Showing 4,521 - 4,540 results of 6,037 for search 'main algorithm', query time: 0.16s Refine Results
  1. 4521

    Dual-branch graph Transformer for node classification by Yong Zhang, Jingjing Song, Eric C.C. Tsang, Yingxing Yu

    Published 2025-02-01
    “…As an emerging architecture, graph Transformers (GTs) have demonstrated significant potential in various graph-related tasks. Existing GTs are mainly oriented to graph-level tasks and have proved their advantages, but they do not perform well in node classification tasks. …”
    Get full text
    Article
  2. 4522

    MAOOA‐Residual‐Attention‐BiConvLSTM: An Automated Deep Learning Framework for Global TEC Map Prediction by Haoran Wang, Haijun Liu, Jing Yuan, Huijun Le, Weifeng Shan, Liangchao Li

    Published 2024-07-01
    “…It also includes an optimization algorithm, MAOOA, for optimizing the hyper‐parameters of the model. …”
    Get full text
    Article
  3. 4523

    Lobular panniculitis in rheumatic diseases: the authors’ own data by O. N. Egorova, B. S. Belov, S. G. Radenska-Lopovok

    Published 2020-03-01
    “…By applying the diagnostic algorithm developed by the authors and the existing classification of Pn, the investigators diagnosed septal Pn in 430 (62.6%) patients and LPn in 249 (36.2%). …”
    Get full text
    Article
  4. 4524

    Artificial neural networking for computational assessment of ternary hybrid nanofluid flow caused by a stretching sheet: implications of machine-learning approach by Imad Khan, M. Waleed Ahmed Khan

    Published 2024-12-01
    “…Researchers are mainly interested in using soft computing artificial intelligence (AI) methods due to their broad applications in analysis, modelling and simulations. …”
    Get full text
    Article
  5. 4525

    Bytecode-based approach for Ethereum smart contract classification by Dan LIN, Kaixin LIN, Jiajing WU, Zibin ZHENG

    Published 2022-10-01
    “…In recent years, blockchain technology has been widely used and concerned in many fields, including finance, medical care and government affairs.However, due to the immutability of smart contracts and the particularity of the operating environment, various security issues occur frequently.On the one hand, the code security problems of contract developers when writing contracts, on the other hand, there are many high-risk smart contracts in Ethereum, and ordinary users are easily attracted by the high returns provided by high-risk contracts, but they have no way to know the risks of the contracts.However, the research on smart contract security mainly focuses on code security, and there is relatively little research on the identification of contract functions.If the smart contract function can be accurately classified, it will help people better understand the behavior of smart contracts, while ensuring the ecological security of smart contracts and reducing or recovering user losses.Existing smart contract classification methods often rely on the analysis of the source code of smart contracts, but contracts released on Ethereum only mandate the deployment of bytecode, and only a very small number of contracts publish their source code.Therefore, an Ethereum smart contract classification method based on bytecode was proposed.Collect the Ethereum smart contract bytecode and the corresponding category label, and then extract the opcode frequency characteristics and control flow graph characteristics.The characteristic importance is analyzed experimentally to obtain the appropriate graph vector dimension and optimal classification model, and finally the multi-classification task of smart contract in five categories of exchange, finance, gambling, game and high risk is experimentally verified, and the F1 score of the XGBoost classifier reaches 0.913 8.Experimental results show that the algorithm can better complete the classification task of Ethereum smart contracts, and can be applied to the prediction of smart contract categories in reality.…”
    Get full text
    Article
  6. 4526

    A New Method to Convert the DNA Sequence of Human to a QR Code by Sadoon Abdullah, Zahraa Abdulhamid

    Published 2019-12-01
    “…<br /> QR Codes technique is mainly used to convert and store messages since it has higher and large storage capacity, in addition to that we used, in this paper , the STR (Short Tandem Repeats) DNA sequence. …”
    Get full text
    Article
  7. 4527

    Human activity recognition system based on low-cost IoT chip ESP32 by Chao HU, Bangyan LU, Yanbing YANG, Zhe CHEN, Lei ZHANG, Liangyin CHEN

    Published 2023-06-01
    “…Human activity recognition widely exists in applications such as sports management and activity classification.The current human activity recognition applications are mainly divided into three types: camera-based, wearable device-based, and Wi-Fi awareness-based.Among them, the camera-based human activity recognition application has the risk of privacy leakage, and the wearable device-based human activity recognition application has problems such as short battery life and poor accuracy.Human activity recognition based on Wi-Fi sensing generally uses Wi-Fi network cards or software-defined radio devices to identify the rules of channel state information changes, so as to infer user activity.It does not have the problems of privacy leakage and short battery life.But Wi-Fi network cards need to rely on computers and software-defined radio platforms are expensive, which greatly limit the application scenarios of Wi-Fi sensing.Aiming at the above problems, a human activity recognition system based on the low-cost IoT chip ESP32 was proposed.Specifically, the Hampel filter and Gaussian filter were used to preprocess the channel state information obtained by ESP32.Then, the principal component analysis and discrete wavelet transform were utilized to reduce the dimension of the data.Finally, the K-nearest neighbor (KNN) algorithm was applied to classify data.The experimental results show that the system can achieve a recognition accuracy which close to the current mainstream Wi-Fi perception system (Intel 5300 network card) when only two ESP32 nodes are deployed, and the average accuracy rate for the six activities is 98.6%.…”
    Get full text
    Article
  8. 4528

    Developing Site-Specific Prescription Maps for Sugarcane Weed Control Using High-Spatial-Resolution Images and Light Detection and Ranging (LiDAR) by Kerin F. Romero, Muditha K. Heenkenda

    Published 2024-10-01
    “…Sugarcane is a perennial grass species mainly for sugar production and one of the significant crops in Costa Rica, where ideal growing conditions support its cultivation. …”
    Get full text
    Article
  9. 4529

    ETHANOL PRODUCTION FROM COCOYAM (Хanthosoma sagittifolium): APPLICATION OF THERMODYNAMIC-TOPOLOGICAL ANALYSIS by S. Serna-Loaiza, Yu. A. Pisarenko, C. A. Cardona

    Published 2018-04-01
    “…In Colombia, there are not extensive crops of this plant, but it is used for animal feeding mainly. The plant has an aerial part with a high content of protein (leaves) and a tuber with an average starch content about 25% w/w. …”
    Get full text
    Article
  10. 4530

    A Memory Hierarchy Model Based on Data Reuse for Full-Search Motion Estimation on High-Definition Digital Videos by Alba Sandyra Bezerra Lopes, Ivan Saraiva Silva, Luciano Volcan Agostini

    Published 2012-01-01
    “…The motion estimation is the most complex module in a video encoder requiring a high processing throughput and high memory bandwidth, mainly when the focus is high-definition videos. The throughput problem can be solved increasing the parallelism in the internal operations. …”
    Get full text
    Article
  11. 4531

    Forecasting Air Pollution Contingencies Using Predictive Analytic Techniques by Raul Ramirez-Velarde, Oscar Esquivel-Flores, Gerardo Mejía-Velázquez

    Published 2024-10-01
    “…The proliferation of pollutants affects the world’s population, mainly those who live in large cities. Neurological and cardiovascular dysfunctions have a correlation with air particulate matter concentration, among other chronic diseases. …”
    Get full text
    Article
  12. 4532

    A dual input dual spliced network with data augmentation for robust modulation recognition in communication countermeasures by Wang Guan

    Published 2025-07-01
    “…The modulation recognition task mainly encompasses two key aspects: the dataset and the network model. …”
    Get full text
    Article
  13. 4533

    A speed optimization model for connected and autonomous vehicles at expressway tunnel entrance under mixed traffic environment. by Jianrong Cai, Yang Liu, Zhixue Li

    Published 2024-01-01
    “…However, existing speed optimization models mainly focus on urban signal-controlled intersections or expressway weaving zones, neglecting research on speed optimization in expressway tunnel entrances. …”
    Get full text
    Article
  14. 4534

    Analyzing key users’ behavior trends in volunteer-based networks by Nofar Piterman, Tamar Makov, Michael Fire

    Published 2025-05-01
    “…We introduce two innovative algorithms: the first outlines the evolution of volunteers’ behavior patterns over time, while the second employs machine learning techniques to forecast their future behavior, including whether they will remain active donors or become mainly recipients, and vice-versa. …”
    Get full text
    Article
  15. 4535

    Development and Practice of Cloud Collaborative Platform for Downhole Measurement Tools by Che Yang, Yuan Guangjie, Qian Hongyu, Du Weiqiang, Wang Chenlong, Ding Jiping

    Published 2025-06-01
    “…The measurement tools are mainly single machine version, which is difficult to meet the current requirements for improving drilling quality and efficiency. …”
    Get full text
    Article
  16. 4536

    Startup Drift Compensation of MEMS INS Based on PSO–GRNN Network by Songlai Han, Jingyi Xie, Jing Dong

    Published 2025-04-01
    “…We adopted a correlation analysis to determine the input parameters of the PSO-GRNN model that mainly affect startup drift. In the process of training this model, we used the PSO algorithm to optimize the spread parameter of the PSO-GRNN model. …”
    Get full text
    Article
  17. 4537

    SHAPING THE STOCK PORTFOLIO BY THE INVESTMENT RATING METHOD by Svyatoslav N. Digo, Aleksandra M. Sokolova

    Published 2018-02-01
    “…Thus securities market needs more effective methods and algorithms of shaping the stock portfolio, as investor’s expectations of getting profits could be met  only in case of professional choice of investment projects. …”
    Get full text
    Article
  18. 4538

    Research on an Eye Control Method Based on the Fusion of Facial Expression and Gaze Intention Recognition by Xiangyang Sun, Zihan Cai

    Published 2024-11-01
    “…At the same time, the corresponding eye movement behavior discrimination algorithm was combined for each eye movement action to realize the output of eye behavior instructions. …”
    Get full text
    Article
  19. 4539

    Advanced hybrid computational analysis of febuxostat solubility using machine learning in supercritical processing method by Turki Al Hagbani, Rami M. Alzhrani, Majed Ahmed Algarni

    Published 2025-07-01
    “…Abstract Over the last decades, industrial employment of supercritical fluids (SCFs) as a trustworthy alternative of organic solvents has increased substantially. SCFs (mainly CO2SCF) have illustrated great potential to improve the solubility of poorly water-soluble drugs. …”
    Get full text
    Article
  20. 4540

    Optimizing statin therapy in HIV-infected patients: a review of pharmacotherapy considerations by Ramin Ansari, Hossein Khalili, Keyhan Mohammadi

    Published 2025-05-01
    “…Based on the available data, we developed a practical algorithm that clinicians can use to optimize statin therapy in PLWH. …”
    Get full text
    Article