-
1741
Accurate and robust prediction of genetic relationship from whole-genome sequences.
Published 2014-01-01“…Computing the genetic relationship between two humans is important to studies in genetics, genomics, genealogy, and forensics. Relationship algorithms may be sensitive to noise, such as that arising from sequencing errors or imperfect reference genomes. …”
Get full text
Article -
1742
Flight Trajectory Simulation and Aerodynamic Parameter Identification of Large-Scale Parachute
Published 2020-01-01“…Secondly, the random interference factors that may be encountered in the actual airdrop test of the parachute system are analyzed. …”
Get full text
Article -
1743
CNAIS: Performance Analysis of the Clustering of Non-Associated Items Set Techniques
Published 2023-12-01“…The development of the algorithm and its application to the data set are described and the results are noted. …”
Get full text
Article -
1744
Using intelligence techniques to automate Oracle testing
Published 2023-06-01“…The model was trained using the random forest algorithm and using the convolutional neural network. …”
Get full text
Article -
1745
Multi-channel based edge-learning graph convolutional network
Published 2022-09-01“…Usually the edges of the graph contain important information of the graph.However, most of deep learning models for graph learning, such as graph convolutional network (GCN) and graph attention network (GAT), do not fully utilize the characteristics of multi-dimensional edge features.Another problem is that there may be noise in the graph that affects the performance of graph learning.Multilayer perceptron (MLP) was used to denoise and optimize the graph data, and a multi-channel learning edge feature method was introduced on the basis of GCN.The multi-dimensional edge attributes of the graph were encoded, and the attributes contained in the original graph were modeled as multi-channel.Each channel corresponds to an edge feature attribute to constrain the training of graph nodes, which allows the algorithm to learn multi-dimensional edge features in the graph more reasonably.Experiments based on Cora, Tox21, Freesolv and other datasets had proved the effectiveness of denoising methods and multi-channel methods.…”
Get full text
Article -
1746
Trajectory privacy protection scheme based on differential privacy
Published 2021-09-01“…To solve the problem that the current sampling mechanism and data obfuscation method may raise insufficient data availability and privacy protection, a trajectory privacy protection scheme based on differential privacy was proposed.A new efficient sampling model based on time generalization and spatial segmentation was presented, and a k-means clustering algorithm was designed to process sampling data.By employing the differential privacy mechanism, the trajectory data was disturbed to solve the user privacy leaking problem caused by the attacker with powerful background knowledge.Simultaneously, to respond to the error boundary of the query range of pandemic, an effective prediction mechanism was designed to ensure the availability of released public track data.Simulation results demonstrate that compared with the existing trajectory differential privacy protection methods, the proposed scheme has obvious advantages in terms of processing efficiency, privacy protection intensity, and data availability.…”
Get full text
Article -
1747
The Quick Measure of a Nurbs Surface Curvature for Accurate Triangular Meshing
Published 2014-04-01“…When a model for FEM calculation is prepared with a CAD program it is inevitable to mesh it finally. There are many algorithms for meshing planar regions. Some of them may be used for meshing surfaces but it is necessary to take the curvature of the surface under consideration to avoid poor quality mesh. …”
Get full text
Article -
1748
Research on the invulnerability of regional network based on topology analysis
Published 2021-11-01“…To measure the overall impact of different attacks a network region may encounter, an evaluation algorithm can be used to capture the difference in invulnerability of regional network topologies.Specifically, the vulnerability of regional network and that of connection topology between regions both internally and externally was analyzed.To find predictions between regions as supplemental topology data and create the Internet topology, data would be measured in various ways and verified.Using stratified probability sampling, multiple damage simulations could predict the worst-case scenarios in real conditions.Damage was simulated multiple times based on stratified probability sampling to approximate the damage situation of the area under real conditions.A significance tester was realized to measure the impact of damage from the overall level and special weak points respectively, discover the difference of the damage between the areas, and calculate the regional invulnerability ranking.Finally, the ranking and clustering results of forty-eight regions were given.…”
Get full text
Article -
1749
Performance of a simple ACO on the minimum label spanning tree problem
Published 2025-04-01“…In addition, we show that the 1-ANT MMAS* is superior to a local search algorithm called ERA on a constructed instance of the problem.…”
Get full text
Article -
1750
The machine learning in the prediction of elections
Published 2015-05-01“…The main reason for the development of this work, is to demonstrate the efficiency of algorithms, with different data types. At the end, it may be decided, the algorithm with the better performance in data management.…”
Get full text
Article -
1751
Research on Adaptive Cruise Control Strategy for Longitudinal Speed of Autonomous-rail Rapid Tram
Published 2021-01-01“…If autonomous-rail rapid tram achieves longitudinal automatic driving in complex urban traffic conditions, there will be problems such as increased number of driver takeovers and untimely takeovers caused by vehicles going and stopping at irregular intervals, which may lead to road congestion and even traffic accidents. …”
Get full text
Article -
1752
Machine learning for Internet of things anomaly detection under low-quality data
Published 2022-10-01“…Therefore, practitioners may not know which algorithm to choose due to the lack of review and evaluation of anomaly detection methods under low-quality data. …”
Get full text
Article -
1753
Prototyping Non-holonomic Hovercraft for Path Planning and Obstacle Avoidance
Published 2019-06-01“… — By definition, autonomous control systems are the systems that sense the physical quantities from their environment and may execute any dirty, difficult, dull and dangerous task without any intervention. …”
Get full text
Article -
1754
CHARACTERISTICS OF MARKETING IN PROFESIONAL SERVICES DELIVERED BY THE HEALTHCARE SYSTEM
Published 2013-09-01“…Where there are concerns about income distribution and hence of goods and services between individuals, the state can interfere by changing this algorithm of purchasing power distribution, within the economy. …”
Get full text
Article -
1755
Identification of Post-Transcriptional Modulators of Breast Cancer Transcription Factor Activity Using MINDy.
Published 2016-01-01“…In the future, the identified modulators may be tested as potential therapeutic targets, able to alter the activity of TFs that are critical in the development of breast cancer.…”
Get full text
Article -
1756
Rheumatoid Arthritis-Associated Interstitial Lung Disease: Diagnostic Dilemma
Published 2011-01-01“…Finally, we will explore the known and experimental treatment options that may have some benefit in the treatment of RA-ILD.…”
Get full text
Article -
1757
Determining Functional Safety Indices of CWR Track Subject to Action of Thermal Compression Forces
Published 2015-10-01“…Two main railway track design versions may be observed on the JSC RZD network. They are jointed track and con-tinuous welded rail track of temperature strained type. …”
Get full text
Article -
1758
Homotopy Perturbation Method for Fractional Gas Dynamics Equation Using Sumudu Transform
Published 2013-01-01“…A user friendly algorithm based on new homotopy perturbation Sumudu transform method (HPSTM) is proposed to solve nonlinear fractional gas dynamics equation. …”
Get full text
Article -
1759
A General Formula for Fan-Beam Lambda Tomography
Published 2006-01-01“…This implies that structures outside a scanning trajectory do not affect the exact reconstruction of points inside the trajectory even if the data may be measured through the outside features. The algorithm is simulated in a collinear coordinate system. …”
Get full text
Article -
1760
Performance of the Gomaspan Dam's Stepped Spillway Against Cavitation using CFDcity
Published 2023-09-01“…To begin, the code was validated by applying it to the experiments work of (Li et al. 2021), and the findings demonstrate great agreement between CFD and the aforementioned experimental data. Second, the algorithm is applied to the designed stepped spillway of the Gomaspan dam, and the cavity index is obtained at each step. …”
Get full text
Article