Search alternatives:
coefficient » coefficiency (Expand Search)
efficient » efficiency (Expand Search)
coefficient » coefficiency (Expand Search)
efficient » efficiency (Expand Search)
-
3001
A Review: The Application of Path Optimization Algorithms in Building Mechanical, Electrical, and Plumbing Pipe Design
Published 2025-06-01“…This review systematically integrates recent advancements in path optimization algorithms for the automated layout of mechanical, electrical, and plumbing (MEP) systems within complex building environments. A hybrid optimization framework is introduced, combining the global search capability of Ant Colony Optimization (ACO) with the local refinement efficiency of the A* algorithm, enhanced by dynamic weight adjustment and context-aware mechanisms. …”
Get full text
Article -
3002
Aircraft Measurements of Physicochemical Evolution of Atmospheric Aerosols in Air Pollution Plumes over a Megacity and Suburban Areas
Published 2020-05-01“…This study highlights the necessity of understanding the complex vertical structures of particle layers, such as those identified in and around the SMA, in order to facilitate the adoption of efficient air quality control strategies and enhance air quality forecasting.…”
Get full text
Article -
3003
Overview of Oncology: Drug-Induced Cardiac Toxicity
Published 2025-04-01“…Conventional biomarkers alone can only indicate some degree of damage that has already occurred and, therefore, early detection is key. Novel methods like genetic profiling are being developed to detect individuals at risk, prior to the onset of clinical symptoms. …”
Get full text
Article -
3004
Low-dimensional multiscale fast SAR image registration method
Published 2024-12-01“…Many existing SAR image registration methods major in describing detected features in a unique, identifiable, but maybe complex way. …”
Get full text
Article -
3005
Identification of Mycobacterium tuberculosis and its Drug Resistance by Targeted Nanopore Sequencing Technology
Published 2025-02-01“…The main causative agents of TB are known as Mycobacterium tuberculosis (MTB), which exhibits a highly complex drug resistance profile. Traditional culture-based phenotypic drug susceptibility testing is time-consuming, and PCR-based assays are restricted to detecting known mutational hotspots. …”
Get full text
Article -
3006
Reveal genomic insights into cotton domestication and improvement using gene level functional haplotype-based GWAS
Published 2025-05-01“…Abstract Genome-wide association studies (GWAS) are widely used to detect associations between genetic variants and phenotypes. …”
Get full text
Article -
3007
Toward Adaptive Unsupervised and Blind Image Forgery Localization with ViT-VAE and a Gaussian Mixture Model
Published 2025-07-01“…Experimental results on benchmark datasets demonstrate that DVVG not only enhances VAE performance but also improves efficiency in modeling complex latent distributions. …”
Get full text
Article -
3008
Adaptively evolved human oral actinomyces‐sourced defensins show therapeutic potential
Published 2021-12-01“…Signatures of natural selection were detected in defensins from the actinomyces colonized in human oral cavity and ruminant rumen and dental plaque, highlighting their role in adaptation to complex multispecies bacterial communities. …”
Get full text
Article -
3009
Beyond the nuclear border: single-cell analysis of in situ sequenced human brain tissue using cellular features
Published 2025-07-01“…A key challenge in ISS data analysis is optimizing transcript allocation while minimizing misallocation, particularly in the morphologically complex central nervous system (CNS). We compared geospatial methods using nuclear and expanded nuclear boundaries for segmentation and transcript allocation. …”
Get full text
Article -
3010
Bone scintigraphy based on deep learning model and modified growth optimizer
Published 2024-10-01“…To address the aforementioned issues, this work proposed a machine-learning technique that uses phases to detect Bone scintigraphy. The first phase in the proposed model is the feature extraction and it was conducted based on integrating the Mobile Vision Transformer (MobileViT) model in our framework to capture highly complex representations from raw medical imagery using two primary components including ViT and lightweight CNN featuring a limited number of parameters. …”
Get full text
Article -
3011
Parcel Segmentation Method Combined YOLOV5s and Segment Anything Model Using Remote Sensing Image
Published 2025-07-01“…The improved YOLOv5s module integrates Efficient Channel Attention (ECA) and BiFPN to boost feature extraction and small-object recognition, while Soft-NMS is used to reduce missed detections. …”
Get full text
Article -
3012
Analyzing customer churn behavior using datamining approach: hybrid support vector machine and logistic regression in retail chain
Published 2024-12-01“…Customer churn is one of the challenges of business management in today's complex competitive environment. For this purpose, the organization must have an efficient system to detect and analyze the factors influencing customer churn. …”
Get full text
Article -
3013
BTCP: Binary Temporal Convolutional Network-Based Data Prefetcher for Low Inference Latency and Storage Overhead
Published 2025-01-01“…Machine learning (ML)-based data prefetchers have demonstrated superior address prediction performance compared with traditional rule-based prefetchers by learning complex patterns to hide long-latency memory access. …”
Get full text
Article -
3014
Connotation and practice of the integration of academic field based on Bourdieu’s theory——taking the cultivation of cyberspace security talents as an example
Published 2023-08-01“…The deployment of network security has become a crucial strategy for the development of modern nations, with skilled professionals serving as the core driving force behind cybersecurity efforts.Cultivating cybersecurity talents and fostering team building are essential for China's talent reserves and strategic capital accumulation.With economic globalization, 0-day vulnerabilities have constantly emerged in information systems, attack chains have become increasingly complex, threat targets were difficult to detect, and hidden viruses varied over time.Talents trained by traditional universities for network security were unable to adapt to innovative production and practical activities in the new fields, as it was confined to their training structure system.In order to break through the shackles of the internal administrative structure and traditional curriculum system of universities, and ease the contradiction between the uncertainty of cyberspace security situation and the standardization of talent cultivation, the talent cultivation models based on Bourdieu's theory were studied, the fusion meaning of cultural capital in the academic field was analyzed and three practical standards were put forward in terms of teaching content, cultivation model and teaching opportunity of cyberspace security talents in combination with the actual cases of the “Fang class”.In terms of education content, standards and open knowledge systems were established to meet the differentiated needs of students.The mentorship approach was employed to construct habitus, fostering students’ ability to adapt flexibly to problems by adopting different cognitive thinking modes.Favorable teaching opportunities were utilized by tutors in various roles to promote efficient integration of individuals and fields, helping students establish a valuable and stable mindset.By leveraging Bourdieu's theory to explore the integration path of academic fields, it has leveraged the advantages of independently cultivating high-quality talents, vigorously promoting technological innovation and the healthy ecological development of the industry.…”
Get full text
Article -
3015
A Review of Optimization Methods for Pipeline Monitoring Systems: Applications and Challenges for CO<sub>2</sub> Transport
Published 2025-07-01“…The impacts of the physical properties of CO<sub>2</sub> and complex designs and operation scenarios of CO<sub>2</sub> transport on the pipeline monitoring systems design are discussed. …”
Get full text
Article -
3016
Implementation of SLAM-Based Online Mapping and Autonomous Trajectory Execution in Software and Hardware on the Research Platform Nimbulus-e
Published 2025-08-01“…The implementation is validated through both full vehicle simulations using an ADAMS Car—MATLAB co-simulation and a scaled physical prototype, demonstrating the effectiveness of the system in navigating complex environments. This work contributes to the field of autonomous systems by demonstrating the potential of combining advanced sensor technologies with innovative control algorithms to achieve reliable and efficient navigation. …”
Get full text
Article -
3017
A Sleep Sensor Made with Electret Condenser Microphones
Published 2025-05-01“…This customized configuration allows the ECM to detect subtle changes in airflow associated with breathing patterns, enabling the monitoring of respiratory activity with minimal invasiveness and complexity. …”
Get full text
Article -
3018
A deep neural network model with spectral correlation function for electrocardiogram classification and diagnosis of atrial fibrillation
Published 2024-12-01“…The obtained results demonstrate that the proposed approach efficiently represents ECG signals through SCF coefficients, leading to the accurate detection of AF with an average accuracy of 92.76% and an average F1-score of 89.1%.…”
Get full text
Article -
3019
An Over-the-Air Multi-User Convolutional Code for URLLC
Published 2025-01-01“…This scheme can be viewed as a non-orthogonal multiple access scheme, whose structure enables ML joint detection and decoding with the complexity of standard Viterbi algorithm.…”
Get full text
Article -
3020
Research on Underwater Acoustic Target Recognition Based on a 3D Fusion Feature Joint Neural Network
Published 2024-11-01Get full text
Article