期刊文献+
共找到62篇文章
< 1 2 4 >
每页显示 20 50 100
A Machine-Learning Approach for the Prediction of Fly-Ash Concrete Strength
1
作者 Shanqing Shao Aimin Gong +4 位作者 Ran Wang Xiaoshuang Chen Jing Xu Fulai Wang Feipeng Liu 《Fluid Dynamics & Materials Processing》 EI 2023年第12期3007-3019,共13页
The composite exciter and the CaO to Na_(2)SO_(4) dosing ratios are known to have a strong impact on the mechanical strength offly-ash concrete.In the present study a hybrid approach relying on experiments and a machi... The composite exciter and the CaO to Na_(2)SO_(4) dosing ratios are known to have a strong impact on the mechanical strength offly-ash concrete.In the present study a hybrid approach relying on experiments and a machine-learn-ing technique has been used to tackle this problem.The tests have shown that the optimal admixture of CaO and Na_(2)SO_(4) alone is 8%.The best 3D mechanical strength offly-ash concrete is achieved at 8%of the compound activator;If the 28-day mechanical strength is considered,then,the best performances are obtained at 4%of the compound activator.Moreover,the 3D mechanical strength offly-ash concrete is better when the dosing ratio of CaO to Na_(2)SO_(4) in the compound activator is 1:1;the maximum strength offly-ash concrete at 28-day can be achieved for a 1:1 ratio of CaO to Na_(2)SO_(4) by considering a 4%compound activator.In this case,the compressive andflexural strengths are 260 MPa and 53.6 MPa,respectively;the mechanical strength offly-ash concrete at 28-day can be improved by a 4:1 ratio of CaO to Na_(2)SO_(4) by considering 8%and 12%compound excitants.It is shown that the predictions based on the aforementioned machine-learning approach are accurate and reliable. 展开更多
关键词 Fly ash compound activator machine-learning approach
下载PDF
Clothing Sales Forecast Considering Weather Information: An Empirical Study in Brick-and-Mortar Stores by Machine-Learning
2
作者 Jieni Lv Shuguang Han Jueliang Hu 《Journal of Textile Science and Technology》 2023年第1期1-19,共19页
Reliable sales forecasts are important to the garment industry. In recent years, the global climate is warming, the weather changes frequently, and clothing sales are affected by weather fluctuations. The purpose of t... Reliable sales forecasts are important to the garment industry. In recent years, the global climate is warming, the weather changes frequently, and clothing sales are affected by weather fluctuations. The purpose of this study is to investigate whether weather data can improve the accuracy of product sales and to establish a corresponding clothing sales forecasting model. This model uses the basic attributes of clothing product data, historical sales data, and weather data. It is based on a random forest, XGB, and GBDT adopting a stacking strategy. We found that weather information is not useful for basic clothing sales forecasts, but it did improve the accuracy of seasonal clothing sales forecasts. The MSE of the dresses, down jackets, and shirts are reduced by 86.03%, 80.14%, and 41.49% on average. In addition, we found that the stacking strategy model outperformed the voting strategy model, with an average MSE reduction of 49.28%. Clothing managers can use this model to forecast their sales when they make sales plans based on weather information. 展开更多
关键词 Clothing Retail Sales Forecasting Weather machine-learning Stacking
下载PDF
Compared Insights on Machine-Learning Anomaly Detection for Process Control Feature 被引量:1
3
作者 Ming Wan Quanliang Li +3 位作者 Jiangyuan Yao Yan Song Yang Liu Yuxin Wan 《Computers, Materials & Continua》 SCIE EI 2022年第11期4033-4049,共17页
Anomaly detection is becoming increasingly significant in industrial cyber security,and different machine-learning algorithms have been generally acknowledged as various effective intrusion detection engines to succes... Anomaly detection is becoming increasingly significant in industrial cyber security,and different machine-learning algorithms have been generally acknowledged as various effective intrusion detection engines to successfully identify cyber attacks.However,different machine-learning algorithms may exhibit their own detection effects even if they analyze the same feature samples.As a sequence,after developing one feature generation approach,the most effective and applicable detection engines should be desperately selected by comparing distinct properties of each machine-learning algorithm.Based on process control features generated by directed function transition diagrams,this paper introduces five different machine-learning algorithms as alternative detection engines to discuss their matching abilities.Furthermore,this paper not only describes some qualitative properties to compare their advantages and disadvantages,but also gives an in-depth and meticulous research on their detection accuracies and consuming time.In the verified experiments,two attack models and four different attack intensities are defined to facilitate all quantitative comparisons,and the impacts of detection accuracy caused by the feature parameter are also comparatively analyzed.All experimental results can clearly explain that SVM(Support Vector Machine)and WNN(Wavelet Neural Network)are suggested as two applicable detection engines under differing cases. 展开更多
关键词 Anomaly detection machine-learning algorithm process control feature qualitative and quantitative comparisons
下载PDF
Machine-learning-assisted prediction of surgical outcomes in patients undergoing gastrectomy
4
作者 Sheng Lu Min Yan +3 位作者 Chen Li Chao Yan Zhenggang Zhu Wencong Lu 《Chinese Journal of Cancer Research》 SCIE CAS CSCD 2019年第5期797-805,共9页
Objective: Postoperative complications adversely affected the prognosis in patients with gastric cancer. This study intends to investigate the feasibility of using machine-learning model to predict surgical outcomes i... Objective: Postoperative complications adversely affected the prognosis in patients with gastric cancer. This study intends to investigate the feasibility of using machine-learning model to predict surgical outcomes in patients undergoing gastrectomy.Methods: In this study, cancer patients who underwent gastrectomy at Shanghai Rui Jin Hospital in 2017 were randomly assigned to a development or validation cohort in a 9:1 ratio. A support vector classification(SVC) model to predict surgical outcomes in patients undergoing gastrectomy was developed and further validated.Results: A total of 321 patients with 32 features were collected. The positive and negative outcomes of postoperative complication after gastrectomy appeared in 100(31.2%) and 221(68.8%) patients, respectively. The SVC model was constructed to predict surgical outcomes in patients undergoing gastrectomy. The accuracy of 10-fold cross validation and external verification was 78.17% and 78.12%, respectively. Further, an online web server has been developed to share the SVC model for machine-learning-assisted prediction of surgical outcomes in patients undergoing gastrectomy in the future procedures, which is accessible at the web address:http://47.100.47.97:5005/r_model_prediction.Conclusions: The SVC model was a useful predictor for measuring the risk of postoperative complications after gastrectomy, which may help stratify patients with different overall status for choice of surgical procedure or other treatments. It can be expected that machine-learning models in cancer informatics research are possibly shareable and accessible via web address all over the world. 展开更多
关键词 GASTRIC cancer POSTOPERATIVE COMPLICATIONS machine-learning models support VECTOR classification
下载PDF
Different types of drug abusers prefrontal cortex activation patterns and based on machine-learning classification
5
作者 Banghua Yang Xuelin Gu +3 位作者 Shouwei Gao Lin Feng Yan Ding Xu Wen Wang 《Journal of Innovative Optical Health Sciences》 SCIE EI CAS 2022年第2期83-92,共10页
Drug addiction can cause abnormal brain activation changes,which are the root cause of drug craving and brain function errors.This study enrolled drug abusers to determine the effects of different drugs on brain activ... Drug addiction can cause abnormal brain activation changes,which are the root cause of drug craving and brain function errors.This study enrolled drug abusers to determine the effects of different drugs on brain activation.A functional near-infrared spectroscopy(fNIRS)device was used for the research.This study was designed with an experimental paradigm that included the induction of resting and drug addiction cravings.We collected the fNIRS data of 30 drug users,including 10 who used heroin,10 who used Methamphetamine,and 10 who used mixed drugs.First,using Statistical Analysis,the study analyzed the activations of eight functional areas of the left and right hemispheres of the prefrontal cortex of drug addicts who respectively used heroin,Methamphetamine,and mixed drugs,including Left/Right-Dorsolateral prefrontal cortex(L/R-DLPFC),Left/Right-Ventrolateral prefrontal cortex(L/R-VLPFC),Left/Right-Fronto-polar prefrontal cortex(L/R-FPC),and Left/Right Orbitofrontal Cortex(L/R-OFC).Second,referencing the degrees of activation of oxyhaemoglobin concentration(HbO2),the study made an analysis and got the specific activation patterns of each group of the addicts.Finally,after taking out data which are related to the addicts who recorded high degrees of activation among the three groups of addicts,and which had the same channel numbers,the paper classified the different drug abusers using the data as the input data for Convolutional Neural Networks(CNNs).The average three-class accuracy is 67.13%.It is of great significance for the analysis of brain function errors and personalized rehabilitation. 展开更多
关键词 Drug addiction FNIRS machine-learning di®erent drug users brain regions activation
下载PDF
CNN Channel Attention Intrusion Detection SystemUsing NSL-KDD Dataset
6
作者 Fatma S.Alrayes Mohammed Zakariah +2 位作者 Syed Umar Amin Zafar Iqbal Khan Jehad Saad Alqurni 《Computers, Materials & Continua》 SCIE EI 2024年第6期4319-4347,共29页
Intrusion detection systems(IDS)are essential in the field of cybersecurity because they protect networks from a wide range of online threats.The goal of this research is to meet the urgent need for small-footprint,hi... Intrusion detection systems(IDS)are essential in the field of cybersecurity because they protect networks from a wide range of online threats.The goal of this research is to meet the urgent need for small-footprint,highly-adaptable Network Intrusion Detection Systems(NIDS)that can identify anomalies.The NSL-KDD dataset is used in the study;it is a sizable collection comprising 43 variables with the label’s“attack”and“level.”It proposes a novel approach to intrusion detection based on the combination of channel attention and convolutional neural networks(CNN).Furthermore,this dataset makes it easier to conduct a thorough assessment of the suggested intrusion detection strategy.Furthermore,maintaining operating efficiency while improving detection accuracy is the primary goal of this work.Moreover,typical NIDS examines both risky and typical behavior using a variety of techniques.On the NSL-KDD dataset,our CNN-based approach achieves an astounding 99.728%accuracy rate when paired with channel attention.Compared to previous approaches such as ensemble learning,CNN,RBM(Boltzmann machine),ANN,hybrid auto-encoders with CNN,MCNN,and ANN,and adaptive algorithms,our solution significantly improves intrusion detection performance.Moreover,the results highlight the effectiveness of our suggested method in improving intrusion detection precision,signifying a noteworthy advancement in this field.Subsequent efforts will focus on strengthening and expanding our approach in order to counteract growing cyberthreats and adjust to changing network circumstances. 展开更多
关键词 Intrusion detection system(IDS) NSL-KDD dataset deep-learning machine-learning CNN channel Attention network security
下载PDF
Machine-learning based landslide susceptibility modelling with emphasis on uncertainty analysis 被引量:3
7
作者 A.L.Achu C.D.Aju +4 位作者 Mariano Di Napoli Pranav Prakash Girish Gopinath E.Shaji Vinod Chandra 《Geoscience Frontiers》 SCIE CAS CSCD 2023年第6期327-340,共14页
Landslide susceptibility maps are vital tools used by decision-makers to adopt mitigation strategies for future calamities.In this context,research on landslide susceptibility modelling has become a topic of relevance... Landslide susceptibility maps are vital tools used by decision-makers to adopt mitigation strategies for future calamities.In this context,research on landslide susceptibility modelling has become a topic of relevance and is in constant evolution.Though various machine-learning techniques(MLTs)have been identified for landslide susceptibility modelling,the uncertainty inherent in the models is rarely considered.The present study attempts to quantify the uncertainty associated with landslide prediction models by developing a new methodological framework based on the ensembles of the eight MLTs.This methodology has been tested at the highlands of the southern Western Ghats region(Kerala,India),where landslides have frequently been occurring.Fourteen landslide conditioning factors have been identified as part of this study,and their association was correlated with 671 historic landslides in the study area.The study used four ensemble models such as the mean of probabilities,the median of probabilities,the weighted mean of probabilities,and the committee average.The weighted mean of probability was proved to be the best model based on the average of 800 standalone MLTs,viz.,receiver operating characteristics,true skill statistics,and area under curve with corresponding validation scores.Thereafter,an uncertainty analysis was carried out on the coefficient of variation.A confident map was generated to represent the distinct zonation of landslide susceptibility areas with definite uncertainty scales.Nearly 74%of the past landslides fall in the higher susceptibility-low uncertainty category.It is also inferred that such micro-level zonation based on MLTs may improve the efficiency of landslide susceptibility maps and may help in accurately identifying landslide-prone areas in the future.The confident maps thus generated can be used as a ready reference to the planners for the formulation of landslide adaptation strategies at micro-scales. 展开更多
关键词 LANDSLIDES machine-learning Ensemble model KERALA INDIA
原文传递
A Machine Learning-Based Attack Detection and Prevention System in Vehicular Named Data Networking 被引量:1
8
作者 Arif Hussain Magsi Ali Ghulam +3 位作者 Saifullah Memon Khalid Javeed Musaed Alhussein Imad Rida 《Computers, Materials & Continua》 SCIE EI 2023年第11期1445-1465,共21页
Named Data Networking(NDN)is gaining a significant attention in Vehicular Ad-hoc Networks(VANET)due to its in-network content caching,name-based routing,and mobility-supporting characteristics.Nevertheless,existing ND... Named Data Networking(NDN)is gaining a significant attention in Vehicular Ad-hoc Networks(VANET)due to its in-network content caching,name-based routing,and mobility-supporting characteristics.Nevertheless,existing NDN faces three significant challenges,including security,privacy,and routing.In particular,security attacks,such as Content Poisoning Attacks(CPA),can jeopardize legitimate vehicles with malicious content.For instance,attacker host vehicles can serve consumers with invalid information,which has dire consequences,including road accidents.In such a situation,trust in the content-providing vehicles brings a new challenge.On the other hand,ensuring privacy and preventing unauthorized access in vehicular(VNDN)is another challenge.Moreover,NDN’s pull-based content retrieval mechanism is inefficient for delivering emergency messages in VNDN.In this connection,our contribution is threefold.Unlike existing rule-based reputation evaluation,we propose a Machine Learning(ML)-based reputation evaluation mechanism that identifies CPA attackers and legitimate nodes.Based on ML evaluation results,vehicles accept or discard served content.Secondly,we exploit a decentralized blockchain system to ensure vehicles’privacy by maintaining their information in a secure digital ledger.Finally,we improve the default routing mechanism of VNDN from pull to a push-based content dissemination using Publish-Subscribe(Pub-Sub)approach.We implemented and evaluated our ML-based classification model on a publicly accessible BurST-Asutralian dataset for Misbehavior Detection(BurST-ADMA).We used five(05)hybrid ML classifiers,including Logistic Regression,Decision Tree,K-Nearest Neighbors,Random Forest,and Gaussian Naive Bayes.The qualitative results indicate that Random Forest has achieved the highest average accuracy rate of 100%.Our proposed research offers the most accurate solution to detect CPA in VNDN for safe,secure,and reliable vehicle communication. 展开更多
关键词 Named data networking vehicular networks REPUTATION CACHING machine-learning
下载PDF
Low Complexity Detection Algorithms Based on ADMIN for Massive MIMO
9
作者 Shuchao Mi Jianyong Zhang +2 位作者 Fengju Fan Baorui Yan Muguang Wang 《China Communications》 SCIE CSCD 2023年第11期67-77,共11页
This paper proposes the alternating direction method of multipliers-based infinity-norm(ADMIN) with threshold(ADMIN-T) and with percentage(ADMIN-P) detection algorithms,which make full use of the distribution of the s... This paper proposes the alternating direction method of multipliers-based infinity-norm(ADMIN) with threshold(ADMIN-T) and with percentage(ADMIN-P) detection algorithms,which make full use of the distribution of the signal to interference plus noise ratio(SINR) for an uplink massive MIMO system.The ADMIN-T and ADMIN-P detection algorithms are improved visions of the ADMIN detection algorithm,in which an appropriate SINR threshold in the ADMIN-T detection algorithm and a certain percentage in the ADMIN-P detection algorithm are designed to reduce the overall computational complexity.The detected symbols are divided into two parts by the SINR threshold which is based on the cumulative probability density function(CDF) of SINR and a percentage,respectively.The symbols in higher SINR part are detected by MMSE.The interference of these symbols is then cancelled by successive interference cancellation(SIC).Afterwards the remaining symbols with low SINR are iteratively detected by ADMIN.The simulation results show that the ADMIIN-T and the ADMIN-P detection algorithms provide a significant performance gain compared with some recently proposed detection algorithms.In addition,the computational complexity of ADMIN-T and ADMIN-P are significantly reduced.Furthermore,in the case of same number of transceiver antennas,the proposed algorithms have a higher performance compared with the case of asymmetric transceiver antennas. 展开更多
关键词 ADMIN low complexity detection algo-rithm massive MIMO MMSE SINR
下载PDF
Bee Colony Optimization Algorithm for Routing and Wavelength Assignment Based on Directional Guidance in Satellite Optical Networks
10
作者 Mai Yang Qi Zhang +8 位作者 Haipeng Yao Ran Gao Xiangjun Xin Feng Tian Weiying Feng Dong Chen Fu Wang Qinghua Tian Jinxi Qian 《China Communications》 SCIE CSCD 2023年第7期89-107,共19页
With the development of satellite communication,in order to solve the problems of shortage of on-board resources and refinement of delay requirements to improve the communication performance of satellite optical netwo... With the development of satellite communication,in order to solve the problems of shortage of on-board resources and refinement of delay requirements to improve the communication performance of satellite optical networks,this paper proposes a bee colony optimization algorithm for routing and wavelength assignment based on directional guidance(DBCO-RWA)in satellite optical networks.In D-BCORWA,directional guidance based on relative position and link load is defined,and then the link cost function in the path search stage is established based on the directional guidance factor.Finally,feasible solutions are expanded in the global optimization stage.The wavelength utilization,communication success probability,blocking rate,communication hops and convergence characteristic are simulated.The results show that the performance of the proposed algorithm is improved compared with existing algorithms. 展开更多
关键词 routing and wavelength assignment satel-lite optical networks bee colony optimization algo-rithm directional guidance feasible solution extension
下载PDF
Genome-wide associations, polygenic risk, and Mendelian randomization reveal limited interactions between John Henryism and cynicism
11
作者 Richard R Chapleau 《World Journal of Medical Genetics》 2023年第2期8-20,共13页
BACKGROUND John Henryism(JH)is a strategy for dealing with chronic psychological stress characterized by high levels of physical effort and work.Cynicism is a belief that people are motivated primarily by self-interes... BACKGROUND John Henryism(JH)is a strategy for dealing with chronic psychological stress characterized by high levels of physical effort and work.Cynicism is a belief that people are motivated primarily by self-interest.High scores on the JH scale and cynicism measures correlate with an increased risk of cardiovascular disease.High cynicism is also a hallmark of burnout syndrome,another known risk factor for heart disease.AIM To evaluate possible interactions between JH and cynicism hoping to clarify risk factors of burnout.METHODS We analyzed genetic and psychological data available from the Database of Genotypes and Phenotypes for genome-wide associations with these traits.We split the total available samples and used plink to perform the association studies on the discovery set(n=1852,80%)and tested for replication using the validation set(n=465).We used scikit-learn to perform supervised machine learning for developing genetic risk algorithms.RESULTS We identified 2,727,and 204 genetic associations for scores on the JH,cynicism and cynical distrust(CD)scales,respectively.We also found 173 associations with high cynicism,109 with high CD,but no associations with high JH.We also produced polygenic classifiers for high cynicism using machine learning with areas under the receiver operator characteristics curve greater than 0.7.CONCLUSION We found significant genetic components to these traits but no evidence of an interaction.Therefore,while there may be a genetic risk,JH is not likely a burnout risk factor. 展开更多
关键词 CYNICISM Burnout syndrome John Henryism Genome-wide association study Polygenic risk score machine-learning
下载PDF
The 3x + 1 Conjecture, a Direct Path
12
作者 Salvador Bermúdez Gómez 《American Journal of Computational Mathematics》 2023年第2期350-355,共6页
The 3x + 1 problem, is a math problem that has baffled mathematicians for over 50 years. It’s easy to explain: take any positive number, if it’s even, divide it by 2;if it’s odd, multiply it by 3 and add 1. Repeat ... The 3x + 1 problem, is a math problem that has baffled mathematicians for over 50 years. It’s easy to explain: take any positive number, if it’s even, divide it by 2;if it’s odd, multiply it by 3 and add 1. Repeat this process with the resulting number, and the conjecture says that you will eventually reach 1. Despite testing all starting values up to an enormous number, no one has proved the conjecture is true for all possible starting values. The problem’s importance lies in its simplicity and difficulty, inspiring new ideas in mathematics and advancing fields like number theory, dynamical systems, and computer science. Proving or disproving the conjecture would revolutionize our understanding of math. The presence of infinite sequences is a matter of question. To investigate and solve this conjecture, we are utilizing a novel approach involving the fields of number theory and computer science. 展开更多
关键词 3x + 1 Collatz Solved Computer Science Number Theory New algo-rithm
下载PDF
A Comparative Analysis of the New -3(-n) - 1 Remer Conjecture and a Proof of the 3n + 1 Collatz Conjecture
13
作者 Mike Remer 《Journal of Applied Mathematics and Physics》 2023年第8期2216-2220,共5页
This scientific paper is a comparative analysis of two mathematical conjectures. The newly proposed -3(-n) - 1 Remer conjecture and how it is related to and a proof of the more well known 3n + 1 Collatz conjecture. An... This scientific paper is a comparative analysis of two mathematical conjectures. The newly proposed -3(-n) - 1 Remer conjecture and how it is related to and a proof of the more well known 3n + 1 Collatz conjecture. An overview of both conjectures and their respective iterative processes will be presented. Showcasing their unique properties and behavior to each other. Through a detailed comparison, we highlight the similarities and differences between these two conjectures and discuss their significance in the field of mathematics. And how they prove each other to be true. 展开更多
关键词 -3(-n) - 1 Remer Conjecture 3n + 1 Collatz Conjecture Comparative Analysis PROOF Natural Numbers Integer Sequences Factorial Processes Par-tial Differential Equations Bounded Values Collatz Conjecture Collatz algo-rithm Collatz Operator Collatz Compliance And Mathematical Conjectures
下载PDF
考虑阀点效应的电力系统经济分配算法 被引量:2
14
作者 何湘竹 黄继达 《计算机工程与应用》 CSCD 北大核心 2015年第20期227-233,共7页
经济分配(ED)对于电力系统的节能至关重要,适当的分配方法可以为电厂节约巨额生产成本,然而阀点效应使得实际ED问题呈现出不光滑和非凸的特性,导致一些经典的优化算法和启发式算法无法在合理时间内发现最优解。提出一种新的改进教与学... 经济分配(ED)对于电力系统的节能至关重要,适当的分配方法可以为电厂节约巨额生产成本,然而阀点效应使得实际ED问题呈现出不光滑和非凸的特性,导致一些经典的优化算法和启发式算法无法在合理时间内发现最优解。提出一种新的改进教与学优化算法来求解计及阀点效应的经济分配问题,并采用一种新的修正策略取代罚函数法来处理约束条件。为了验证新算法的有效性和鲁棒性,选取典型的benchmark函数和ED实例进行仿真计算,结果表明与其他代表性算法相比,该方法求解精度高、收敛速度快,为计及阀点效应的经济分配问题求解提供了一条新途径。 展开更多
关键词 电力系统 经济分配 阀点效应 改进的教与学优化算法 MODIFIED Teaching-Learning-Based Optimization algo-rithm(CTLBO)
下载PDF
Deep-learning classifier with ultrawide-field fundus ophthalmoscopy for detecting branch retinal vein occlusion 被引量:18
15
作者 Daisuke Nagasato Hitoshi Tabuchi +7 位作者 Hideharu Ohsugi Hiroki Masumoto Hiroki Enno Naofumi Ishitobi Tomoaki Sonobe Masahiro Kameoka Masanori Niki Yoshinori Mitamura 《International Journal of Ophthalmology(English edition)》 SCIE CAS 2019年第1期94-99,共6页
AIM: To investigate and compare the efficacy of two machine-learning technologies with deep-learning(DL) and support vector machine(SVM) for the detection of branch retinal vein occlusion(BRVO) using ultrawide-field f... AIM: To investigate and compare the efficacy of two machine-learning technologies with deep-learning(DL) and support vector machine(SVM) for the detection of branch retinal vein occlusion(BRVO) using ultrawide-field fundus images. METHODS: This study included 237 images from 236 patients with BRVO with a mean±standard deviation of age 66.3±10.6 y and 229 images from 176 non-BRVO healthy subjects with a mean age of 64.9±9.4 y. Training was conducted using a deep convolutional neural network using ultrawide-field fundus images to construct the DL model. The sensitivity, specificity, positive predictive value(PPV), negative predictive value(NPV) and area under the curve(AUC) were calculated to compare the diagnostic abilities of the DL and SVM models. RESULTS: For the DL model, the sensitivity, specificity, PPV, NPV and AUC for diagnosing BRVO was 94.0%(95%CI: 93.8%-98.8%), 97.0%(95%CI: 89.7%-96.4%), 96.5%(95%CI: 94.3%-98.7%), 93.2%(95%CI: 90.5%-96.0%) and 0.976(95%CI: 0.960-0.993), respectively. In contrast, for the SVM model, these values were 80.5%(95%CI: 77.8%-87.9%), 84.3%(95%CI: 75.8%-86.1%), 83.5%(95%CI: 78.4%-88.6%), 75.2%(95%CI: 72.1%-78.3%) and 0.857(95%CI: 0.811-0.903), respectively. The DL model outperformed the SVM model in all the aforementioned parameters(P<0.001). CONCLUSION: These results indicate that the combination of the DL model and ultrawide-field fundus ophthalmoscopy may distinguish between healthy and BRVO eyes with a high level of accuracy. The proposed combination may be used for automatically diagnosing BRVO in patients residing in remote areas lacking access to an ophthalmic medical center. 展开更多
关键词 automatic diagnosis branch retinal VEIN occlusion deep learning machine-learning technology ultrawide-field FUNDUS OPHTHALMOSCOPY
下载PDF
Data-mining and atmospheric corrosion resistance evaluation of Sn-and Sb-additional low alloy steel based on big data technology 被引量:8
16
作者 Xiaojia Yang Jike Yang +4 位作者 Ying Yang Qing Li Di Xu Xuequn Cheng Xiaogang Li 《International Journal of Minerals,Metallurgy and Materials》 SCIE EI CAS CSCD 2022年第4期825-835,共11页
Machine-learning and big data are among the latest approaches in corrosion research.The biggest challenge in corrosion research is to accurately predict how materials will degrade in a given environment.Corrosion big ... Machine-learning and big data are among the latest approaches in corrosion research.The biggest challenge in corrosion research is to accurately predict how materials will degrade in a given environment.Corrosion big data is the application of mathematical methods to huge amounts of data to find correlations and infer probabilities.It is possible to use corrosion big data method to distinguish the influence of the minimal changes of alloying elements and small differences in microstructure on corrosion resistance of low alloy steels.In this research,corrosion big data evaluation methods and machine learning were used to study the effect of Sb and Sn,as well as environmental factors on the corrosion behavior of low alloy steels.Results depict corrosion big data method can accurately identify the influence of various factors on corrosion resistance of low alloy and is an effective and promising way in corrosion research. 展开更多
关键词 machine-learning corrosion big data low alloy steels corrosion resistance
下载PDF
Is multi-hazard mapping effective in assessing natural hazards and integrated watershed management? 被引量:5
17
作者 Hamid Reza Pourghasemi Amiya Gayen +2 位作者 Mohsen Edalat Mehrdad Zarafshar John P.Tiefenbacher 《Geoscience Frontiers》 SCIE CAS CSCD 2020年第4期1203-1217,共15页
Natural hazards are often studied in isolation.However,there is a great need to examine hazards holistically to better manage the complex of threats found in any region.Many regions of the world have complex hazard la... Natural hazards are often studied in isolation.However,there is a great need to examine hazards holistically to better manage the complex of threats found in any region.Many regions of the world have complex hazard landscapes wherein risk from individual and/or multiple extreme events is omnipresent.Extensive parts of Iran experience a complex array of natural hazards-floods,earthquakes,landslides,forest fires,subsidence,and drought.The effectiveness of risk mitigation is in part a function of whether the complex of hazards can be collectively considered,visualized,and evaluated.This study develops and tests individual and collective multihazard risk maps for floods,landslides,and forest fires to visualize the spatial distribution of risk in Fars Province,southern Iran.To do this,two well-known machine-learning algorithms-SVM and MARS-are used to predict the distribution of these events.Past floods,landslides,and forest fires were surveyed and mapped.The locations of occurrence of these events(individually and collectively) were randomly separated into training(70%) and testing(30%) data sets.The conditioning factors(for floods,landslides,and forest fires) employed to model the risk distributions are aspect,elevation,drainage density,distance from faults,geology,LULC,profile curvature,annual mean rainfall,plan curvature,distance from man-made residential structures,distance from nearest river,distance from nearest road,slope gradient,soil types,mean annual temperature,and TWI.The outputs of the two models were assessed using receiver-operating-characteristic(ROC) curves,true-skill statistics(TSS),and the correlation and deviance values from each models for each hazard.The areas-under-the-curves(AUC) for the MARS model prediction were 76.0%,91.2%,and 90.1% for floods,landslides,and forest fires,respectively.Similarly,the AUCs for the SVM model were 75.5%,89.0%,and 91.5%.The TSS reveals that the MARS model was better able to predict landslide risk,but was less able to predict flood-risk patterns and forest-fire risk.Finally,the combination of flood,forest fire,and landslide risk maps yielded a multi-hazard susceptibility map for the province.The better predictive model indicated that 52.3% of the province was at-risk for at least one of these hazards.This multi-hazard map may yield valuable insight for land-use planning,sustainable development of infrastructure,and also integrated watershed management in Fars Province. 展开更多
关键词 Multi-hazard risk mapping Considering flood Landside and forest fire jointly machine-learning algorithms
下载PDF
Automatic segmentation of foveal avascular zone based on adaptive watershed algorithm in retinal optical coherence tomography angiography images 被引量:3
18
作者 Jian Liu Shixin Yan +9 位作者 Nan Lu Dongni Yang Chunhui Fan Hongyu Lv Shuanglian Wang in Zhu Yuqian Zhao Yi Wang Zhenhe Ma Yao Yu 《Journal of Innovative Optical Health Sciences》 SCIE EI CAS 2022年第1期77-89,共13页
The size and shape of the foveal avascular zone(FAZ)have a strong positive correlation with several vision-threatening ret inovascular diseases.The identification,segmentation and analysis of FAZ are of great signific... The size and shape of the foveal avascular zone(FAZ)have a strong positive correlation with several vision-threatening ret inovascular diseases.The identification,segmentation and analysis of FAZ are of great significance to clinical diagnosis and treatment.We presented an adaptive watershed algorithm to automatically extract F AZ from retinal optical coherence tomography angiography(OCTA)images.For the traditional watershed algorithm,"over-segmentation"is the most common problem.FAZ is often incorrectly divided into multiple regions by redundant"dams".This paper analyzed the relationship between the"dams"length and the maximum inscribed circle radius of FAZ,and proposed an adaptive watershed algorithm to solve the problem of"over-segmentation".Here,132 healthy retinal images and 50 diabetic retinopathy(DR)images were used to verify the accuracy and stability of the algorithm.Three ophthal-mologists were invited to make quan titative and qualitative evaluations on the segmentation results of this algorithm.The quantitative evaluation results show that the correlation coffi-cients between the automatic and manual segmentation results are 0.945(in healthy subjects)and 0.927(in DR patients),respectively.For qualitative evaluation,the percentages of"perfect segmentation"(score of 3)and"good segmentation"(score of 2)are 99.4%(in healthy subjects)and 98.7%(in DR patients),respectively.This work promotes the application of watershed algorithm in FAZ segmentation,making it a useful tool for analyzing and diagnosing eye diseases. 展开更多
关键词 Foveal avascular zone optical coherence tomography angiography watershed algo-rithm diabetic retinopathy.
下载PDF
Other Mountain Stones Can Attack Jade: The 5-Steps Rule 被引量:1
19
作者 Kuo-Chen Chou 《Natural Science》 2020年第3期59-64,共6页
Since the 5-steps rule was proposed in 2011, it has been widely used in many areas of molecular biology, both theoretical and experimental. It can be even used to deal with the commercial problems and bank systems, as... Since the 5-steps rule was proposed in 2011, it has been widely used in many areas of molecular biology, both theoretical and experimental. It can be even used to deal with the commercial problems and bank systems, as well as material science systems. Just like the machine-learning algorithms, it is the jade for nearly all the statistical systems. 展开更多
关键词 STONE and JADE 5-Steps RULE Molecular Biology Commercial and Material Science machine-learning algo-rithms
下载PDF
The chemical origin of temperature-dependent lithium-ion concerted diffusion in sulfide solid electrolyte Li_(10)GeP_(2)S_(12) 被引量:2
20
作者 Zhong-Heng Fu Xiang Chen +7 位作者 Nan Yao Xin Shen Xia-Xia Ma Shuai Feng Shuhao Wang Rui Zhang Linfeng Zhang Qiang Zhang 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2022年第7期59-66,I0003,共9页
Solid-state batteries have received increasing attention in scientific and industrial communities,which benefits from the intrinsically safe solid electrolytes(SEs).Although much effort has been devoted to designing S... Solid-state batteries have received increasing attention in scientific and industrial communities,which benefits from the intrinsically safe solid electrolytes(SEs).Although much effort has been devoted to designing SEs with high ionic conductivities,it is extremely difficult to fully understand the ionic diffusion mechanisms in SEs through conventional experimental and theoretical methods.Herein,the temperature-dependent concerted diffusion mechanism of ions in SEs is explored through machinelearning molecular dynamics,taking Li_(10)GeP_(2)S_(12) as a prototype.Weaker diffusion anisotropy,more disordered Li distributions,and shorter residence time are observed at a higher temperature.Arrhenius-type temperature dependence is maintained within a wide temperature range,which is attributed to the linear temperature dependence of jump frequencies of various concerted diffusion modes.These results provide a theoretical framework to understand the ionic diffusion mechanisms in SEs and deepen the understanding of the chemical origin of temperature-dependent concerted diffusions in SEs. 展开更多
关键词 Solid-state batteries Solid electrolytes Concerted diffusion machine-learning molecular dynamics
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部