-
1181
Selection of the optimal medical waste incineration facility location: A challenge of medical waste risk management
Published 2022-01-01“…In the proposed methodology on the chosen scenario and analysing the criteria relevant for selecting the most suitable location, using the DEA method, seven efficient locations for MW incineration facility were obtained. …”
Get full text
Article -
1182
Preparation and Characterization of Ternary Complexes to Improve the Solubility and Dissolution Performance of a Proteolysis-Targeting Chimera Drug
Published 2025-05-01“…<b>Methods:</b> Initially, sulfobutyl ether-β-cyclodextrin (SBE-β-CD) was selected to improve the solubility of LC001. The polymer TPGS was screened based on the phase solubility method to enhance the efficiency of complexation and solubilization capacity, and its ratio with SBE-β-CD was optimized. …”
Get full text
Article -
1183
Enhancing PV power forecasting through feature selection and artificial neural networks: a case study
Published 2025-07-01“…For instance, integrating ReliefF with MLP reduced the normalized mean absolute error (nMAE) to 9.21% with an R2 of 0.9608, while the best LSTM configuration achieved an nMAE of 9.29% and an R2 of 0.946 when using Chi-square selected features. These findings confirm that careful feature selection enhances model performance, reduces complexity, and ensures better generalization, offering valuable insights for more efficient solar energy management and grid stability.…”
Get full text
Article -
1184
Molecularly Woven Cationic Covalent Organic Frameworks for Highly Selective Electrocatalytic Conversion of CO2 to CO
Published 2024-11-01“…After loading Pd nanoparticles, CuCOF‐Pd and CuCOF+‐Pd performed increased CO selectivity up to 84.97% and 95.45%, respectively. Combining the DFT theoretical calculations and experimental measurements, it is assumed that the molecularly woven cationic COF provides a catalytic microenvironment for CO2R and ensures efficient charge transfer from the electrode to the catalytic center, thereby achieving high electrocatalytic activity and selectivity. …”
Get full text
Article -
1185
Selective Cleaning Enhances Machine Learning Accuracy for Drug Repurposing: Multiscale Discovery of MDM2 Inhibitors
Published 2025-07-01“…Quantum mechanical (ONIOM) optimizations and molecular dynamics simulations confirmed the stability and favorable interaction profiles of the selected protein–ligand complexes, resembling that of navtemadlin, a known MDM2 inhibitor. …”
Get full text
Article -
1186
Tear replacement by cationic emulsion in complex therapy of superficial punctate keratitis in hypotensively medicated glaucoma patients
Published 2018-10-01“…The testing procedures and efficiency monitoring included biomicroscopy, Schirmer test, Norn test and evaluation of tear film osmolarity. …”
Get full text
Article -
1187
PLL-VO: An Efficient and Robust Visual Odometry Integrating Point-Line Features and Neural Networks
Published 2025-07-01“…To overcome the impact of complex lighting conditions, a self-supervised learning method for interest point detection and a line detection algorithm that combines line optical flow tracking with cross-constraints is presented. …”
Get full text
Article -
1188
Background of Data Envelopment Analysis Implementation in Moscow Healthcare System: International and Russian Experience
Published 2024-11-01“…The publications were selected using the PRISMA guidelines. A complex of modern general scientific methods of cognition was also used: system and structural approach, analytical method, comparison, and generalization.Results. …”
Get full text
Article -
1189
An Efficient Large-Scale Sensor Deployment Using a Parallel Genetic Algorithm Based on CUDA
Published 2016-03-01Get full text
Article -
1190
Dynamics-based predictions of infinite-dimensional complex systems using dynamical system deep learning method
Published 2025-01-01“…Predicting complex nonlinear chaotic dynamical systems constitutes a critical and formidable challenge across various disciplines. …”
Get full text
Article -
1191
Adaptive Neuro-Fuzzy System for Detection of Wind Turbine Blade Defects
Published 2024-12-01“…For this purpose, the authors explored grid partitioning and subtractive clustering methods and selected the last one because it uses three rules only for fault detection, ensuring low computational costs and enabling the discovery of wind turbine defects quickly and efficiently. …”
Get full text
Article -
1192
Insulator Defect Detection Algorithm Based on Improved YOLOv11n
Published 2025-02-01“…Ensuring the reliability and safety of electrical power systems requires the efficient detection of defects in high-voltage transmission line insulators, which play a critical role in electrical isolation and mechanical support. …”
Get full text
Article -
1193
Intelligent Detection of Tomato Ripening in Natural Environments Using YOLO-DGS
Published 2025-04-01“…To achieve accurate detection of tomato fruit maturity and enable automated harvesting in natural environments, this paper presents a more lightweight and efficient maturity detection algorithm, YOLO-DGS, addressing the challenges of subtle maturity differences between regular and cherry tomatoes, as well as fruit occlusion. …”
Get full text
Article -
1194
Edge-Optimized Lightweight YOLO for Real-Time SAR Object Detection
Published 2025-06-01“…Experimental results demonstrate that the proposed method achieves comparable detection performance to state-of-the-art YOLO variants while drastically reducing computational complexity (4.4 GFLOP) and parameter count (1.9 M). …”
Get full text
Article -
1195
Contrastive Learning Algorithm for Low-Resource Cryptographic Attack Event Detection
Published 2025-01-01“…Additionally, assigning appropriate weights to keywords of different event types and employing clustering methods for effective classification reduce reliance on manually labeled data, thereby facilitating the training of an efficient cryptographic attack event detection model. …”
Get full text
Article -
1196
A Novel Approach to Speed Up Hampel Filter for Outlier Detection
Published 2025-05-01“…This paper proposes a novel Hampel filter variant that replaces the MAD with an original estimator (mMAD) that retains statistical robustness but is computationally more efficient. This reduces the filter’s computational complexity from <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>O</mi><mo>(</mo><mi>N</mi><mo>·</mo><mi>w</mi><mo form="prefix">log</mo><mi>w</mi><mo>)</mo></mrow></semantics></math></inline-formula> to <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>O</mi><mo>(</mo><mi>N</mi><mo>·</mo><mi>w</mi><mo>)</mo></mrow></semantics></math></inline-formula>, where <i>N</i> is the data length and <i>w</i> the window size. …”
Get full text
Article -
1197
A Suggested Point Search Algorithm for Circle Detection in Binary Images
Published 2010-12-01“…The proposed algorithm was more efficient, where the average ratio of the running time for the proposed algorithm to HT method was 1:646, and the accuracy of the proposed algorithm was 100% for circles detection. …”
Get full text
Article -
1198
Log Anomaly Detection Method Based on Transformer and Temporal Convolutional Networks
Published 2025-01-01“…However, the rapid development of distributed technologies has led to the increasing scale and complexity of log data, resulting in existing methods facing difficulties in fully mining log features and information loss during parsing. …”
Get full text
Article -
1199
Security anomaly detection for enterprise management network based on attention mechanism
Published 2025-03-01“…It is an enterprise management network security anomaly detection method based on deep learning, aiming to achieve efficient and intelligent monitoring and management of security anomaly data in enterprise management network. …”
Get full text
Article -
1200
Enhancing Cybersecurity: Hybrid Deep Learning Approaches to Smishing Attack Detection
Published 2024-11-01“…Experimental results demonstrate that the proposed CNN-Bi-GRU model outperforms existing approaches, achieving an overall highest accuracy of 99.82% in detecting SMS phishing messages. This study provides an empirical analysis of the effectiveness of hybrid deep learning techniques for SMS phishing detection, offering a more precise and efficient solution to enhance cybersecurity in mobile communications.…”
Get full text
Article