-
461
-
462
An Approach to Truck Driving Risk Identification: A Machine Learning Method Based on Optuna Optimization
Published 2025-01-01“…In order to provide safe development of road freight traffic, this paper proposes a truck driving risk identification method based on Optuna optimization of machine learning model. …”
Get full text
Article -
463
-
464
Identifying multidisciplinary problems from scientific publications based on a text generation method
Published 2024-07-01“…A text generation based multidisciplinary problem identification method is proposed, which does not rely on a large amount of data annotation.…”
Get full text
Article -
465
-
466
Device of identification of parameters of the three-phase asynchronous motor
Published 2017-12-01Subjects: “…identification of parameters…”
Get full text
Article -
467
Structural Identification Using Digital Image Correlation Technology
Published 2023-11-01“…Displacement time histories were acquired, and a blind source identification technique was adopted to delve into the data and assess structural health. …”
Get full text
Article -
468
Comparison of Patterns Shapes and Patterns Texture for Identification of Malaria Parasites in Microscopic Image
Published 2016-11-01“…The last step is to test the identification and classification of plasmodium falciparum parasite into 12 classes using methods Learning Vector Quantization (LVQ). …”
Get full text
Article -
469
Comparison of Patterns Shapes and Patterns Texture for Identification of Malaria Parasites in Microscopic Image
Published 2016-11-01“…The last step is to test the identification and classification of plasmodium falciparum parasite into 12 classes using methods Learning Vector Quantization (LVQ). …”
Get full text
Article -
470
-
471
-
472
-
473
Fracture modelling of adhesively-bonded joints by an inverse method
Published 2019-03-01Subjects: Get full text
Article -
474
Methods for tagging an ectoparasite, the salmon louse Lepeophtheirus salmonis
Published 2024-01-01“…To address this gap, we describe here a method for attaching radio frequency identification (RFID) tags to individual adult females of a marine ectoparasite, the salmon louse Lepeophtheirus salmonis. …”
Get full text
Article -
475
Survey on community detection method based on random walk
Published 2023-06-01“…Random walk techniques achieve high accuracy and efficiency in community detection.To summarize and analyze community detection methods based on random walk, the random walk technique was classified into personalized PageRank, heat kernel diffusion and other random walk methods, and community detection was classified into tasks of local community detection and global community structure identification.A detailed overview of different techniques based on random walk and their application to the tasks of community detection was provided, problems in existing methods were analyzed, and future research directions were pointed out.Finally, evaluation metrics of community detection accuracy for different community detection tasks were summarized in terms of similarity and structure respectively to facilitate research in community detection.…”
Get full text
Article -
476
Fracture modelling of adhesively-bonded joints by an inverse method
Published 2019-04-01Subjects: Get full text
Article -
477
EVALUATION OF NUCLEIC ACID EXTRACTION METHODS FOR PATHOGEN DETECTION USING PCR
Published 2025-04-01Get full text
Article -
478
Model and Method of Solid Household Waste Sorting for Their Effective Thermal Disposal
Published 2023-07-01“…A method of classification of municipal solid waste (MSW) and a method of their identification was proposed, which made it possible to identify groups that produce acid gases. …”
Get full text
Article -
479
Fast reused code tracing method based on simhash and inverted index
Published 2016-11-01Subjects: Get full text
Article -
480
Investigation of the optimal method for generating and verifying the Smartphone’s fingerprint: A review
Published 2022-05-01“…Additionally, it introduces the factors to consider when choosing the technique of device identification. It provides a list of possible attacks on each technology used in device identification methods.…”
Get full text
Article