-
1521
Enhancing Drought Forecast Accuracy Through Informer Model Optimization
Published 2025-01-01Get full text
Article -
1522
-
1523
Prediction of Quality Food Sale in Mart Using the AI-Based TOR Method
Published 2022-01-01“…“The golden highways of the technological route serve as the ultimate metaphor for the society of artificial intelligence,” explains the author of this present excursion. …”
Get full text
Article -
1524
-
1525
-
1526
Motion Intention Analysis-Based Coordinated Control for Amputee-Prosthesis Interaction
Published 2010-01-01Get full text
Article -
1527
-
1528
Efficient Hyperspectral Video Reconstruction via Dual-Channel DMD Encoding
Published 2025-01-01Get full text
Article -
1529
Ship Formation and Route Optimization Design Based on Improved PSO and D-P Algorithm
Published 2025-01-01Get full text
Article -
1530
LittleFaceNet: A Small-Sized Face Recognition Method Based on RetinaFace and AdaFace
Published 2025-01-01Get full text
Article -
1531
EMFF-Net: Edge-Enhancement Multi-Scale Feature Fusion Network
Published 2025-01-01Get full text
Article -
1532
Anomaly Detection for Time Series with Difference Rate Sample Entropy and Generative Adversarial Networks
Published 2021-01-01Get full text
Article -
1533
A pediatric emergency prediction model using natural language process in the pediatric emergency department
Published 2025-01-01Get full text
Article -
1534
Breast mass lesion area detection method based on an improved YOLOv8 model
Published 2024-10-01Get full text
Article -
1535
Deep weighted survival neural networks to survival risk prediction
Published 2024-11-01Get full text
Article -
1536
-
1537
Combinatorial and Multinomial Coefficients and its Computing Techniques for Machine Learning and Cybersecurity
Published 2022-09-01“… Mathematical and combinatorial techniques with nonnegative integers are used as computing algorithms for the programs development to apply in artificial intelligence and cybersecurity. Methodological advances in combinatorics and mathematics play a vital role in artificial intelligence and machine learning for data analysis and artificial intelligence-based cybersecurity for protection of the computing systems, devices, networks, programs and data from cyber-attacks. …”
Get full text
Article -
1538
-
1539
Bio-Inspired Control of an Arm Exoskeleton Joint with Active-Compliant Actuation System
Published 2009-01-01Get full text
Article -
1540
Exploring the Side-Information Fusion for Sequential Recommendation
Published 2025-01-01Get full text
Article