-
321
Identification Method for Resistance Coefficients in Heating Networks Based on an Improved Differential Evolution Algorithm
Published 2025-07-01“…Furthermore, a multi-constrained identification model is constructed based on Kirchhoff’s laws. …”
Get full text
Article -
322
-
323
Methods for improving the identification of acute stroke during ambulance calls: A scoping review
Published 2025-01-01Get full text
Article -
324
Modulation Format Identification Method Based on Multi-Feature Input Hybrid Neural Network
Published 2024-01-01“…A modulation format identification (MFI) method is proposed for high-speed optical fiber communication systems employing probabilistic shaping (PS) signals in polarization division multiplexing (PDM). …”
Get full text
Article -
325
-
326
A Case Study Comparing Methods for Coal Thickness Identification in Complex Geological Conditions
Published 2024-11-01“…This study compares the effectiveness of different methods for coal thickness identification, aiming to identify the most accurate approach and provide a reference for intelligent coalmine development. …”
Get full text
Article -
327
Identification method for wheel/rail tread defects based on integrated partial convolutional network
Published 2024-09-01“…This method incorporated a dense underexposure self-correction network (D-SCNet) integrated into the initial layer of the identification model. …”
Get full text
Article -
328
-
329
Method for Remote State Identification Snow-Ice Cover by the Ratio of Fresnel Reflection Coefficients
Published 2020-11-01“…In contrast to the known methods of identification of the surface layer the identification of multilayer medium layers was carried out.…”
Get full text
Article -
330
An Empirical Evaluation of Supervised Learning Methods for Network Malware Identification Based on Feature Selection
Published 2022-01-01“…Therefore, it is empirically evidenced that the proposed method for the selection of features, based on statistical techniques of reduction and extraction of attributes, allows improving the identification performance of malware traffic, discriminating it from the benign traffic of Android applications.…”
Get full text
Article -
331
Feature Extraction and Anomaly Identification Method for Power Customer Price in Power Market Enviroment
Published 2025-07-01“…Identifying electricity price anomalies and exploring the underlying reasons in such a complex market environment, especially with incomplete data, is a key issue for promoting the orderly operation of power market and ensuring the reasonable interests of power customers. Therefore, a method is established for feature extraction and anomaly identification of electricity prices for power customers. …”
Get full text
Article -
332
An empty-nest power user identification method based on weighted random forest algorithm
Published 2020-08-01“…In view of the lack of effective technical means for the identification of empty-nesters by the government and the society,an empty-nesters prow user identification method based on weighted random forest algorithm was proposed.Firstly,some accurate labels of empty-nest users were obtained through questionnaires,and electricity characteristic library was drawn from three aspects:electricity consumption level,electricity consumption fluctuation and electricity consumption trend.Due to the data imbalance between empty-nest and non-empty-nest users,the weighted random forest algorithm was used to improve the data sensitivity phenomenon of machine learning.Finally,the algorithm model was put online in the power company’s acquisition system.The 2 000 unknown users of various types were identified,among which the identification accuracy of empty-nest users was 74.2%.The results show that the identification of empty-nesters from the perspective of electricity consumption can help power grid companies to understand the personalized and differentiated needs of empty-nesters,so as to provide users with more sophisticated services,and also assist the government and society to carry out assistance work.…”
Get full text
Article -
333
Damage Identification Method of Beam Structure Based on Modal Curvature Utility Information Entropy
Published 2020-01-01Get full text
Article -
334
UHVDC Transmission Line Fault Identification Method Based on Generalized Regression Neural Network
Published 2025-04-01Get full text
Article -
335
Dynamic Identification Method of Distribution Network Weak Links Considering Disaster Emergency Scheduling
Published 2025-07-01“…Finally, the four indexes are comprehensively analyzed, and the dynamic identification of the weak links in the distribution network are realized by the analytic hierarchy process (AHP)—entropy weight (EW)—technique for order preference by similarity to an ideal solution (TOPSIS) method. …”
Get full text
Article -
336
A Novel Tool Wear Identification Method Based on a Semi-Supervised LSTM
Published 2025-02-01“…The proposed method leverages both small labeled and abundant unlabeled data to improve tool wear identification performance. …”
Get full text
Article -
337
IDENTIFICATION OF PRODUCTIVITY VALUES USING THE METHOD PRODUCTIVITY DELAY MODEL ON WALLER BEAM WORK
Published 2025-05-01Get full text
Article -
338
THE NEURAL NETWORK METHOD CLASSIFICATION OF LITERARY TEXT FROM THE VIEWPOINT OF ITS GENRE IDENTIFICATION
Published 2022-10-01Get full text
Article -
339
WORKING OUT AND VALIDATION CHARACTERISTICS OF THE METHOD OF QUANTITATIVE IDENTIFICATION OF DIMEBON CONTENT IN DERMATOLOGICAL GEL
Published 2015-10-01“…Working out and further validation of the method of quantitative identification of dimebon in soft dosage forms were the purpose of the study. …”
Get full text
Article -
340
A Localization Enhancement Method Based on Direct-Path Identification and Tracking for Future Networks
Published 2025-07-01“…To address this problem, this paper proposes a localization enhancement method based on direct-path identification and tracking. …”
Get full text
Article