-
561
A Penalization-Gradient Algorithm for Variational Inequalities
Published 2011-01-01Get full text
Article -
562
ALGORITHM FOR THE TREATMENT OF PATIENTS WITH ACUTE HEART FAILURE
Published 2018-08-01“…The algorithm for diagnosis, clinical patient profiles recognition, pharmacological (including diuretics, vasodilators, inotropes, vasopressors, anticoagulants, etc.) and non-pharmacological (including oxygen therapy, non-invasive and invasive ventilation, etc.) approaches to the management of AHF and ADHF are presented in accordance with contemporary guidelines.…”
Get full text
Article -
563
Research on data transmission based on DDPG algorithm
Published 2025-01-01“…In order to improve bandwidth utilization and reduce network delay, an improved Deep Deterministic Policy Gradient (DDPG) algorithm is added for congestion control. The experimental test results demonstrate that the algorithm presented in this paper can markedly reduce network latency. …”
Get full text
Article -
564
EVALUATION OF ITERATIVE ALGORITHMS FOR TOMOGRAPHY IMAGE RECONSTRUCTION
Published 2019-02-01“…The analyses involved the measurement of the contrast to noise ratio (CNR), the root mean square error (RMSE) and the Modulation Transfer Function (MTF),in order to know which algorithm fits the conditions to optimize the system better. …”
Get full text
Article -
565
Research on the impact of algorithmic trading on market volatility
Published 2025-08-01“…Abstract The rapid growing of algorithmic trading (AT) has been playing an increasingly important role in shaping financial market in recent years. …”
Get full text
Article -
566
An Algorithm for the Detection of Circular Elements in Engineering Design
Published 2020-04-01“…The benchmarking of images is composed of five main images that are tested in the algorithm of detection of circles in MATLAB with different values of radio for each image. …”
Get full text
Article -
567
Influence maximization algorithm based on social network
Published 2022-08-01“…The influence maximization (IM) problem asks for a group of seed users in a social network under a given propagation model, so that the information spread is maximized through these users.Existing algorithms have two main problems.Firstly, these algorithms were difficult to be applied in large-scale social networks due to limited expected influence and high time complexity.Secondly, these algorithms were limited to specific propagation models and could only solve the IM problem under a single type of social network.When they were used in different types of networks, the effect was poor.In this regard, an efficient algorithm (MTIM) based on two classic propagation models and reverse influence sampling (RIS) was proposed.To verify the effectiveness of MTIM, experiments were conducted to compare MTIM with greedy algorithms such as IMM, TIM and PMC, and heuristic algorithms such as OneHop and Degree Discount on four real social networks.The results show that MTIM can return a <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow><mo>(</mo> <mrow> <mn>1</mn><mo>−</mo><mfrac> <mn>1</mn> <mtext>e</mtext> </mfrac> <mo>−</mo><mi>ε</mi></mrow> <mo>)</mo></mrow></math></inline-formula> approximate solution, effectively expand the expected influence and significantly improve the efficiency.…”
Get full text
Article -
568
Back-Analysis of Parameters of Jointed Surrounding Rock of Metro Station Based on Random Forest Algorithm Optimized by Cuckoo Search Algorithm
Published 2022-01-01“…This study combines the ubiquitous-joint model, random forest algorithm (RF), and cuckoo search algorithm (CS) to construct the parameters identification method of a jointed rock mass. …”
Get full text
Article -
569
On routing algorithms in the internet of vehicles: a survey
Published 2023-12-01“…Our study comprehensively reviews diverse routing algorithms and their associated assessment methodologies. …”
Get full text
Article -
570
Exact Algorithms for the Satellite Image Selection Problem
Published 2025-06-01“…These algorithms show quality and efficiency compared with existing approaches and are expected to benefit various industrial applications.…”
Get full text
Article -
571
Performance analysis of global local mean square error criterion of stochastic linearization for nonlinear oscillator
Published 2019-03-01“…This criterion of stochastic linearization for nonlinear oscillators bases on dual conception to the local mean square error criterion (LOMSEC). The algorithm is generally built to multi-degree of freedom (MDOF) nonlinear oscillators. …”
Get full text
Article -
572
A Calibration Algorithm for Microelectromechanical Inertial Sensors
Published 2022-09-01“…Systematic errors of microelectromechanical (MEMS) inertial sensors, such as those related to zero drift, scale factor, and nonorthogonality of sensitive axes, are the main sources of errors in strapdown inertial navigation systems (SINS). …”
Get full text
Article -
573
Utilization in Microgrids through Advanced Predictive Algorithms
Published 2025-01-01Get full text
Article -
574
Pharmacotherapy algorithm for post-traumatic stress disorder
Published 2023-10-01“…Improvement of existing and development of new pharmacotherapy algorithms is an important component of care provided to patients with PTSD. …”
Get full text
Article -
575
Shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means
Published 2021-02-01“…To solve the problem that most studies had not fully considered the sensitivity of location to privacy budget and the influence of trajectory shape, which made the usability of published trajectory poor, a shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means was proposed.Firstly, according to the topological relationship of geographic space, relative entropy was used to calculate the sensitivity of real location to privacy budget, a real-time calculation method of location sensitive privacy level was designed, and a new privacy model was built in combination with differential privacy budget.Secondly, K-means algorithm was used to cluster the release position to obtain the release position set that was most similar to the real position direction, and Fréchet distance was introduced to measure the similarity between the release track and the real track, so as to improve the availability of the release track.Experiments on real data sets show that the proposed trajectory protection mechanism has obvious advantages in trajectory availability compared with others.…”
Get full text
Article -
576
Enhanced Hybrid Detection Technique for Minimum Mean Square Equalizer in Uplink Massive MIMO Systems
Published 2024-12-01Get full text
Article -
577
User Segmentation Based on Purchasing Habits and Preferences on the Amazon Platform Using K-Means Clustering
Published 2023-12-01“…The research process involves Knowledge Data Discovery (KDD) stages, including data processing, attribute selection, and applying the K-Means Clustering algorithm. The analysis results reveal five distinct user clusters, each with unique characteristics reflecting user behavior and preferences. …”
Get full text
Article -
578
New Algorithm of Stress Echocardiography with Adenosine Triphosphate
Published 2020-11-01“…The authors elaborated a new algorithm for SEchoCG on the basis of an analysis of the main science databases and their first own experience in using ATP during SEchoCG. …”
Get full text
Article -
579
-
580
RFM Model and K-Means Clustering Analysis of Transit Traveller Profiles: A Case Study
Published 2022-01-01“…Based on big data smart card information, this paper proposes using the RFM and K-means clustering algorithm to analyze and construct mode-switching traveller profiles on MRT and YouBike riders. …”
Get full text
Article