Showing 8,021 - 8,040 results of 10,865 for search '(may OR main) algorithm', query time: 0.22s Refine Results
  1. 8021

    Global positioning system (GPS) collar data shows variations in distribution, ranging area and habitat selection of the African savannah elephant in a semi-arid protected area by Nobert Tafadzwa Mukomberanwa, Phillip Taru, Beaven Utete, Patmore Ngorima

    Published 2025-12-01
    “…Minimum Convex Polygon method was employed to delineate elephant home ranges and the MaxEnt algorithm was used to model their habitat preferences. …”
    Get full text
    Article
  2. 8022

    Near Field UHF RFID Antenna System Enabling the Tracking of Small Laboratory Animals by Luca Catarinucci, Riccardo Colella, Luca Mainetti, Vincenzo Mighali, Luigi Patrono, Ilaria Sergi, Luciano Tarricone

    Published 2013-01-01
    “…In this work, a novel RFID-based approach enabling an effective localization and tracking of small-sized laboratory animals is proposed. It is mainly based on a UHF Near Field RFID multiantenna system, to be placed under the animals’ cage, and able to rigorously identify the NF RFID tags implanted in laboratory animals (e.g., mice). …”
    Get full text
    Article
  3. 8023

    A Lightweight Rolling Bearing Fault Diagnosis Method Based on Multiscale Depth-Wise Separable Convolutions and Network Pruning by Qingming Hu, Xinjie Fu, Dandan Sun, Donghui Xu, Yanqi Guan

    Published 2024-01-01
    “…Current deep learning-based approaches for rolling bearing fault diagnosis mainly rely on complex models that require significant hardware storage and computing power. …”
    Get full text
    Article
  4. 8024

    Hybrid Weighted Random Forests Method for Prediction & Classification of Online Buying Customers by Umesh Kumar Lilhore, Sarita Simaiya, Devendra Prasad, Deepak Kumar Verma

    Published 2021-04-01
    “…A random forest (RF) machine learning method is a widely used classification method. It is mainly based on an ensemble of a single decision tree. …”
    Get full text
    Article
  5. 8025

    Dual-branch graph Transformer for node classification by Yong Zhang, Jingjing Song, Eric C.C. Tsang, Yingxing Yu

    Published 2025-02-01
    “…As an emerging architecture, graph Transformers (GTs) have demonstrated significant potential in various graph-related tasks. Existing GTs are mainly oriented to graph-level tasks and have proved their advantages, but they do not perform well in node classification tasks. …”
    Get full text
    Article
  6. 8026

    MAOOA‐Residual‐Attention‐BiConvLSTM: An Automated Deep Learning Framework for Global TEC Map Prediction by Haoran Wang, Haijun Liu, Jing Yuan, Huijun Le, Weifeng Shan, Liangchao Li

    Published 2024-07-01
    “…It also includes an optimization algorithm, MAOOA, for optimizing the hyper‐parameters of the model. …”
    Get full text
    Article
  7. 8027

    Artificial neural networking for computational assessment of ternary hybrid nanofluid flow caused by a stretching sheet: implications of machine-learning approach by Imad Khan, M. Waleed Ahmed Khan

    Published 2024-12-01
    “…Researchers are mainly interested in using soft computing artificial intelligence (AI) methods due to their broad applications in analysis, modelling and simulations. …”
    Get full text
    Article
  8. 8028

    Bytecode-based approach for Ethereum smart contract classification by Dan LIN, Kaixin LIN, Jiajing WU, Zibin ZHENG

    Published 2022-10-01
    “…In recent years, blockchain technology has been widely used and concerned in many fields, including finance, medical care and government affairs.However, due to the immutability of smart contracts and the particularity of the operating environment, various security issues occur frequently.On the one hand, the code security problems of contract developers when writing contracts, on the other hand, there are many high-risk smart contracts in Ethereum, and ordinary users are easily attracted by the high returns provided by high-risk contracts, but they have no way to know the risks of the contracts.However, the research on smart contract security mainly focuses on code security, and there is relatively little research on the identification of contract functions.If the smart contract function can be accurately classified, it will help people better understand the behavior of smart contracts, while ensuring the ecological security of smart contracts and reducing or recovering user losses.Existing smart contract classification methods often rely on the analysis of the source code of smart contracts, but contracts released on Ethereum only mandate the deployment of bytecode, and only a very small number of contracts publish their source code.Therefore, an Ethereum smart contract classification method based on bytecode was proposed.Collect the Ethereum smart contract bytecode and the corresponding category label, and then extract the opcode frequency characteristics and control flow graph characteristics.The characteristic importance is analyzed experimentally to obtain the appropriate graph vector dimension and optimal classification model, and finally the multi-classification task of smart contract in five categories of exchange, finance, gambling, game and high risk is experimentally verified, and the F1 score of the XGBoost classifier reaches 0.913 8.Experimental results show that the algorithm can better complete the classification task of Ethereum smart contracts, and can be applied to the prediction of smart contract categories in reality.…”
    Get full text
    Article
  9. 8029

    A New Method to Convert the DNA Sequence of Human to a QR Code by Sadoon Abdullah, Zahraa Abdulhamid

    Published 2019-12-01
    “…<br /> QR Codes technique is mainly used to convert and store messages since it has higher and large storage capacity, in addition to that we used, in this paper , the STR (Short Tandem Repeats) DNA sequence. …”
    Get full text
    Article
  10. 8030

    Human activity recognition system based on low-cost IoT chip ESP32 by Chao HU, Bangyan LU, Yanbing YANG, Zhe CHEN, Lei ZHANG, Liangyin CHEN

    Published 2023-06-01
    “…Human activity recognition widely exists in applications such as sports management and activity classification.The current human activity recognition applications are mainly divided into three types: camera-based, wearable device-based, and Wi-Fi awareness-based.Among them, the camera-based human activity recognition application has the risk of privacy leakage, and the wearable device-based human activity recognition application has problems such as short battery life and poor accuracy.Human activity recognition based on Wi-Fi sensing generally uses Wi-Fi network cards or software-defined radio devices to identify the rules of channel state information changes, so as to infer user activity.It does not have the problems of privacy leakage and short battery life.But Wi-Fi network cards need to rely on computers and software-defined radio platforms are expensive, which greatly limit the application scenarios of Wi-Fi sensing.Aiming at the above problems, a human activity recognition system based on the low-cost IoT chip ESP32 was proposed.Specifically, the Hampel filter and Gaussian filter were used to preprocess the channel state information obtained by ESP32.Then, the principal component analysis and discrete wavelet transform were utilized to reduce the dimension of the data.Finally, the K-nearest neighbor (KNN) algorithm was applied to classify data.The experimental results show that the system can achieve a recognition accuracy which close to the current mainstream Wi-Fi perception system (Intel 5300 network card) when only two ESP32 nodes are deployed, and the average accuracy rate for the six activities is 98.6%.…”
    Get full text
    Article
  11. 8031

    Developing Site-Specific Prescription Maps for Sugarcane Weed Control Using High-Spatial-Resolution Images and Light Detection and Ranging (LiDAR) by Kerin F. Romero, Muditha K. Heenkenda

    Published 2024-10-01
    “…Sugarcane is a perennial grass species mainly for sugar production and one of the significant crops in Costa Rica, where ideal growing conditions support its cultivation. …”
    Get full text
    Article
  12. 8032

    ETHANOL PRODUCTION FROM COCOYAM (Хanthosoma sagittifolium): APPLICATION OF THERMODYNAMIC-TOPOLOGICAL ANALYSIS by S. Serna-Loaiza, Yu. A. Pisarenko, C. A. Cardona

    Published 2018-04-01
    “…In Colombia, there are not extensive crops of this plant, but it is used for animal feeding mainly. The plant has an aerial part with a high content of protein (leaves) and a tuber with an average starch content about 25% w/w. …”
    Get full text
    Article
  13. 8033

    Forecasting Air Pollution Contingencies Using Predictive Analytic Techniques by Raul Ramirez-Velarde, Oscar Esquivel-Flores, Gerardo Mejía-Velázquez

    Published 2024-10-01
    “…The proliferation of pollutants affects the world’s population, mainly those who live in large cities. Neurological and cardiovascular dysfunctions have a correlation with air particulate matter concentration, among other chronic diseases. …”
    Get full text
    Article
  14. 8034

    A dual input dual spliced network with data augmentation for robust modulation recognition in communication countermeasures by Wang Guan

    Published 2025-07-01
    “…The modulation recognition task mainly encompasses two key aspects: the dataset and the network model. …”
    Get full text
    Article
  15. 8035

    A speed optimization model for connected and autonomous vehicles at expressway tunnel entrance under mixed traffic environment. by Jianrong Cai, Yang Liu, Zhixue Li

    Published 2024-01-01
    “…However, existing speed optimization models mainly focus on urban signal-controlled intersections or expressway weaving zones, neglecting research on speed optimization in expressway tunnel entrances. …”
    Get full text
    Article
  16. 8036

    Analyzing key users’ behavior trends in volunteer-based networks by Nofar Piterman, Tamar Makov, Michael Fire

    Published 2025-05-01
    “…We introduce two innovative algorithms: the first outlines the evolution of volunteers’ behavior patterns over time, while the second employs machine learning techniques to forecast their future behavior, including whether they will remain active donors or become mainly recipients, and vice-versa. …”
    Get full text
    Article
  17. 8037

    Development and Practice of Cloud Collaborative Platform for Downhole Measurement Tools by Che Yang, Yuan Guangjie, Qian Hongyu, Du Weiqiang, Wang Chenlong, Ding Jiping

    Published 2025-06-01
    “…The measurement tools are mainly single machine version, which is difficult to meet the current requirements for improving drilling quality and efficiency. …”
    Get full text
    Article
  18. 8038

    Startup Drift Compensation of MEMS INS Based on PSO–GRNN Network by Songlai Han, Jingyi Xie, Jing Dong

    Published 2025-04-01
    “…We adopted a correlation analysis to determine the input parameters of the PSO-GRNN model that mainly affect startup drift. In the process of training this model, we used the PSO algorithm to optimize the spread parameter of the PSO-GRNN model. …”
    Get full text
    Article
  19. 8039

    SHAPING THE STOCK PORTFOLIO BY THE INVESTMENT RATING METHOD by Svyatoslav N. Digo, Aleksandra M. Sokolova

    Published 2018-02-01
    “…Thus securities market needs more effective methods and algorithms of shaping the stock portfolio, as investor’s expectations of getting profits could be met  only in case of professional choice of investment projects. …”
    Get full text
    Article
  20. 8040

    Research on an Eye Control Method Based on the Fusion of Facial Expression and Gaze Intention Recognition by Xiangyang Sun, Zihan Cai

    Published 2024-11-01
    “…At the same time, the corresponding eye movement behavior discrimination algorithm was combined for each eye movement action to realize the output of eye behavior instructions. …”
    Get full text
    Article