-
1481
Cause analysis of coal mine burst accident based on text mining
Published 2025-04-01Get full text
Article -
1482
Design and Optimization of Brushless Hybrid Wound Rotor Vernier Motor for Variable Speed Applications
Published 2025-01-01“…The machine configuration utilizes two different windings on the stator. One is a three-phase main ABC winding, and the other is a single-phase additional X winding. …”
Get full text
Article -
1483
Leveraging explainable artificial intelligence with ensemble of deep learning model for dementia prediction to enhance clinical decision support systems
Published 2025-05-01“…The main intention of the LXAIOA-ADPCM technique is to progress a novel algorithm for dementia prediction using advanced techniques. …”
Get full text
Article -
1484
Identification of dementia and MCI cases in health information systems: An Italian validation study
Published 2022-01-01“…Results The main analysis was conducted on 1110 cases and 1114 controls. …”
Get full text
Article -
1485
A real-time system for monitoring and classification of human falls on stairs using 2.4 GHz XBee3 micro modules with a tri-axial accelerometer and KNN algorithms
Published 2025-06-01“…Here, human activities on stairs, including stair ascent, stair descent, turning around, and falling, are mainly focused on preventing any dangerous accidents. …”
Get full text
Article -
1486
-
1487
Photovoltaic Module Fault Detection Technology Based on Remote Sensing Technology and Deeplabv3+ Model
Published 2024-01-01“…The error of the improved K-means was mainly concentrated between 0.000 and 0.014, while the traditional K-means was mainly distributed between 0.022 and 0.051. …”
Get full text
Article -
1488
An efficient iterative method for solving large linear systems
Published 2020-06-01Get full text
Article -
1489
Review of optimization modeling and solution of long-distance natural gas pipeline network
Published 2023-09-01“…Presently, the modeling methods based on the physical attributes are mainly researched for the optimization model of natural gas pipeline networks in China. …”
Get full text
Article -
1490
Pre-modulated multi-coset sampling system
Published 2022-04-01“…At present, the compressed sampling system mainly includes three sampling system: random demodulator,modulated wideband converter and multi-coset sampling, among them, the system framework of multi-coset sampling is simple and has a high reconstruction success rate. …”
Get full text
Article -
1491
A Heuristic Approach for the Nationwide Charging Station Location Problem for Intercity Trips
Published 2025-01-01Get full text
Article -
1492
Error Analysis and Compensation of 3‒PTT Parallel Robot
Published 2025-07-01“…Thus, the algorithm is more feasible. In addition, to improve the efficiency of the aforementioned error compensation algorithm, the standard particle swarm optimization algorithm is further enhanced by integrating the dynamic inertia weight value and dynamic learning factor, thus overcoming the problems of precocious convergence to a local optimum and slow convergence in the later iteration of the standard particle swarm optimization algorithm. …”
Get full text
Article -
1493
THE MODERN APPROACH TO THE EDUCATIONAL PROCESS FOR DIAGNOSIS IN DENTISTRY
Published 2018-03-01“… In this work there are features of delivering the therapeutic dentistry students in dental faculties on the application of diagnostic algorithms to make a diagnosis. One of the main feature of education dentists is to diagnose a patient, ability to use the objective methods of examination and chose the additional and laboratory methods. …”
Get full text
Article -
1494
PARAMETER OPTIMIZATION OF JC CONSTITUTIVE MODEL OF AL7050 ALLOY BASED ON OXLEY’S THEORY
Published 2021-01-01“…The JC constitutive model parameters of Al7050 alloy were obtained by using genetic algorithm and experimental data,and the JC constitutive model was verified by using cutting force as evaluation index. …”
Get full text
Article -
1495
-
1496
Adversarial attack and defense on graph neural networks: a survey
Published 2021-06-01“…For the numerous existing adversarial attack and defense methods on GNN, the main adversarial attack and defense algorithms of GNN were reviewed comprehensively, as well as robustness analysis techniques.Besides, the commonly used benchmark datasets and evaluation metrics in the security research of GNN were introduced.In conclusion, some insights on the future research direction of adversarial attacks and the trend of development were put forward.…”
Get full text
Article -
1497
Vers un « État-automate » ?
Published 2025-06-01“…Based on this hypothesis, this article aims to question the transformative potential of innovations linked to algorithms and AI for various professions in public administration. …”
Get full text
Article -
1498
Efficiency of Information Management and Analysis for Industrial Entrepreneurship
Published 2020-09-01“…Information Management and Analysis (IMA) implies the single data and knowledge base of the business organization whose algorithm and software complex is designed to solve functional problems of operating and dispatch management, marketing, financial arrangements, accounting, strategic planning and organizing e-document flow between the sources and users of information. …”
Get full text
Article -
1499
A systematic mapping to investigate the application of machine learning techniques in requirement engineering activities
Published 2024-12-01“…The authors aim to investigate the research trends, main RE activities, ML algorithms, and data sources that were studied during this period. …”
Get full text
Article -
1500
Exposing Face Manipulation Based on Generative Adversarial Network–Transformer and Fake Frequency Noise Traces
Published 2025-02-01“…In recent years, with the application of GANs and diffusion generative network algorithms, many highly realistic synthetic images are emerging, greatly increasing the potential for misuse, and deepfakes have become a serious social concern. …”
Get full text
Article