-
8141
BLE phase-based ranging: accuracy and capability under strong Wi-Fi interference
Published 2025-07-01“…Indoor positioning and asset tracking have become popular and essential for different applications and use cases. Many systems use Bluetooth Low Energy (BLE) wireless personal area network technology for communication and ranging purposes. …”
Get full text
Article -
8142
Parallel boosting neural network with mutual information for day-ahead solar irradiance forecasting
Published 2025-04-01“…Traditional deep learning (DL) models and decision tree (DT)-based algorithms have been widely employed for this purpose. …”
Get full text
Article -
8143
Deep Learning-Based Detection and Identification Method for Sports Health Video Dissemination
Published 2022-01-01“…Our method also performs better overall in the same type of algorithms.…”
Get full text
Article -
8144
Overview of RPA technologies
Published 2023-12-01“…RPA is a software technology that enables businesses to automate repetitive and boring processes with the use of built-in algorithms created by various RPA platforms and vendors. …”
Get full text
Article -
8145
Modelling potential impacts of climate change on the oak spatial distribution (Case study: Ilam and Lorestan provinces)
Published 2022-06-01“…Examining the effects of climate change on the oak spatial distribution, as the main species of Zagros forests and its ecological and economic values is of significant importance. …”
Get full text
Article -
8146
Low Anterior Resection Syndrome: Pathophysiology, Risk Factors, and Current Management
Published 2022-10-01“…In this review, we summarize the main symptoms and pathophysiology of this syndrome and discuss the treatment approaches. …”
Get full text
Article -
8147
Recursive State and Random Fault Estimation for Linear Discrete Systems under Dynamic Event-Based Mechanism and Missing Measurements
Published 2020-01-01“…It is clear that the developed algorithms are dependent on the threshold parameters and the upper bound together with the probabilities of missing measurements and ROFs. …”
Get full text
Article -
8148
Data Mining Techniques for Wireless Sensor Networks: A Survey
Published 2013-07-01“…This work provides an overview of how traditional data mining algorithms are revised and improved to achieve good performance in a wireless sensor network environment. …”
Get full text
Article -
8149
Use of Levosimendan in Cardiac Anesthesiology
Published 2011-08-01“…The authors consider the main aspects of the rational use of the novel inotropic drug levosimendan in cardiosurgical patients on the basis of the results of the trials described in the literature and on their own findings in this review. …”
Get full text
Article -
8150
Monocular vision guided deep reinforcement learning UAV systems with representation learning perception
Published 2023-12-01“…In recent years, numerous studies have applied deep reinforcement learning (DRL) algorithms to vision-guided unmanned aerial systems. …”
Get full text
Article -
8151
Cooperative Localization for GNSS-Denied Subterranean Navigation: A UAV–UGV Team Approach
Published 2024-12-01“…The performance of the presented algorithms is analyzed via experiments conducted in a motion-capture facility.…”
Get full text
Article -
8152
Business Model: Economic Value and Sociocultural Impact
Published 2020-05-01“…The impact of Netflix on the practice of consuming films in the digital age has been considered, noting that the automatic system of recommendations used by the service and algorithms of search optimization can pose a threat to the free choice of consumers. …”
Get full text
Article -
8153
A network intrusion detection method designed for few-shot scenarios
Published 2023-10-01“…Existing intrusion detection techniques often require numerous malicious samples for model training.However, in real-world scenarios, only a small number of intrusion traffic samples can be obtained, which belong to few-shot scenarios.To address this challenge, a network intrusion detection method designed for few-shot scenarios was proposed.The method comprised two main parts: a packet sampling module and a meta-learning module.The packet sampling module was used for filtering, segmenting, and recombining raw network data, while the meta-learning module was used for feature extraction and result classification.Experimental results based on three few-shot datasets constructed from real network traffic data sources show that the method exhibits good applicability and fast convergence and effectively reduces the occurrence of outliers.In the case of 10 training samples, the maximum achievable detection rate is 99.29%, while the accuracy rate can reach a maximum of 97.93%.These findings demonstrate a noticeable improvement of 0.12% and 0.37% respectively, in comparison to existing algorithms.…”
Get full text
Article -
8154
ICARUS at the Short-Baseline Neutrino Program: First Results
Published 2025-02-01“…In 2021, ICARUS started its new operation at Fermilab, collecting a substantial amount of neutrino events from the Booster Neutrino Beam (BNB) and the neutrinos at the Main Injector (NuMI) beam off-axis. These were used to test the ICARUS event selection, reconstruction, and analysis algorithms. …”
Get full text
Article -
8155
Comparative Analysis of Diabetes Prediction Models Using the Pima Indian Diabetes Database
Published 2025-01-01“…This study provides an in-depth review and comparison of diabetes prediction models using the Pima Indian Diabetes database. The main aim is to contrast and evaluate the performance of two distinct predictive models: K-means clustering and Random Forest. …”
Get full text
Article -
8156
Determination of geometrical parameters of the diamond gear hones for the finishing of gears
Published 2019-11-01“…To determine these parameters, a complex of software-implemented algorithms for their calculation has been developed. …”
Get full text
Article -
8157
Traditional and Perspective Methods of Corporate Non-Performing Loans Rejustment (Liquidation)
Published 2021-02-01“…In addition, the manuscript presents algorithms of mentioned perspective methods implementation. …”
Get full text
Article -
8158
Technics and Contingency
Published 2023-12-01“…I will underscore the tensions between their proposals, trying to identify the main divergences within their speculative ontologies of computation. …”
Get full text
Article -
8159
An SVDD-based post-processing approach for vibration risk assessment of the hydro-turbine-generator in a large hydropower station
Published 2021-09-01“…Recently, the abnormal vibration of hydro-turbine-generator in a large hydropower station occurred and the main influencing factors of vibration are analyzed based on the prototype data and engineering experience. …”
Get full text
Article -
8160
Hypertension: smoking or quit. Clinical difficulties
Published 2023-11-01“…Smoking cessation is the main effective measure of primary and secondary prevention among smoking patients with HTN. …”
Get full text
Article