Showing 4,641 - 4,660 results of 6,037 for search 'main algorithm', query time: 0.12s Refine Results
  1. 4641
  2. 4642

    Modelling the power consumption of a commercial unmanned aerial vehicle using machine learning by Setati Tiro, Nkomo Brighton

    Published 2024-01-01
    “…This paper makes use of flight data and various machine-learning algorithms to determine a power consumption model for a commercial UAV with a custom payload drawing power from the main power source to assist with flight planning, flight operations and battery management.…”
    Get full text
    Article
  3. 4643

    Myocardial revascularization in diabetic patients presenting with critical limbischemia by Ivan Ivanovich Dedov, Victor Yur'evich Kalashnikov, Konstantin Vladimirovich Melkozerov

    Published 2010-12-01
    “…The authors emphasizethe importance of development of algorithms for the treatment of patients with diabetes, critical limb ischemia, and coronary heart disease.…”
    Get full text
    Article
  4. 4644

    Microarray-Based Cancer Diagnosis with Artificial Neural Networks by Markus Ringnér, Carsten Peterson

    Published 2003-03-01
    “…In recent years, the advent of experimental methods to probe gene expression profiles of cancer on a genome-wide scale has led to widespread use of supervised machine learning algorithms to characterize these profiles. The main applications of these analysis methods range from assigning functional classes of previously uncharacterized genes to classification and prediction of different cancer tissues. …”
    Get full text
    Article
  5. 4645

    SOME ASPECTS OF OPTIMIZATION PROBLEMS IN CALCULATION OF AUTONOMOUS MICROGRID SYSTEMS by D. Kugucheva, M. Kharitonov

    Published 2022-02-01
    “…Simplified algorithms are proposed for estimating the amount ofproduced and accumulated electricity in systems based on wind power plants. …”
    Get full text
    Article
  6. 4646

    Classification of Agricultural Emissions Among OECD Countries with Unsupervised Techniques by Adam Andrzejuk

    Published 2018-12-01
    “…Two methods were used in the analysis: K-means and HDBSCAN algorithms. Both techniques are part of unsupervised learning tasks, which group data into multiple clusters. …”
    Get full text
    Article
  7. 4647

    From Physically Based to Generative Models: A Survey on Underwater Image Synthesis Techniques by Lucas Amparo Barbosa, Antonio Lopes Apolinario

    Published 2025-05-01
    “….), synthesized underwater scenes can provide relevant data to improve image processing algorithms and computer vision tasks. The main goal of this survey is to summarize techniques to underwater image synthesis, their contributions and correlations, and to highlight further directions and opportunities in this research domain.…”
    Get full text
    Article
  8. 4648

    Reliability and Security Analysis of Artificial Intelligence-Based Self-Driving Technologies in Saudi Arabia: A Case Study of Openpilot by Faisal S. Alsubaei

    Published 2022-01-01
    “…Therefore, this paper highlights the main areas of improvement in available self-driving technologies in Saudi Arabia. …”
    Get full text
    Article
  9. 4649

    Research and prospect of reversible data hiding method with contrast enhancement by Yang YANG, Wei-ming ZHANG, ong-dong HOUD, Hui WANG, Neng-hai YU

    Published 2016-04-01
    “…Reversible data hiding methods can recover the cover image losslessly after extracting the secret message from the marked image.Such technology can be used in the certification or the label of military,justice and medical images,which are sensitive and slight modification are not allowed.Especially for the medical images,RDH tech-nology can be used in protecting the privacy of the patient.A series of RDH methods with contrast enhancement ef-fect were introduced and classified into pixel-based histogram methods and prediction-error-based histogram meth-ods according to the type of carrier in RDH scheme.The main purpose of such algorithms was to improve the sub-jective visual quality of marked images and to embed secret data into cover image reversibly meanwhile.These se-ries of algorithms were suitable for the research of privacy protection of medical image.Finally,future development in this direction is prospected through analyzing the advantages and disadvantages of the existing work.…”
    Get full text
    Article
  10. 4650

    Differentiation characteristics and evolutionary mechanisms of agricultural regional functions in Loess Hilly and Gully Region by LONG Pei, WANG Yongsheng, LU Xue

    Published 2025-05-01
    “…This was followed by the ecological-dominant type, mainly found in the northeastern and southeastern parts, accounting for 23%. …”
    Get full text
    Article
  11. 4651

    THE AXIOMATIC METHOD IN ECONOMICS by A. N. Nekhamkin, A. B. Elovikov

    Published 2017-10-01
    “…The main idea is to expand the application scope of the method by going beyond the borders of natural sciences, mathematics, physics, chemistry, astronomy, etc. to adapt it to the active application in the field of the humanities. …”
    Get full text
    Article
  12. 4652

    Promising Research Results and Development in the Field of Microwave Technology by A. V. Gusinsky

    Published 2024-04-01
    “…The use of the developed methods made it possible to optimize the structures of devices, calibration and measurement algorithms. A large range of general and special purpose devices has been created in the decimeter, centimeter and millimeter wavelength ranges.…”
    Get full text
    Article
  13. 4653

    The clinical utility and safety of biomarker-guided immunosuppression withdrawal in liver transplantation: the LIFT prospective RCT by Julien Vionnet, Rosa Miquel, Juan G Abraldes, Juan-Jose Lozano, Pablo Ruiz, Miquel Navasa, Aileen Marshall, Frederik Nevens, William Gelson, Joanna Leithead, Steven Masson, Elmar Jaeckel, Richard Taubert, Phaedra Tachtatzis, Dennis Eurich, Kenneth Simpson, Eliano Bonaccorsi-Riani, James Ferguson, Alberto Quaglia, Maria Elstad, Marc Delord, Abdel Douiri, Alberto Sánchez-Fueyo

    Published 2025-04-01
    “…A previous clinical trial showed that a logistic regression algorithm including the transcript levels of a set of five genes in a liver biopsy could predict the success of immunosuppression withdrawal with high sensitivity and specificity. …”
    Get full text
    Article
  14. 4654

    Long-time analytic approximation of large stochastic oscillators: Simulation, analysis and inference. by Giorgos Minas, David A Rand

    Published 2017-07-01
    “…In order to analyse large complex stochastic dynamical models such as those studied in systems biology there is currently a great need for both analytical tools and also algorithms for accurate and fast simulation and estimation. …”
    Get full text
    Article
  15. 4655

    Research on ontology based data integration of land use by CHEN Jian-jie, YE Zhi-xuan, KE Zheng-yi

    Published 2004-09-01
    “…The research had achieved the purpose for knowledge sharing and semantic interoperation effectively, in addition, the paper gave an elementary process and main algorithms for land use data integration based on the ontology, and used a Multi-Agent method to develop a prototype.…”
    Get full text
    Article
  16. 4656

    Pathophysiology of the Heart and Clinical Cardiac Anesthesiology by Yu. V. Nikiforov, L. A. Krichevsky

    Published 2012-08-01
    “…Negovsky Research Institute of General Reanimatology, Russian Academy of Medical Sciences, on the pathophysiology and applied aspects of cardiac performance and the anesthetic maintenance of cardiac operations. The main tasks presented to its investigators were to improve electric cardiac defibrillation and cardioversion, to elaborate the optimal infusiotransfusion therapy tactics during cardiac surgery, to optimize intraoperative myocardial protection, to maintain lung functions under extracorporeal circulation, to search for the most effective and safe schemes of general and epidural anesthesia in cardiosurgical patients, and to substantiate algorithms for their postoperative activation. …”
    Get full text
    Article
  17. 4657

    Integrated Protocols to Ensure Security Services in Wireless Sensor Networks by Mohammed Faisal, Jalal Al-Muhtadi, Abdullah Al-Dhelaan

    Published 2013-07-01
    “…In this paper, we introduce two protocols to address these main security services. The proposed protocols integrate public key and symmetric key algorithms to ensure optimal usage of sensors' energy and processing power to provide adequate security in next generation WSN. …”
    Get full text
    Article
  18. 4658

    Survey on Research Progress of Load Balancing in LTE-Advanced Heterogeneous Network by Juanxiong Xu, Yisha Liu, Lun Tang, Qianbin Chen

    Published 2014-10-01
    “…Following that, a comprehensive taxonomic approach to classifying algorithms of load balancing was proposed, based on which detailed analyses and thorough comparisons for the main strategies in recent years were made; and several schemes to reduce signaling overhead were compared and analyzed in the load balancing process. …”
    Get full text
    Article
  19. 4659

    Reconsidering CPR protocols: Exploring hypernatremia's role in ventricular tachycardia from a case report by Arthur Gavotto, Jean-Yves Le Guennec, Cyril Amouroux, Pascal Champeroux, Angelo Polito, Jérôme Thireau, Alain Lacampagne, Gilles Cambonie

    Published 2025-05-01
    “…This case suggests a re-evaluation of cardiopulmonary resuscitation algorithms, favouring the preferential use of lidocaine over epinephrine and amiodarone in cases of critical hypernatremia-related cardiac arrest.…”
    Get full text
    Article
  20. 4660