledge Infrastructure (CNKI) database—related to “horticultural plants-Cd responses”, covering the period from 1999 to 2024. …”
Get full text
Article -
1017
Genetic analysis of ocular tumour-associated genes using large genomic datasets: insights into selection constraints and variant representation in the population
Published 2024-04-01“…Background Large genomic databases enable genetic evaluation in terms of haploinsufficiency and prevalence of missense and synonymous variants. …”
Get full text
Article -
1018
Identification of crucial extracellular genes as potential biomarkers in newly diagnosed Type 1 diabetes via integrated bioinformatics analysis
Published 2025-01-01“…Patients and Methods We retrieved and analyzed the GSE55098 microarray dataset from the Gene Expression Omnibus (GEO) database. Using R software, we screened out the extracellular protein-differentially expressed genes (EP-DEGs) through several protein-related databases. …”
Get full text
Article -
1019
A Meta-Analysis to Determine Protein and Energy Requirements for Maintenance and Growth of Cattle in Indonesia
Published 2024-09-01“…In total, 57 articles covering different cattle breeds in Indonesia, with 191 data points, were integrated into the database. The database specified different breeds (Aceh, Bali, Madura, Peranakan Ongole (PO), Sumba Ongole (SO), and Local) and sexes. …”
Get full text
Article -
1020
Advancing hospital healthcare: achieving IoT-based secure health monitoring through multilayer machine learning
Published 2025-01-01“…The health status is diagnosed from the pre-historical database of the patient’s database. Results This cloud-based smart C-IoT system shows the results approximately with 91% accuracy while using Artificial Neural Network (ANN) algorithms. …”
Get full text
Article