A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is
Hence, the Objective of this study is to improve the diagnosis and Prediction of the liver disease with the machine learning algorithms. ... To endorse the analysis of high and multi dimensional data in health care industry we have reviewed various research papers in which we have focused on various Data mining methods for making use of data ... algorithms. ...doi:10.35940/ijitee.i6876.079920 fatcat:ibmjkbpcwzfnrkjbrqj3s65l2q
С. 58 -65.ALGORITHMIC MAINTENANCE OF WKS SUPPORT FOR VOLUME SCHEDULING IN PIPE PRODUCTION БИБЛИОГРАФИЧЕСКИЙ СПИСОК 1. Жирнов В.И. ... V . 59. N . 7, pp. 498-503. ...doi:10.17073/0368-0797-2016-7-504-509 fatcat:sdo7rhao4fazziez4u7hi3uc3a
In this study, the accuracy of the engine dose calculation, collapsed cone convolution superposition algorithm (CCCS) used by Pinnacle 3 , was quantified by Monte Carlo simulations, ionization chamber, ... Lesions were < 3.0 cm in maximal diameter and < 27.0 cm 3 in volume. The Monte Carlo EGSnrc\BEAMnrc and EGS4\MCSIM were used in the comparison. ... Dose statistics for the planning target volumes of all of the patients are shown in Table 4 . ...doi:10.1120/jacmp.v13i3.3751 pmid:22584174 pmcid:PMC5716560 fatcat:hn5wre7amrgg5e24x24eacd7zu
Before the appearance of the volumes themselves, the algorithms will be prepublished in a series of supplements to the journal, ''Numerische Mathematik."" ... These introductory volumes are the only ones that will not be made up primarily of actual algorithms. ...
The algorithm is fast, able to represent the randomness of the material and to generate RVEs with any volume fraction, from 0 to its highest theoretical value, i.e. π 3 √ 2 ≈ 0.74 and π √ 3 6 ≈ 0.91 for ... It was concluded that the proposed algorithm can be used to generate statistically representative distributions of uniform particles. ... Analysis of a threedimensional point pattern with replication. Journal of the Royal Statistical Society. ...doi:10.1016/j.compstruct.2015.11.039 fatcat:uki3gymuwjgl5nilqp4uad2kia
A fast novel algorithm for salt and pepper image noise cancellation using cardinal B-splines. ... Nitin and Durg Singh Chauhan, Comparative Analysis of Traffic Patterns on k-ary n-tree using Adaptive Algorithms based on Burton Normal Form, Journal of Supercomputing, Springer, Volume 59, Number 2, Online ... Nitin and Durg Singh Chauhan, Stochastic Communication for Application Specific Networks-on-Chip, Journal of Supercomputing, Springer, Volume 59, Number 2, Online: September 2010, DOI: 10.1007/s11227-010 ...doi:10.2174/221032790302140505100253 fatcat:y6ttiopi3nb4nkurzuvdaj77ci
The objective function is to reduce the volume of concrete of the structure. ... For this, the Whale Optimization Algorithm (WOA) algorithm was used, an algorithm from the group of metaheuristic algorithms, which presents an easy computational implementation. ... Brito et alii, Frattura ed Integrità Strutturale, 59 (2022) 326-343; DOI: 10.3221/IGF-ESIS.59.22 The objective function consists in the minimization of the volume of the concrete of the structure, calculated ...doi:10.3221/igf-esis.59.22 fatcat:2pl745caijbw7faq6yro2a5hve
But here our research intends to demonstrate an overview of comparison between four different types of searching algorithms. ... Basically searching algorithms are used to search or find one or more than one element from a data set. Apparently there are a lot of searching algorithms. ... 99 11 72 9 10 23 59 99 11 72 9 10 23 59 99 11 72 9 10 23 59 99 11 72 9 10 23 59 99 11 72 9 10 23 59 99 11 72 9 Jump Search Algorithm is a relatively new algorithm ...doi:10.22214/ijraset.2021.33614 fatcat:qnbeqwuypvhbta46gzusxj7q3y
Implementation results of the system are secure patient records report for health department. Patient records must be secure for particular department. ... ElGamal encryption and RSA algorithm is made before storing mails to mail server. ElGamal decryption and RSA decryption is made after retrieving mails from mail server. ... All Rights Reserved Journal of Networking, Computer Security and Engineering Volume 4 Issue 1 (b) Elgamal Encryption The encryption algorithm works as follows: to encrypt a message to receiver ...doi:10.5281/zenodo.2917893 fatcat:hgozthlhkfa77hou2pgcbm7f44
The fourth edition of the annual Journal of Global Optimization (JOGO) Best Paper Award, which consists of $1000 and a certificate, considered papers published in 2014 issues of JOGO. ... Two rounds of voting yielded three clear favorites with nearly identical level of support by the committee. ... (volume 59, pages 243-258). Abstract. ...doi:10.1007/s10898-015-0385-1 fatcat:5wpx2gljmzdkvgaj6geyyt73a4
The volume V of an ovoid is as follows: ... The particle girths 2R4 ranged from 0.47D59 to 1.67D 59, where Ds is the volume-weighted median girth. The sphere assembly had about the same distribution of particle diameters. ...
(1) 1-8 (2) 191-205 (1) 91-107 (2) 221-231 (2) 181-189 (2) 245-252 (2) 207-220 (1) 39-48 (3) 295-328 (2) 181-189 (3) 253-284 Author Index to Volume 59 (1995) (The issue number is given in front of the ... Tveito, Approximation of scattered data using smooth grid functions Ariel, P.D., A numerical algorithm for computing the stagnation point flow of a second grade fluid with/without suction Baker Jr, G.A ...doi:10.1016/0377-0427(95)90073-x fatcat:qqipgaaxebhx7f22zdxxzuxpqa
Çağdaş Tıp Dergisi
The cause of that may be the difference between communities and/or the differences between the versions of the algorithms. ... ±9 67±6 74±9 67±8 75±14 SVEDV (ml) 62±22 57±17 75±23 91±17 59±17 64±19 59±23 SVESV (ml) 21±13 19±11 27±14 31±11 17±10 21±11 17±13 ... Conflict of Interest: There are no relevant conflicts of interest to disclose. ...doi:10.16899/gopctd.435461 fatcat:qlfflkl5ubbftiwdpj5lwrlpiy
It applies the LOF algorithm to detect the outlier degree of transaction data at each time period, sets the initial threshold to detect outliers, deletes the outliers, and then performs SAX detection on ... If it does not pass the test, then it will gradually expand the outlying domain and repeat the above process to optimize the outlier threshold to improve the sensitivity of detection algorithm and reduce ... 0:00 -7:54 7:54 -20:36 20:36 -23:59 Non-workdays 0:00 -7:58 7:58 -20:30 20:30 -23:59 Table 3 . 3 Abnormality threshold of all factors. ...doi:10.4236/am.2018.96049 fatcat:c5wb5bgbbrd3lacejsc56xnn7i
The technique of stripping off the inactive hull after Adaptive and Percentage Thresholding considerably reduces the contribution of the partial volume effect, thus minimizing the underestimate, which ... The aim of this work is to investigate the TrueX reconstruction algorithm and to compare different PET reconstruction algorithms (2D OSEM and 3D OSEM) using a phantom with non-spherical objects. ... 4 59 2 0.7 11 59 2 5.6 16 59 2 11.9 24 59 3 26.7 34 59 3 53.6 44 59 3 89.7 64 59 3 189.8 TABLE 3 DIFFERENT 3 RATIOS FOR ACTIVITY CONCENTRATION foreground A/V ...doi:10.5963/lsmr0502001 fatcat:hac2xalr4fes7ajtozx3emluia
« Previous Showing results 1 — 15 out of 322,894 results