Zobrazeno 1 - 10
of 2 212
pro vyhledávání: '"hidden markov model (hmm)"'
Publikováno v:
International Journal of Digital Earth, Vol 17, Iss 1 (2024)
ABSTRACTAiming at the inherent “labeling bias” problem of Hidden Markov Models (HMMs) in the process of low-frequency sampling rate GPS trajectory map matching, this paper proposes a map matching method that combines HMMs and Conditional Random F
Externí odkaz:
https://doaj.org/article/3f5280f62df646678ea47ef938f14761
Autor:
Annie Jose, Srinivas Yasala
Publikováno v:
Water Practice and Technology, Vol 19, Iss 6, Pp 2364-2375 (2024)
Groundwater quality is vital for public health and environmental sustainability. As managing large datasets is challenging for traditional methods, this study combines the hidden Markov model (HMM) and the artificial neural network (ANN), a machine l
Externí odkaz:
https://doaj.org/article/1b5d7d2913ac425cbae2a6ebacf7bf4a
Autor:
Amel Salem Omer, Abera Dibaba Tufa, Tsegamlak Terefe Debella, Dereje Hailemariam Woldegebreal
Publikováno v:
e-Prime: Advances in Electrical Engineering, Electronics and Energy, Vol 9, Iss , Pp 100742- (2024)
The ubiquitous deployment of Fourth-generation (4G) and Fifth-generation (5G) networks, while expanding user connectivity over a larger geographic area, presents significant challenges for mobile network management. The surge in connected devices inc
Externí odkaz:
https://doaj.org/article/72b303110f6c40f0a5cc784fbd8695c2
Autor:
Gaël de Rocquigny, Clément Dubost, Pierre Humbert, Laurent Oudre, Christophe Labourdette, Nicolas Vayatis, Jean-Pierre Tourtier, Pierre-Paul Vidal
Publikováno v:
Frontiers in Anesthesiology, Vol 3 (2024)
BackgroundPrecise monitoring of the Depth of Anesthesia (DoA) is essential to prevent intra-operative awareness (in case of underdosage) or increased post-operative morbi-mortality (in case of overdosage). The recording of a high- frequency multimoda
Externí odkaz:
https://doaj.org/article/2a7eebcf228246b98023ba0e3d49eb58
Publikováno v:
IEEE Access, Vol 12, Pp 123049-123070 (2024)
In the software defined network (SDN)/network function virtualization (NFV)-enabled networks, service function chains (SFCs) should typically be allocated to deploy these services, which not only entails meeting the service’s Quality of Service (Qo
Externí odkaz:
https://doaj.org/article/0996aaef91af40ca8ee422519f42651e
Publikováno v:
IEEE Access, Vol 12, Pp 89845-89855 (2024)
Experts have been researching different types of gait since the 19-century. The way people walk can give a myriad of clues as to the health of a person. Abnormal gait detection might help protect senior people from injury and reveal underlying health
Externí odkaz:
https://doaj.org/article/1e4bad4854fd48bcbbcbd5e2d903c0da
Publikováno v:
Animals, Vol 14, Iss 18, p 2707 (2024)
The Galapagos Marine Reserve is vital for cetaceans, serving as both a stopover and residency site. However, blue whales, occasionally sighted here, exhibit poorly understood migratory behavior within the Galapagos and the broader Eastern Tropical Pa
Externí odkaz:
https://doaj.org/article/3b50bc05eeaf439ea88bb486dc7a0a7f
Publikováno v:
Information, Vol 15, Iss 9, p 578 (2024)
Semantic ontologies have been widely utilized as crucial tools within natural language processing, underpinning applications such as knowledge extraction, question answering, machine translation, text comprehension, information retrieval, and text su
Externí odkaz:
https://doaj.org/article/9679569097324f95a4cee85ad093bcd9
Publikováno v:
Journal of Marine Science and Engineering, Vol 12, Iss 7, p 1129 (2024)
The remote control ship is considered to be the most likely implementation of maritime autonomous surface ships (MASS) in the near-term future. With collaborative control from onboard controllers and operators ashore, ships may operate in three navig
Externí odkaz:
https://doaj.org/article/453d869ba4924ef9b5c4d8b0ac681c30
Publikováno v:
Cryptography, Vol 8, Iss 2, p 22 (2024)
As more network communication is encrypted to provide data privacy for users, attackers are focusing their attention on traffic analysis methods for side-channel attacks on user privacy. These attacks exploit patterns in particular features of commun
Externí odkaz:
https://doaj.org/article/736c04d4a1554dec96f440312a0f2032