Advanced Search
Displaying 41-50 on page 5 of 775. Per Page  

Articles / Online

  • Main Path Analysis to Filter Unbiased Literature
  • Abstract Citations are references used by researchers to recognize the contributions of researchers in their articles. Citations can be used to discover hidden patterns in the research domain, and can also be used to perform various analyses in data mining. Citation analysis is a quantitative method to identify knowledge dissemination and influence papers in any research area. Citation analysis involves multiple techniques. One of the most commonly used techniques is Main Path Analysis (MPA). According to the specific use of MPA, it has evolved into various variants. Currently, MPA is carried out in different domains, but deep learning in the field…
  • More
  •   Views:168       Downloads:82        Download PDF
  • Deformation Expression of Soft Tissue Based on BP Neural Network
  • Abstract This paper proposes a soft tissue grasping deformation model, where BP neural network optimized by the genetic algorithm is used to realize the real-time and accurate interaction of soft tissue grasping during virtual surgery. In the model, the soft tissue epidermis is divided into meshes, and the meshes generate displacements under the action of tension. The relationship between the tension and displacement of the mesh is determined by the proposed cylindrical spiral spring model. The optimized BP neural network is trained based on the sample data of the mesh point and vertical tension, so as to obtain the force and…
  • More
  •   Views:119       Downloads:70        Download PDF
  • Process Optimization Method for Day Ward Based on Bayesian Decision-Tree
  • Abstract The day surgery management mode is mainly decentralized management, with clinical departments as the unit, and with reference to the experience of inter project operation management in benchmark hospitals, the empirical management is implemented. With the development of day surgery, the extensive decentralized management mode has been unable to meet the needs of the current day surgery development situation. At first, the paper carefully analyzes the existing problems in the day surgery process in the day ward of the Children’s Hospital of Nanjing Medical University. And then, the concerns of doctors, nurses, anesthesiologists and other hospital staff in day ward,…
  • More
  •   Views:161       Downloads:95        Download PDF
  • A Design Framework for Smart Ration Shop Using Blockchain and IoT Technologies
  • Abstract The Public Distribution System (PDS) distributes the subsidized food and non-food items to poor populations through fair price shops (FPS). The PDS has been criticized for its urban bias and its failure to serve the underprivileged sections of the community effectively. The Current system manual-based data management and ledger management gives rise to much corruption in the process of extricating the poor from those who are less needy. There are chances for the block market because of the current methodology of data management. This article proposes a blockchain technology-based smart ration shop system that uses immutable smart contract-based transactions to…
  • More
  •   Views:320       Downloads:118        Download PDF
  • Fully Authentication Services Scheme for NFC Mobile Payment Systems
  • Abstract One commonly used wireless communication technology is Near-Field Communication (NFC). Smartphones that support this technology are used in contactless payment systems as identification devices to emulate credit cards. This technology has essentially focused on the quality of communication services and has somewhat disregarded security services. Communication messages between smartphones, the point of sale (POS), and service providers are susceptible to attack due to existing weaknesses, including that an adversary can access, block and modify the transmitted messages to achieve illegal goals. Therefore, there have been many research proposals in regards to authentication schemes for NFC communications in order to prevent…
  • More
  •   Views:416       Downloads:134        Download PDF
  • A Morphological Image Segmentation Algorithm for Circular Overlapping Cells
  • Abstract Cell segmentation is an important topic in medicine. A cell image segmentation algorithm based on morphology is proposed. First, some morphological operations, including top-hat transformation, bot-hat transformation, erosion operation, dilation operation, opening operation, closing operation, majority operation, skeleton operation, etc., are applied to remove noise or enhance cell images. Then the small blocks in the cell image are deleted as noise, the medium blocks are removed and saved as normal cells, and the large blocks are segmented as overlapping cells. Each point on the edge of the overlapping cell area to be divided is careful checked. If the shape of…
  • More
  •   Views:176       Downloads:104        Download PDF
  • Analysis of Inventory Model for Quadratic Demand with Three Levels of Production
  • Abstract The inventory framework is one of the standards of activity research fundamentals in ventures and business endeavors. Production planning includes all building production plans, including organizing and appointing exercises to every individual, gathering individuals or machines, and mastering work orders in every work environment. Production booking should take care of all issues, for example, limiting client standby time and production time; and viably utilizing the undertaking’s HR. This paper considered three degrees of a production inventory model for a consistent deterioration rate. This model assumes a significant part in the production of the board and assembling units. Request rate is…
  • More
  •   Views:227       Downloads:120        Download PDF
  • A Multi-Simplex Imperialist Competitive Paradigm for Solving Nonlinear Physical Systems
  • Abstract This paper proposes a novel gradient free multi-simplex topology fabric aided imperialist competitive algorithm (ICA) for solving nonlinear systems of algebraic equations by transforming them to equivalent global optimization problems. The high dependence of traditional gradient based solvers of such systems on initial guesses and the Jacobeans resulting in false convergence is the main motivation behind the present work. The present work provides a mechanism for enhancing exploitation powers of imperialist search phase of the algorithm and hence improves the convergence speed. The variants emerging from the proposed approach are applied to diverse nonlinear systems arising in different scientific areas…
  • More
  •   Views:195       Downloads:117        Download PDF
  • Massive MIMO Codebook Design Using Gaussian Mixture Model Based Clustering
  • Abstract The codebook design is the most essential core technique in constrained feedback massive multi-input multi-output (MIMO) system communications. MIMO vectors have been generally isotropic or evenly distributed in traditional codebook designs. In this paper, Gaussian mixture model (GMM) based clustering codebook design is proposed, which is inspired by the strong classification and analytical abilities of clustering techniques. Huge quantities of channel state information (CSI) are initially saved as entry data of the clustering process. Further, split into N number of clusters based on the shortest distance. The centroids part of clustering has been utilized for constructing a codebook with statistic…
  • More
  •   Views:182       Downloads:116        Download PDF
  • Scrambling Based Riffle Shift on Stego-Image to Channelize the Ensured Data
  • Abstract In recent years information hiding has got much attention as it acts as an alternate option for secured communication. The Secret content would get imbedded with the image using various possible image embodiment techniques, in which the Least Significant Bit (LSB) substitution is one of the preferred content embodiment strategy; however, asserting the quality and the originality of the content embedded image (stego) is yet a grievous concern in the field of Information Security. In this article, a proficient Scrambling Based Haar Wavelet Transform (SBHWT) approach has been sought to ensure the novelty of the stego-image that supports the safe…
  • More
  •   Views:170       Downloads:116        Download PDF
Displaying 41-50 on page 5 of 775. Per Page