-
1381
Limitations of quantum approximate optimization in solving generic higher-order constraint-satisfaction problems
Published 2025-05-01“…The ability of the quantum approximate optimization algorithm (QAOA) to deliver a quantum advantage on combinatorial optimization problems is still unclear. …”
Get full text
Article -
1382
Brain Magnetic Resonance Imaging Radiomic Signature and Machine Learning Model Prediction of Hepatic Encephalopathy in Adult Cirrhotic Patients
Published 2025-02-01“…Background: Hepatic encephalopathy (HE) may arise as a possible consequence of cirrhosis. …”
Get full text
Article -
1383
Ability of verbal autopsy data to detect deaths due to uncontrolled hyperglycaemia: testing existing methods and development and validation of a novel weighted score
Published 2019-10-01“…There were 8699 relevant deaths in Agincourt and 1663 in Karonga.Results Of the Agincourt deaths, there were 77 study physician classified cases and 58 computer algorithm classified cases. Agreement between study physician classified cases and computer algorithm classified cases was poor (Cohen’s kappa 0.14). …”
Get full text
Article -
1384
Supervised Learning of Depth Estimation From Imperfect Rectified Stereo Laparoscopic Images of Liver Surface
Published 2025-01-01“…Yet, using deep learning algorithms for binocular depth estimation in laparoscopic images may encounter challenges like system-induced calibration errors and significant object depth variations in the laparoscopic field of view, which can impact rectification and depth estimation accuracy. …”
Get full text
Article -
1385
Artificial Seismic Source Field Research on the Impact of the Number and Layout of Stations on the Microseismic Location Error of Mines
Published 2019-01-01“…On the contrary, the number of stations can be reduced on the premise of the allowable error of the seismic source location, which may effectively reduce the monitoring cost.…”
Get full text
Article -
1386
Servo Control of Shunt-Active Power Filters Using Kalman Filter With DC-Link Reference
Published 2025-01-01“…LQG servo controllers may regulate current flow in a SAPF (shunt-active power filter) provided by a balanced or unbalanced supply voltage. …”
Get full text
Article -
1387
A student academic performance prediction model based on the interval belief rule base
Published 2025-08-01“…The parameters of the IBRB-C model are determined by combining the expert knowledge and the Kmeans++ algorithm. Subsequently, the P-CMA-ES algorithm is applied to optimize the initial model. …”
Get full text
Article -
1388
How to Handle Data Imbalance and Feature Selection Problems in CNN-Based Stock Price Forecasting
Published 2022-01-01Get full text
Article -
1389
Uso de Métodos Monte Carlo na Modelagem de uma Nuvem Radioativa Natural
Published 2015-05-01“…At these locations, the radiation may come from the ground, the walls, and the environment in the form of gases. …”
Get full text
Article -
1390
Optimal integrated location and dispatching decisions for feeder bus route design problem
Published 2024-12-01“…However, the calculation time is greatly reduced, thus proving the effectiveness of the proposed algorithm. …”
Get full text
Article -
1391
Spatial Estimation of Trophic State for Reservoir Using Ground Monitoring and Remote Sensing Data
Published 2025-01-01“…The results of correlation analysis between ground monitoring values and spectral values from remote sensing algorithms showed that the two parameters, SD and TP, correlated best with the NIR/BLUE algorithm. …”
Get full text
Article -
1392
Using Dendritic Heat Maps to Simultaneously Display Genotype Divergence with Phenotype Divergence.
Published 2016-01-01“…These sequences were clustered in a fractional identity range of 0.75 to 1.0 using agglomerative minimum-, maximum-, and average-linkage algorithms, as well as a divisive centroid-based algorithm. …”
Get full text
Article -
1393
Correlating Patient Symptoms and CT Morphology in AI-Detected Incidental Pulmonary Embolisms
Published 2025-06-01“…<b>Background/Objectives</b>: Incidental pulmonary embolisms (IPEs) may be asymptomatic and radiologists may discover them for unrelated reasons, and they can thereby go underdiagnosed and undertreated. …”
Get full text
Article -
1394
Extracting Target Detection Knowledge Based on Spatiotemporal Information in Wireless Sensor Networks
Published 2016-02-01“…This algorithm does not need any artificial threshold compared with traditional algorithms. …”
Get full text
Article -
1395
Vegetation growth monitoring based on ground-based visible light images from different views
Published 2025-02-01“…The results showed that: (1) machine learning algorithm was suitable for green vegetation segmentation of multi-view images. …”
Get full text
Article -
1396
IQGO: Iterative Quantum Gate Optimiser for Quantum Data Embedding
Published 2024-01-01“…Using small tabular datasets, we benchmark our approach against contemporary state-of-the-art classical algorithms. These promising results suggest that quantum algorithms may perform well at data classification problems. …”
Get full text
Article -
1397
Optimization of Arrangements of Heat-Storage Bricks in a Regenerative Combustion System by Tree Search
Published 2025-07-01“…This simple tree search method/algorithm may effectively enhance the <i>thermal efficiency</i> of a regenerative combustion system.…”
Get full text
Article -
1398
Blockchain-based high transparent PKI authentication protocol
Published 2022-08-01“…The public key infrastructure (PKI), as an significant component of the current Internet security infrastructure, guarantees the information transmission with the necessary authenticity, integrity, confidentiality and non-repudiation.However, the existing PKI also has shortcomings of excessive power of certification authority and difficulties in revoking and querying.Blockchain can be used to solve those problems by leveraging its advantages, such as decentralization, high transparency and flat structure.Furthermore, the ability and efficiency of the entire Internet to establish trust relationships may be improved.The transparent public key infrastructure (PKI) certification protocol based on the blockchain was proposed.The TS-PBFT algorithm was designed in the proposed protocol by adopting the threshold signature technology to the Practical Byzantine fault tolerance (PBFT) algorithm.The TS-PBFT algorithm reduced the communication overhead via reducing the communication complexity, strengthened the supervision via introducing external monitoring mechanism in the master node election of the view change protocol, and also improved the performance of the consensus mechanism via adding a batch processing mechanism.Moreover, a transparent blockchain-based PKI certification protocol was designed.The proposed protocol increased the security of certificate revocation and query, it also improved the efficiency of the certificate query by the introduction of counting bloom filters.Besides, the proposed protocol added audit function into the certificate lifecycle management.Accordingly, it can supervise the behavior of the certificate authority (CA), prompt it to improve security standards, and then achieve the purpose of limiting its authority.According to the security analysis and efficiency experiments, the proposed protocol was equipped with security properties, such as the resistance to spoofing certificate application attacks, and it achieved the best performance on TLS/SSL handshake time compared with existing PKI protocols.…”
Get full text
Article -
1399
A data-driven group retrosynthesis planning model inspired by neurosymbolic programming
Published 2025-01-01“…However, current methods often treat each molecule independently, missing the opportunity to utilize shared synthesis patterns and repeat pathways, which may contribute from known synthesis routes to newly emerging, similar molecules, a notable challenge with AI-generated small molecules. …”
Get full text
Article -
1400
Desperate Coverage Problem in Mission-Driven Camera Sensor Networks
Published 2014-04-01“…In particular, we consider a desperate situation in which we may not have enough camera sensors to cover all of the targets of interest during the mission. …”
Get full text
Article