Showing 41 - 60 results of 2,265 for search 'average degree (method OR methods)', query time: 0.16s Refine Results
  1. 41

    Functional complementarity relationship enhanced cloud API recommendation method by Zhen CHEN, Wenhui CHEN, Xiaowei LIU, Dianlong YOU, Linlin LIU, Limin SHEN

    Published 2023-06-01
    “…Current cloud application program interface (API) recommendation methods mainly use similarity calculation or historical calls of Mashup to generate recommendation results, while ignoring the beneficial functional complementarity (FC) between Mashup and cloud API.To address the above issue, a FC relationship enhanced cloud API recommendation approach was proposed.Firstly, label co-occurrence was applied to describe the FC relationship.Then, the FC score was calculated to describe the degree of FC between the cloud API and the Mashup, and the FC vector was learned to describe the potential FC relationship.Based on this, FC scores and FC vectors were embedded into the cloud API recommendation model, so that FC relationship played a key role in the cloud API recommendation process.Experiments were conducted on real-world cloud API datasets, and the AUC, F1 and HR@5 of the proposed approach improved by an average of 2.32%, 1.86% and 9.15%, respectively, in the sparse scenario.Finally, the proposed approach can improve the accuracy of cloud API recommendation results, while improving the recommendation performance of long-tail cloud API.…”
    Get full text
    Article
  2. 42

    Method of testing building models and their engineering systems for seismic impact by Abovyan Avetik, Marutyan Aleksandr, Abovyan Gurgen

    Published 2024-01-01
    “…In order to assess the degree of accuracy of the proposed method of simulating seismic impact from an accelerogram of one earthquake, floor movements of a building model were determined theoretically and experimentally. …”
    Get full text
    Article
  3. 43

    Reservoir Fluid Identification Method Based on Multi-Feature Fusion by JIANG Guoqiang, WU Youbin, LAI Fuqiang, HUANG Zhaohui, YI Hongmei, LI Quan, LI Xu, WANG Qi, LUO Rongtao

    Published 2024-12-01
    “…This method has a good recognition effect on the properties of gas and water fluids, with an average recognition accuracy of 83.2% on the test set. …”
    Get full text
    Article
  4. 44

    Modified method of vacuum therapy in the treatment of infected poststernotomy wounds by A. L. Charyshkin, A. A. Guryanov

    Published 2020-10-01
    “…According to the applied method of vacuum therapy, all patients with infectious complications of post-sternotomy wounds were divided into two groups (n = 25, average age 56.6 years). …”
    Get full text
    Article
  5. 45

    Evaluating the method increasing of toric intraocular lenses rotational stability by G. A. Fedjashev

    Published 2015-10-01
    “…In patients with IOL implanted by the proposed method, the average angle of rotation of the IOL in all operated eyes was significantly lower and amounted to 0,8±1,2 degrees (p <0,05). …”
    Get full text
    Article
  6. 46

    A new method of surgical upper eyelid ptosis treatment by I. A. Filatova, Yu. P. Kondratyeva, S. A. Shemetov, M. S. Trefilova

    Published 2023-12-01
    “…Purpose: to develop a new method of surgical treatment of moderate upper eyelid ptosis.Material and methods. 88 patients (106 eyes) aged 5–68 years (averagely 24.9 yrs), operated for moderate or severe upper eyelid ptosis, were divided into 3 groups depending on the degree of upper eyelid prolapse and levator function. …”
    Get full text
    Article
  7. 47

    The Outcome of 270-Degree Selective Laser Trabeculoplasty by Pasi Tapio Pehkonen, Juha Oskari Välimäki

    Published 2012-01-01
    “…Postoperative inflammatory reaction was scanty. Conclusions. 270-degree SLT is useful in lowering IOP in PXFG and POAG, but the average reduction of IOP seems to be within the same range as reported with 180-degree SLT previously.…”
    Get full text
    Article
  8. 48

    Significant differences in terrestrial water storage estimated by four common methods by Anqi Niu, Long Sun, Ranhao Sun, Liding Chen

    Published 2025-04-01
    “…The biases or errors in the average water storage caused by different methods across various years range from 90.3 mm to 136.3 mm. …”
    Get full text
    Article
  9. 49

    Experimental Study of Ice Slurry Production Characteristics by Vacuum Stirring Method by Liu Xi, Lei Xiaojian, Zheng Minfeng, Huang Cheng, Li Xuelai

    Published 2015-01-01
    “…The process of ice slurry preparation is observed with the ice slurry preparation equipment based on vacuum stirring method, and the effects of ethylene glycol additive, solution volume and stirring speed on the supercooling degree of ice slurry preparation are investigated experimentally. …”
    Get full text
    Article
  10. 50

    Bridge facility health detection method based on DATA random subspace by Xiaoyan Shen

    Published 2025-06-01
    “…In the damage mode with weakened mid-span stiffness, the positioning error of the improved method is controlled within 1.42 m, and the damage degree error is 6.48 %. …”
    Get full text
    Article
  11. 51

    Establishment and application of DNA barcode identification method for species of shark fins by JIANG Xiaoxia, SHA Caihua, LUO Baozheng, SHAO Jianhong, XU Bowen, HUANG Haichao, ZHAO Fuzhen, ZHOU Aobaixue, CHEN Xuan

    Published 2024-12-01
    “…The analysis results showed that the established method produced specific amplifications and obtained valid sequences for all samples. …”
    Get full text
    Article
  12. 52

    Identification of LSA Data Retrieval Method and Temporal Graph for Document Retrieval by Shahla Rezvani, Nader Naghshineh, Ahmad Khalilijafarabad

    Published 2025-01-01
    “…The degree of correlation obtained in this method is very high (0.98), indicating the reliability of the results. …”
    Get full text
    Article
  13. 53

    Research on IoT security situation awareness method based on evidence theory by Jian LI, Tinglu DONG, Jie LI

    Published 2022-04-01
    “…The security problem of IoT became more and more serious with its rapid development.Considering that the current IoT security situation awareness system lacks generality and excessively relies on expert knowledge, a IoT security situation awareness method based on improved D-S evidence theory was proposed in this paper.Fuzzy Gaussian membership function was used to calculate the vulnerability information membership matrix, which was normalized as evidence distribution matrix.The improved Topsis method was used to measure the evidence credibility.In order to fully restrain the credibility of conflicting evidence and improve the credibility of mutually supporting evidence, local credibility between two evidence was aggregated and the expected positive and negative solution vectors were improved according to the situation assessment scenario.And the weighted average method was used for vulnerability information fusion, to obtain the result of situational assessment.The result of situational awareness was fused with the time discount and high-risk vulnerability information discount evidence theory.At the same time, the IoT vulnerability information at different moments was considered comprehensively, the evidence was adaptively and dynamically weighted with the ratio information of high-risk vulnerability.The experimental results show that in the fusion of different numbers of evidence bodies and four common conflicting evidence, the improved Topsis method has higher fusion probability on credible proposition.In the aspect of situation assessment, the risk degree of current system is accurately assessed.And in the aspect of situational awareness, this discount evidence theory can predict the probability of high risk and critical risk, which is more effective than the traditional D-S evidence theory.According to this theory, a IoT security situational awareness method process was proposed, which would be used to guide engineering practice.In the future, the relationship between vulnerabilities can be considered and richer information between vulnerabilities can be extracted for vulnerability exploiting, so that the result of situation assessment is more accurate and reasonable.On the other hand, for situational awareness, game theory can be adopted in the process of dynamic game between the attacker and defender.…”
    Get full text
    Article
  14. 54

    Study of risk factors associated with the development of malocclusion by Petrović Đorđe, Vukić-Ćulafić Branka, Ivić Stojan, Đurić Milanko, Milekić Bojana

    Published 2013-01-01
    “…Data for Questionnaire for Epidemiological Surveillance were obtained from medical records of patients, heteroanamnesis, objective findings, functional analysis of stomatognathic system, and additional diagnostic methods. Results. The average number of the risk factors was 2.59 per patient, of which 56% were morphological factors, and 44% functional. …”
    Get full text
    Article
  15. 55

    Index System and Evaluation Method of Geological Environment Suitability for Human Health by Xingchun JIAO, Zhaohe ZHANG, Wei FANG, Ruimin LI, Jiuchen LIU, Wenbin JIA

    Published 2023-06-01
    “…In this study, the GHI method is proposed to evaluate the health suitability of geological environment. …”
    Get full text
    Article
  16. 56
  17. 57

    An Adaptive Diagnosis Method of Bearing Fault Based on EMD and Tile Coding by CHEN Xin'an, WANG Junping, ZHANG Huiyuan, SHEN Yunbo, KUANG Shi, ZHU Wenlong

    Published 2023-08-01
    “…To address the low accuracy of conventional bearing fault diagnosis methods that rely on empirical parameters in the scenarios with different noise degrees, this paper presents an adaptive bearing fault diagnosis method combining empirical mode decomposition (EMD) and tile coding. …”
    Get full text
    Article
  18. 58

    Weighted evidence combination based on degree of credibility and certainty by Lu WANG, Qing-hua XING, Yi-fan MAO

    Published 2017-01-01
    “…To overcome the invalidation problem of Dempster rule with high conflict,a weighted combination method based on degree of credibility and certainty was proposed.Firstly,the cosine similarity was modified to hold the ability to measure the evidence conflict when multi-subset focal elements were included,followed by the building of evidence credibility model.Secondly,the evidence certainty model based on precision and entropy was presented,which can both reflect the evidence’s degree of multi-subset focal elements and the dispersion degree of probability assignment.Then the weighted coefficient was determined by credibility and certainty.Finally,the normalized weighted coefficient was used to average the basic probability assignment,and the final combination result can be obtained according to Dempster rule.Numerical examples show that,compared with other traditional weighted combination methods,the proposed approach has made better performance in reducing conflict and accelerating convergence.…”
    Get full text
    Article
  19. 59
  20. 60

    FRACTAL ANALYSIS IN ESTIMATING THE FRAGMENTATION DEGREE OF AGRICULTURAL LANDS by Florin SALA, Cosmin Alin POPESCU, Mihai Valentin HERBEI

    Published 2020-01-01
    “…Fractal analysis was used to evaluate the degree of agricultural lands fragmentation. An area in the Western Plain, Romania was studied. …”
    Get full text
    Article