Showing 1,621 - 1,640 results of 5,420 for search 'may algorithm', query time: 0.09s Refine Results
  1. 1621

    A detail-preserving method for medial mesh computation in triangular meshes by Bingchuan Li, Yuping Ye, Junfeng Yao, Yong Yang, Weixing Xie, Mengyuan Ge

    Published 2024-12-01
    “…The initial medial axis mesh obtained may contain erroneous edges, which are discussed and addressed in Section 3.3. …”
    Get full text
    Article
  2. 1622

    Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments by Faeiz Alserhani

    Published 2024-12-01
    “…Yet, it is equally important to predict and prevent any cyber-attacks that may compromise the integrity and security of the network infrastructure. …”
    Get full text
    Article
  3. 1623

    Utilizing machine learning to predict hospital admissions for pediatric COVID-19 patients (PrepCOVID-Machine) by Chuin-Hen Liew, Song-Quan Ong, David Chun-Ern Ng

    Published 2025-01-01
    “…Grid Search was used to optimize the hyperparameters of each algorithm. The study analyzed 1988 children and 30 study variables after data were processed. …”
    Get full text
    Article
  4. 1624

    A Multi-UAV Formation Obstacle Avoidance Method Combined with Improved Simulated Annealing and an Adaptive Artificial Potential Field by Bo Ma, Yi Ji, Liyong Fang

    Published 2025-05-01
    “…The traditional artificial potential field (APF) method exhibits limitations in its force distribution: excessive attraction when UAVs are far from the target may cause collisions with obstacles, while insufficient attraction near the goal often results in failure to reach the target. …”
    Get full text
    Article
  5. 1625

    Computation Offloading and Resource Allocation for Energy-Harvested MEC in an Ultra-Dense Network by Dedi Triyanto, I Wayan Mustika, Widyawan

    Published 2025-03-01
    “…Overall, the results of simulation studies demonstrate that the LYMOC algorithm may considerably decrease the overall cost of system execution when compared with the Lyapunov–MILP-based short-distance complete local execution algorithm and the full offloading-computation method.…”
    Get full text
    Article
  6. 1626

    Parameterization of user functions in digital signal processing for obtaining angular superresolution by A. A. Shchukin, A. E. Pavlov

    Published 2022-07-01
    “…The aim of the present work is to develop a digital signal processing algorithm for obtaining angular superresolution.Methods. …”
    Get full text
    Article
  7. 1627

    Protein structural domain-disease association prediction based on heterogeneous networks by Jingpu Zhang, Lianping Deng, Lei Deng

    Published 2025-04-01
    “…A dysfunction in domains may affect the function of proteins in some disease. …”
    Get full text
    Article
  8. 1628

    Multi-Criteria Analysis of Steel–Concrete–Steel Slab Performance: Dynamic Response Assessment Under Post-Fire Explosion by Shijie Zhang, Zhenfu Chen, Yizhi Liu, Qiuwang Tao, Dan Wu, Pinyu Zou

    Published 2025-04-01
    “…During their use, fires may occur due to fuel or gas leaks, leading to explosions. …”
    Get full text
    Article
  9. 1629

    IMPROVEMENT OF METHODOLOGICAL TOOLS FOR FINANCIAL REHABILITATION OF INDUSTRIAL ENTERPRISES by A. N. Mironova

    Published 2014-10-01
    “…A methodology for developing a financial rehabilitation plan and a debts repayment schedule is presented, which may be applied during the procedure of financial rehabilitation of an organization engaged in the industrial sector. …”
    Get full text
    Article
  10. 1630

    Risk-adaptive access control model for big data in healthcare by Zhen HUI, Hao LI, Min ZHANG, Deng-guo FENG

    Published 2015-12-01
    “…While dealing with the big data in healthcare,it was difficult for a policy maker to foresee what information a doctor may need,even to make an accurate access control policy.To deal with it,a risk-based access control model that regulates doctors’ access rights adaptively was proposed to protect patient privacy.This model analyzed the history of access,applies the EM algorithm and the information entropy technique to quantify the risk of privacy violation.Using the quantified risk,the model can detect and control the over-accessing and exceptional accessing of patients’ data.Experimental results show that this model is effective and more accurate than other models.…”
    Get full text
    Article
  11. 1631

    Design and implementation of a video recommendation system in campus network by Xin DING, Yan MA, Jun WU

    Published 2013-09-01
    “…According to the feature of video-sharing with P2P in campus network,a video recommendation system in campus network called FP-CNVR system was designed and implemented; a novel data cleaning method based on customer segmentation was proposed; the structure of FP-tree in the process of frequent pattern mining with FP-growth algorithm was improved.Experimental results show that the novel recommendation system can provide more reliable recommended results,and also the novel data cleaning method can improve the accuracy of the recommendation results.The research may have some inspiration to related subjects in campus network.…”
    Get full text
    Article
  12. 1632

    Risk-adaptive access control model for big data in healthcare by Zhen HUI, Hao LI, Min ZHANG, Deng-guo FENG

    Published 2015-12-01
    “…While dealing with the big data in healthcare,it was difficult for a policy maker to foresee what information a doctor may need,even to make an accurate access control policy.To deal with it,a risk-based access control model that regulates doctors’ access rights adaptively was proposed to protect patient privacy.This model analyzed the history of access,applies the EM algorithm and the information entropy technique to quantify the risk of privacy violation.Using the quantified risk,the model can detect and control the over-accessing and exceptional accessing of patients’ data.Experimental results show that this model is effective and more accurate than other models.…”
    Get full text
    Article
  13. 1633

    TACTICS OF THE PATIENT MANAGEMENT IN THORACIC AORTA DILATION: SELECTION THE ASSESSMENT METHOD, RESULTS EVALUATION by E. B. Luneva, E. G. Malev, A. S. Rudoy, E. V. Zemtsovsky

    Published 2015-07-01
    “…Special attention is paid for the patients with genetic disorders that may cause aorta dilation.…”
    Get full text
    Article
  14. 1634

    Design and implementation of a video recommendation system in campus network by Xin DING, Yan MA, Jun WU

    Published 2013-09-01
    “…According to the feature of video-sharing with P2P in campus network,a video recommendation system in campus network called FP-CNVR system was designed and implemented; a novel data cleaning method based on customer segmentation was proposed; the structure of FP-tree in the process of frequent pattern mining with FP-growth algorithm was improved.Experimental results show that the novel recommendation system can provide more reliable recommended results,and also the novel data cleaning method can improve the accuracy of the recommendation results.The research may have some inspiration to related subjects in campus network.…”
    Get full text
    Article
  15. 1635

    A General Formula for Fan-Beam Lambda Tomography

    Published 2006-01-01
    “…This implies that structures outside a scanning trajectory do not affect the exact reconstruction of points inside the trajectory even if the data may be measured through the outside features. The algorithm is simulated in a collinear coordinate system. …”
    Get full text
    Article
  16. 1636

    The Study of Roadside Visual Perception in Internet of Vehicles Based on Improved YOLOv5 and CombineSORT by LI Xiaohui, YANG Jie, XIA Qin

    Published 2025-01-01
    “…It indicates that most algorithms can achieve good detection results when the targets are sparse, and the lightweight models may have more advantages with considering the demand of computing resources. …”
    Get full text
    Article
  17. 1637

    Distributed Optimal Power and Rate Control in Wireless Sensor Networks by Meiqin Tang, Jianyong Bai, Jing Li, Yalin Xin

    Published 2014-01-01
    “…In real networks, nodes interfere with each other in the procedure of transmitting signal, which may lead to signal transmission failure and may negatively have impacts on networks throughput. …”
    Get full text
    Article
  18. 1638

    Prediction of Spontaneous Protein Deamidation from Sequence-Derived Secondary Structure and Intrinsic Disorder. by J Ramiro Lorenzo, Leonardo G Alonso, Ignacio E Sánchez

    Published 2015-01-01
    “…Asparagine residues in proteins undergo spontaneous deamidation, a post-translational modification that may act as a molecular clock for the regulation of protein function and turnover. …”
    Get full text
    Article
  19. 1639

    Real-Time Vocal Tract Model for Elongation of Segment Lengths in a Waveguide Model by Tahir Mushtaq QURESHI, Muhammad ISHAQ

    Published 2019-04-01
    “…In the current work, the uniform cylindrical segments of the vocal tract may have their different lengths, the time taken by the sound wave to propagate through a cylindrical segment in an axial direction may not be an integer multiple of each other. …”
    Get full text
    Article
  20. 1640

    Deferred Stenting for Heavy Thrombus Burden During Percutaneous Coronary Intervention for ST-Elevation MI by Akshyaya Pradhan, Monika Bhandari, Pravesh Vishwakarma, Rishi Sethi

    Published 2021-03-01
    “…Deferred stenting may be beneficial in this situation as the thrombus burden will reduce, mitigating the slow-flow/no-reflow phenomenon. …”
    Get full text
    Article