-
1181
-
1182
Dysplastic Nevi and Superficial Borderline Atypical Melanocytic Lesions: Description of an Algorithmic Clinico-Pathological Classification
Published 2025-01-01“…This step-by-step algorithm has an educational purpose and may automatize the work of dermatopathologists. …”
Get full text
Article -
1183
Temperature Sensor Fault Detection in Chiller Based on One-class Support Vector Machine Algorithm
Published 2019-01-01“…Temperature sensor faults may lead to abnormal system operations that can damage the chiller system and reduce its life span. …”
Get full text
Article -
1184
Application of Hybrid Algorithm Based on Ant Colony Optimization and Sparrow Search in UAV Path Planning
Published 2024-11-01“…To overcome this limitation, this paper proposes an innovative hybrid ant colony algorithm. Our main motivation is to introduce other optimization strategies to improve the global search ability and convergence speed of the ant colony algorithm in solving TSP problems. …”
Get full text
Article -
1185
Optimizing energy forecasts at Boma for 2023 to 2053 Using machine learning techniques of the PSO algorithm
Published 2025-05-01“…Keywords: Optimization, energy forecasting, PSO algorithm, machine learning techniques, energy management…”
Get full text
Article -
1186
Critical Component Overheating Monitoring Algorithm Integrating Temperature-sensing Patches and Computer Vision Trains
Published 2025-03-01“…Precise localization of temperature-sensing patches in images is achieved by optimizing the YOLOV3 algorithm with a binary k-means clustering algorithm and an attention mechanism. …”
Get full text
Article -
1187
-
1188
Medication for bone loss in female patients with anorexia nervosa: a systematic review and management algorithm
Published 2025-08-01“…Results A total of 27 publications were included in this review. The main outcome measured was spinal bone mineral density (BMD). …”
Get full text
Article -
1189
Cascading quantum walks with Chebyshev map for designing a robust medical image encryption algorithm
Published 2025-02-01“…Chaotic maps are commonly used for constructing medical image cipher systems, but with the growth of quantum technology, these systems may become vulnerable. To address this issue, a new medical image cipher algorithm based on cascading quantum walk with Chebyshev map has been presented in this paper. …”
Get full text
Article -
1190
Combines the Apriori and FCM Algorithm to Improve the Extracted Association Rules with Determine the Minimum Support Automatically
Published 2015-06-01“…Apriori algorithm is the most popular algorithm in association rules mining. …”
Get full text
Article -
1191
Mobile Robot Path Planning Based on Enhanced Dynamic Window Approach and Improved A∗ Algorithm
Published 2022-01-01“…Aiming at the problem that the mobile robot may collide or fail along the planned path in an environment with random obstacles, a robot path planning scheme that combines the improved A∗ algorithm with an enhanced dynamic window method is proposed. …”
Get full text
Article -
1192
5G network slicing function migration mechanism based on particle swarm optimization algorithm
Published 2018-08-01“…In multi-application scenarios of 5G,data traffic often increases dramatically.Virtual machine resources in network slicing may not meet the normal needs of users.In view of this,a network slicing function migration mechanism aiming at load balancing was proposed.The mechanism simulates the virtual machine into particles based on particle swarm optimization algorithm.In the process of migration,all particles were divided into several subgroups,and particle swarm optimization algorithm was applied within and among groups.According to the historical optimal solution and the current global optimal solution,the particle location was updated,and the best target particles were determined by selecting the smaller particle size of the particle in real time.The mechanism not only improves the convergence speed,but also improves the accuracy of the algorithm.Compared with other migration methods,the results show that the proposed migration mechanism has the advantages of high accuracy and fast convergence.And it can also improve the efficiency of resource utilization,reduce the energy consumption of data center,and has better adaptability.…”
Get full text
Article -
1193
Development of a cataract screening model using an open dataset and deep machine learning algorithms
Published 2022-12-01Get full text
Article -
1194
Distributed Denial of Service Attack Detection in Software-Defined Networks Using Decision Tree Algorithms
Published 2025-03-01“…A software-defined network (SDN) is a new architecture approach for constructing and maintaining networks with the main goal of making the network open and programmable. …”
Get full text
Article -
1195
An Efficient Workload-balancing Algorithm for a Parallel Environment Using Hybrid Spatio-temporal Indexes
Published 2025-08-01“…In this context, the efficient processing of spatio-temporal queries becomes crucial to address this challenge, as slow query processing can result in obsolete answers, which may lead to errors. Considering this dynamic context of storage and processing, we explore a new online workload algorithm in a distributed parallel environment using hybrid spatio-temporal indexes. …”
Get full text
Article -
1196
The Algorithmic Agent Perspective and Computational Neuropsychiatry: From Etiology to Advanced Therapy in Major Depressive Disorder
Published 2024-11-01“…Using the Kolmogorov theory (KT) of consciousness, we developed a foundational model where algorithmic agents interact with the world to maximize an Objective Function evaluating affective valence. …”
Get full text
Article -
1197
An anomaly node detection method for distributed time synchronization algorithm in cognitive radio sensor networks
Published 2018-05-01“…The anomaly nodes that failed to synchronize will significantly affect the global convergence performance of the synchronization algorithm. This article proposes an anomaly node detection method for distributed time synchronization algorithm in cognitive radio sensor networks. …”
Get full text
Article -
1198
Energy-Efficient Routing Algorithms Based on OVSF Code and Priority in Clustered Wireless Sensor Networks
Published 2013-07-01“…Since the amount of sensing data may be large and sensor nodes are usually battery-powered, it is critical to design energy-efficient routing algorithms to prolong network lifetime. …”
Get full text
Article -
1199
A Machine Learning Algorithm for Supplier Credit Risk Assessment Based on Supply Chain Management
Published 2022-01-01“…Traditionally, it refers to the concern that the borrower may not be able to collect the sequence and interest. …”
Get full text
Article -
1200
Privacy-preserving distributed optimization algorithm for directed networks via state decomposition and external input
Published 2025-03-01“…Unlike traditional optimization algorithms applied to directed graphs, instead of using the push-sum algorithm, we introduce the external input, which can reduce the number of communications between agents and save communication resources. …”
Get full text
Article