Showing 1,901 - 1,920 results of 5,420 for search 'may algorithm', query time: 0.12s Refine Results
  1. 1901

    An Optimization Coverage Strategy for Wireless Sensor Network Nodes Based on Path Loss and False Alarm Probability by Jianing Guo, Yunshan Sun, Ting Liu, Yanqin Li, Teng Fei

    Published 2025-01-01
    “…In more complex application scenarios such as warehousing, residential areas, etc., this may lead to a large gap between the expected effect of actual coverage and simulated coverage. …”
    Get full text
    Article
  2. 1902

    The LED-ID Detection and Recognition Method Based on Visible Light Positioning Using Proximity Method by Canyu Xie, Weipeng Guan, Yuxiang Wu, Liangtao Fang, Ye Cai

    Published 2018-01-01
    “…Without the correct recognition of LED-ID, the positioning algorithm would be meaningless no matter how effective it is. …”
    Get full text
    Article
  3. 1903

    Monitoring patient pathways at a secondary healthcare services through process mining via Fuzzy Miner by Güzin Özdağoğlu, Muhammet Damar, Fatih Safa Erenay, Hale Turhan Damar, Osman Himmetoğlu, Andrew David Pinto

    Published 2025-05-01
    “…Utilizing its flexibility, visualizations and robustness, authors implemented fuzzy-miner algorithm. First, we processed the relevant data from patient records. …”
    Get full text
    Article
  4. 1904

    Neuropathic pain: proposal of a mechanism-based treatment by Laura Demartini, Cesare Bonezzi

    Published 2025-04-01
    “…Diagnosis can be improved by the use of diagnostic algorithms, but treatment remains rather unsatisfactory, with only 30–40% of patients achieving an acceptable response. …”
    Get full text
    Article
  5. 1905

    Dynamic Adaptive Parametric Social Network Analysis Using Reinforcement Learning: A Case Study in Topic-Aware Influence Maximization by Mohammad Hossein Ahmadikia, Mehdy Roayaei

    Published 2025-01-01
    “…Current network analysis algorithms often rely on search methods or centrality measures but face challenges such as 1) The solution space is large, resulting in high computational complexity. 2) Algorithms may be instance-dependent, relying considerably on network structure and characteristics, which may result in varying performance across different networks. 3) Most existing centrality measures are inherently static, which fail to capture the dynamic nature inherent in network analysis problems. …”
    Get full text
    Article
  6. 1906

    A pleiotropy-informed Bayesian false discovery rate adapted to a shared control design finds new disease associations from GWAS summary statistics. by James Liley, Chris Wallace

    Published 2015-02-01
    “…Leverage of GWAS results from related phenotypes may improve detection without the need for larger datasets. …”
    Get full text
    Article
  7. 1907

    FORENSIC-AUDIT AS AN IMPERATIVE OF ECONOMIC SECURITY AND DEVELOPMENT OF THE COMPANY IN THE CONDITIONS OF GLOBAL TRANSFORMATIONS by K. Nazarova, M. Nezhyva, T. Lositska, V. Miniailo, N. Novikova

    Published 2021-01-01
    “…The classical methods and algorithm of financial investigation are outlined and it is noted that they may differ depending on the purpose for which forensics is conducted, the industry in which the company operates, and others. …”
    Get full text
    Article
  8. 1908

    Diagnosis and treatment of the functional dyspepsia: clinical guidelines of the Russian Gastroenterological Association by V. T. Ivashkin, I. V. Mayev, A. A. Sheptulin, T. L. Lapina, A. S. Trukhmanov, I. M. Kartavenko, V. A. Kiprianis, O. Z. Okhlobystina

    Published 2018-08-01
    “…The basic pathogenic factors may include HCl hypersecretion, stomach and duodenal dysmotility and visceral hypersensitivity. …”
    Get full text
    Article
  9. 1909

    Radioactive Source-Detector System: Design and Monte Carlo Opinion by Zainab kareem Ali, Ali N. Mohammed

    Published 2024-10-01
    “…Unlike laboratory experiments which may take from several minutes to several hours. …”
    Get full text
    Article
  10. 1910

    Incentivization and Aggregation Schemes for Federated Learning Applications by Vikas Hassija, Vaibhav Chawla, Vinay Chamola, Biplab Sikdar

    Published 2023-01-01
    “…However, participants in the training process may have varying levels of willingness to participate (WTP) and may contribute duplicate or poor-quality data. …”
    Get full text
    Article
  11. 1911
  12. 1912

    Crowdsourced data leaking user's privacy while using anonymization technique by Naadiya Mirbahar Mirbahar, Kamlesh Kumar, Asif Ali Laghari, Mansoor Ahmed Khuhro

    Published 2025-04-01
    “…To fully utilize the underlying values, the collected data may be shared with third parties, such as worldwide intelligent data experts. …”
    Get full text
    Article
  13. 1913

    First results of acoustic tags using for studies of migrations of siberian taimen Huho taimen (Salmonidae) in the Tugur River basin (northwestern Okhotsk Sea) by S. E. Kulbachnyi, N. V. Kolpakov, O. A. Kudrevskyi

    Published 2020-09-01
    “…Method of acoustic tagging of large-sized fish in a medium river is successfully tested for the case of siberian taimen Hucho taimen in the Tugur River. Algorithm of fish anesthesia and acoustic tag input into its body cavity is developed. …”
    Get full text
    Article
  14. 1914

    A distributed week-ahead scheduling method for the charging / discharging of plug-in electric vehicles integrated into the grid by Yan Cui, Zechun Hu, Yujian Wan, Junsong Li, Chengcheng Shao, Zhiyuan Bao, Xiaoyu Duan

    Published 2024-01-01
    “…However, the existing research works on GVI are mainly limited to day-ahead or intra-day schedules which may not fully utilize the EVs' potential in charging/discharging arrangements for the power grid. …”
    Get full text
    Article
  15. 1915

    A Deep Learning Model Leveraging Time-Series System Call Data to Detect Malware Attacks in Virtual Machines by A. Alfred Raja Melvin, Jaspher W. Kathrine, Andrew Jeyabose, D. Cenitta

    Published 2025-03-01
    “…The security solutions deployed within the TVM may not be reliable, as malware can disable them or remain undetected due to its hidden nature. …”
    Get full text
    Article
  16. 1916

    Isolated Syndesmotic Fixation is Associated with Increased Risk of Arthrodesis and Arthroplasty Operations Compared to Nonoperatively Managed Syndesmotic Injury: A Propensity-Score... by Sean Sequeira MD, Heath P. Gould MD, Walter C. Hembree MD

    Published 2024-12-01
    “…Patients who underwent surgical stabilization were matched using a propensity scoring algorithm to patients who were managed nonoperatively. …”
    Get full text
    Article
  17. 1917

    Application of the Analytic Hierarchy Process Method to Select the Final Solution for Multi-Criteria Optimization of the Structure of a Hybrid Generation System with Energy Storage by Andrzej Tomczewski, Stanisław Mikulski, Jan Szymenderski

    Published 2024-12-01
    “…These solutions, depending on their position within the Pareto front, may differ significantly in terms of the values of the criteria functions, or may be located very close to each other in the solution space. …”
    Get full text
    Article
  18. 1918

    SPINE: SParse eIgengene NEtwork linking gene expression clusters in Dehalococcoides mccartyi to perturbations in experimental conditions. by Cresten B Mansfeldt, Benjamin A Logsdon, Garrett E Debs, Ruth E Richardson

    Published 2015-01-01
    “…Additionally, the response of Dehalococcoides to stress-inducing conditions that may be encountered at field-sites is not well understood. …”
    Get full text
    Article
  19. 1919

    ACQUIRED HAEMOPHILIA A: AN INTRIGUING DISEASE by Maria Gabriella Mazzucconi, Erminia Baldacci, Antonietta Ferretti, Cristina Santoro

    Published 2020-06-01
    “…There is a small peak of incidence related to pregnancy in young women aged 20–40 years. The disease may be underdiagnosed in the elderly. The diagnostic algorithm is based on an isolated prolonged activated partial thromboplastin time, normal thrombin time, absence of Lupus Anticoagulant and a mixing test that reveals the presence of an inhibitor: the finding of reduced FVIII activity and the detection of neutralising autoantibodies against FVIII lead to diagnosis. …”
    Get full text
    Article
  20. 1920