Filters








322,894 Hits in 4.1 sec

Prediction of Liver Disease using Machine Learning Algorithms

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Hence, the Objective of this study is to improve the diagnosis and Prediction of the liver disease with the machine learning algorithms.  ...  To endorse the analysis of high and multi dimensional data in health care industry we have reviewed various research papers in which we have focused on various Data mining methods for making use of data  ...  algorithms.  ... 
doi:10.35940/ijitee.i6876.079920 fatcat:ibmjkbpcwzfnrkjbrqj3s65l2q

ALGORITHMIC MAINTENANCE OF WKS SUPPORT FOR VOLUME SCHEDULING IN PIPE PRODUCTION

S. Ya. Fomin
2016 Izvestiya Visshikh Uchebnykh Zavedenii Chernaya Metallurgiya = Izvestiya Ferrous Metallurgy  
С. 58 -65.ALGORITHMIC MAINTENANCE OF WKS SUPPORT FOR VOLUME SCHEDULING IN PIPE PRODUCTION БИБЛИОГРАФИЧЕСКИЙ СПИСОК 1. Жирнов В.И.  ...  V . 59. N . 7, pp. 498-503.  ... 
doi:10.17073/0368-0797-2016-7-504-509 fatcat:sdo7rhao4fazziez4u7hi3uc3a

On the quantification of the dosimetric accuracy of collapsed cone convolution superposition (CCCS) algorithm for small lung volumes using IMRT

Oscar I. Calvo, Alonso N. Gutiérrez, Sotirios Stathakis, Carlos Esquivel, Nikos Papanikolaou
2012 Journal of Applied Clinical Medical Physics  
In this study, the accuracy of the engine dose calculation, collapsed cone convolution superposition algorithm (CCCS) used by Pinnacle 3 , was quantified by Monte Carlo simulations, ionization chamber,  ...  Lesions were < 3.0 cm in maximal diameter and < 27.0 cm 3 in volume. The Monte Carlo EGSnrc\BEAMnrc and EGS4\MCSIM were used in the comparison.  ...  Dose statistics for the planning target volumes of all of the patients are shown in Table 4 .  ... 
doi:10.1120/jacmp.v13i3.3751 pmid:22584174 pmcid:PMC5716560 fatcat:hn5wre7amrgg5e24x24eacd7zu

Page 59 of Communications of the Association for Computing Machinery Vol. 3, Issue 1 [page]

1960 Communications of the Association for Computing Machinery  
Before the appearance of the volumes themselves, the algorithms will be prepublished in a series of supplements to the journal, ''Numerische Mathematik.""  ...  These introductory volumes are the only ones that will not be made up primarily of actual algorithms.  ... 

On the generation of RVE-based models of composites reinforced with long fibres or spherical particles

G. Catalanotti
2016 Composite structures  
The algorithm is fast, able to represent the randomness of the material and to generate RVEs with any volume fraction, from 0 to its highest theoretical value, i.e. π 3 √ 2 ≈ 0.74 and π √ 3 6 ≈ 0.91 for  ...  It was concluded that the proposed algorithm can be used to generate statistically representative distributions of uniform particles.  ...  Analysis of a threedimensional point pattern with replication. Journal of the Royal Statistical Society.  ... 
doi:10.1016/j.compstruct.2015.11.039 fatcat:uki3gymuwjgl5nilqp4uad2kia

Mutual Exclusive Distributive Clustering (MEDC) Protocol for Wireless Sensor Networks

Yashwant Singh, Urvashi Chugh
2014 International Journal of Sensors Wireless Communications and Control  
A fast novel algorithm for salt and pepper image noise cancellation using cardinal B-splines.  ...  Nitin and Durg Singh Chauhan, Comparative Analysis of Traffic Patterns on k-ary n-tree using Adaptive Algorithms based on Burton Normal Form, Journal of Supercomputing, Springer, Volume 59, Number 2, Online  ...  Nitin and Durg Singh Chauhan, Stochastic Communication for Application Specific Networks-on-Chip, Journal of Supercomputing, Springer, Volume 59, Number 2, Online: September 2010, DOI: 10.1007/s11227-010  ... 
doi:10.2174/221032790302140505100253 fatcat:y6ttiopi3nb4nkurzuvdaj77ci

Optimization of a reinforced concrete structure subjected to dynamic wind action

Jherbyson Brito, Letícia Miguel
2021 Frattura ed Integrità Strutturale  
The objective function is to reduce the volume of concrete of the structure.  ...  For this, the Whale Optimization Algorithm (WOA) algorithm was used, an algorithm from the group of metaheuristic algorithms, which presents an easy computational implementation.  ...  Brito et alii, Frattura ed Integrità Strutturale, 59 (2022) 326-343; DOI: 10.3221/IGF-ESIS.59.22 The objective function consists in the minimization of the volume of the concrete of the structure, calculated  ... 
doi:10.3221/igf-esis.59.22 fatcat:2pl745caijbw7faq6yro2a5hve

A Comparative Analysis of Four Distinct Types of Searching Algorithms in Data Structure

Md. Zillur Rahman
2021 International Journal for Research in Applied Science and Engineering Technology  
But here our research intends to demonstrate an overview of comparison between four different types of searching algorithms.  ...  Basically searching algorithms are used to search or find one or more than one element from a data set. Apparently there are a lot of searching algorithms.  ...  99 11 72 9 10 23 59 99 11 72 9 10 23 59 99 11 72 9 10 23 59 99 11 72 9 10 23 59 99 11 72 9 10 23 59 99 11 72 9 Jump Search Algorithm is a relatively new algorithm  ... 
doi:10.22214/ijraset.2021.33614 fatcat:qnbeqwuypvhbta46gzusxj7q3y

Secured Mail System using Asymmetric Cryptography – RSA and ElGamal Algorithm

Zarni Sann, May Thiri Win, San Thiri Aung
2019 Zenodo  
Implementation results of the system are secure patient records report for health department. Patient records must be secure for particular department.  ...  ElGamal encryption and RSA algorithm is made before storing mails to mail server. ElGamal decryption and RSA decryption is made after retrieving mails from mail server.  ...  All Rights Reserved Journal of Networking, Computer Security and Engineering Volume 4 Issue 1 (b) Elgamal Encryption  The encryption algorithm works as follows: to encrypt a message to receiver  ... 
doi:10.5281/zenodo.2917893 fatcat:hgozthlhkfa77hou2pgcbm7f44

Journal of Global Optimization Best Paper Award for a paper published in 2014

Sergiy Butenko
2015 Journal of Global Optimization  
The fourth edition of the annual Journal of Global Optimization (JOGO) Best Paper Award, which consists of $1000 and a certificate, considered papers published in 2014 issues of JOGO.  ...  Two rounds of voting yielded three clear favorites with nearly identical level of support by the committee.  ...  (volume 59, pages 243-258). Abstract.  ... 
doi:10.1007/s10898-015-0385-1 fatcat:5wpx2gljmzdkvgaj6geyyt73a4

Page 546 of American Society of Civil Engineers. Collected Journals Vol. 129, Issue 5 [page]

2003 American Society of Civil Engineers. Collected Journals  
The volume V of an ovoid is as follows:  ...  The particle girths 2R4 ranged from 0.47D59 to 1.67D 59, where Ds is the volume-weighted median girth. The sphere assembly had about the same distribution of particle diameters.  ... 

Author index to volume 59 (1995)

1995 Journal of Computational and Applied Mathematics  
(1) 1-8 (2) 191-205 (1) 91-107 (2) 221-231 (2) 181-189 (2) 245-252 (2) 207-220 (1) 39-48 (3) 295-328 (2) 181-189 (3) 253-284 Author Index to Volume 59 (1995) (The issue number is given in front of the  ...  Tveito, Approximation of scattered data using smooth grid functions Ariel, P.D., A numerical algorithm for computing the stagnation point flow of a second grade fluid with/without suction Baker Jr, G.A  ... 
doi:10.1016/0377-0427(95)90073-x fatcat:qqipgaaxebhx7f22zdxxzuxpqa

NORMAL GATED MİYOKARDİYAL PERFÜZYON SPECT' E SAHİP KADIN HASTALARDA SOL VENTRİKÜL EJEKSİYON FRAKSİYONU VE VOLÜM DEĞERLERİ: 4D-MSPECT VE SIEMENS ICON®-QGS İLE KARŞILAŞTIRMA

Nilüfer BICAKCI
2018 Çağdaş Tıp Dergisi  
The cause of that may be the difference between communities and/or the differences between the versions of the algorithms.  ...  ±9 67±6 74±9 67±8 75±14 SVEDV (ml) 62±22 57±17 75±23 91±17 59±17 64±19 59±23 SVESV (ml) 21±13 19±11 27±14 31±11 17±10 21±11 17±13  ...  Conflict of Interest: There are no relevant conflicts of interest to disclose.  ... 
doi:10.16899/gopctd.435461 fatcat:qlfflkl5ubbftiwdpj5lwrlpiy

Anomaly Detection of Store Cash Register Data Based on Improved LOF Algorithm

Ke Long, Yuhang Wu, Yufeng Gui
2018 Applied Mathematics  
It applies the LOF algorithm to detect the outlier degree of transaction data at each time period, sets the initial threshold to detect outliers, deletes the outliers, and then performs SAX detection on  ...  If it does not pass the test, then it will gradually expand the outlying domain and repeat the above process to optimize the outlier threshold to improve the sensitivity of detection algorithm and reduce  ...  0:00 -7:54 7:54 -20:36 20:36 -23:59 Non-workdays 0:00 -7:58 7:58 -20:30 20:30 -23:59 Table 3 . 3 Abnormality threshold of all factors.  ... 
doi:10.4236/am.2018.96049 fatcat:c5wb5bgbbrd3lacejsc56xnn7i

Investigation of Reconstruction Algorithms by Means of Quantitative PET/CT Phantom Studies with a Focus on Evaluation Strategies A PET/CT Phantom Study

Johannes Neuwirth, Thomas Layer, Matthias Blaickner, Wolfgang Birkfellner, Anton Staudenherz
2015 International Journal of Life Science and Medical Research  
The technique of stripping off the inactive hull after Adaptive and Percentage Thresholding considerably reduces the contribution of the partial volume effect, thus minimizing the underestimate, which  ...  The aim of this work is to investigate the TrueX reconstruction algorithm and to compare different PET reconstruction algorithms (2D OSEM and 3D OSEM) using a phantom with non-spherical objects.  ...  4 59 2 0.7 11 59 2 5.6 16 59 2 11.9 24 59 3 26.7 34 59 3 53.6 44 59 3 89.7 64 59 3 189.8 TABLE 3 DIFFERENT 3 RATIOS FOR ACTIVITY CONCENTRATION foreground A/V  ... 
doi:10.5963/lsmr0502001 fatcat:hac2xalr4fes7ajtozx3emluia
« Previous Showing results 1 — 15 out of 322,894 results