Showing 61,641 - 61,660 results of 64,539 for search '"algorithm"', query time: 0.31s Refine Results
  1. 61641

    Psychosocial risk factors among young people of medium urban Siberian city: a gender aspect (according to a cross-sectional epidemiological study) by E. V. Akimova, M. Y. Akimov, E. I. Gakova, M. M. Kayumova, V. V. Gafarov, V. A. Kuznetsov

    Published 2019-12-01
    “…The PSF examination was carried out according to the algorithms of the WHO MONICA-Psychosocial Program.Results. …”
    Get full text
    Article
  2. 61642

    Conic curve encryption and digital signature based on complex number theory for cybersecurity applications by Ahmed Kamal, H. A. El-Kamchochi, Adel El-Fahar, Esam A. A. Hagras

    Published 2025-07-01
    “…Abstract Secure image transmission requires robust algorithms to ensure authentication, integrity, non-repudiation, and confidentiality. …”
    Get full text
    Article
  3. 61643

    Repeatability of carbon dioxide and methane emissions and oxygen consumption by forage-consuming beef heifers by M.D. MacNeil, R.C. Waterman

    Published 2025-04-01
    “…Data were uploaded to a server, and proprietary algorithms were used to calculate CH4 and CO2 emission and O2 consumption of the heifers. …”
    Get full text
    Article
  4. 61644

    An Improved Tree Crown Delineation Method Based on a Gradient Feature-Driven Expansion Process Using Airborne LiDAR Data by Jiaxuan Jia, Lei Zhang, Kai Yin, Uwe Sörgel

    Published 2025-01-01
    “…However, the accuracy of current existing algorithms is limited due to the influence of understory vegetation and variations in tree crown geometry (e.g., the delineated crown boundaries consistently extend beyond their actual boundaries). …”
    Get full text
    Article
  5. 61645

    A mechanism for the emergence of low-dimensional structures in brain dynamics by Claudio Runfola, Spase Petkoski, Hiba Sheheitli, Christophe Bernard, Anthony R. McIntosh, Viktor Jirsa

    Published 2025-04-01
    “…These range from linear algorithms to more intricate non-linear methods for manifold extraction. …”
    Get full text
    Article
  6. 61646

    Leveraging machine learning techniques to analyze nutritional content in processed foods by K. A. Muthukumar, Soumya Gupta, Doli Saikia

    Published 2024-12-01
    “…After data preprocessing, two primary machine learning algorithms were employed: Support Vector Regression (SVR) and Random Forest (RF), both implemented using Scikit-learn. …”
    Get full text
    Article
  7. 61647

    Multi-Temporal Assessment of Soil Erosion After a Wildfire in Tuscany (Central Italy) Using Google Earth Engine by Francesco Barbadori, Pierluigi Confuorto, Bhushan Chouksey, Sandro Moretti, Federico Raspini

    Published 2024-11-01
    “…The results suggest the need to plan mitigation strategies towards reducing soil erodibility, directly and indirectly, with a continuous monitoring of erosion rates and the application of machine learning algorithms to thoroughly understand the relationships between variables.…”
    Get full text
    Article
  8. 61648

    Anomaly Detection Dataset for Industrial Control Systems by Alireza Dehlaghi-Ghadim, Mahshid Helali Moghadam, Ali Balador, Hans Hansson

    Published 2023-01-01
    “…Using Machine Learning (ML) for Intrusion Detection Systems (IDS) is a promising approach for ICS cyber protection, but the lack of suitable datasets for evaluating ML algorithms is a challenge. Although a few commonly used datasets may not reflect realistic ICS network data, lack necessary features for effective anomaly detection, or be outdated. …”
    Get full text
    Article
  9. 61649

    ASAD: A Meta Learning-Based Auto-Selective Approach and Tool for Anomaly Detection by Nadia Rashid, Rashid Mehmood, Fahad Alqurashi, Saad Alqahtany, Juan M. Corchado

    Published 2025-01-01
    “…It is trained using 139 datasets built upon 60 base datasets from 11 diverse domains (finance, healthcare, network security) and 80 ML and DL models composed of 22 base anomaly detection algorithms. It uses meta-features and correlation functions to evaluate 300 features. …”
    Get full text
    Article
  10. 61650

    Embracing or rejecting AI? A mixed-method study on undergraduate students’ perceptions of artificial intelligence at a private university in China by Yifu Li, Nilo Jayoma Castulo, Xiaoyuan Xu, Xiaoyuan Xu

    Published 2025-02-01
    “…Positive attitudes toward AI’s value in education were evident, although concerns such as dependence and reduced independent thinking, algorithmic bias and ethical concerns, accuracy and information quality, data security, and privacy concerns were observed among students. …”
    Get full text
    Article
  11. 61651

    Jointly Optimized Placement of Application VM and VNF in NFV Based Data Center by Dandan Qi, Ruijun Gu

    Published 2024-01-01
    “…Finally, through a large number of experiments, compared with the algorithms that deal with the AppVM and VNF placement separately, the advantages of the proposed joint optimization methods in improving the request acceptance rate are verified.…”
    Get full text
    Article
  12. 61652

    Enhancing PV feed-in power forecasting through federated learning with differential privacy using LSTM and GRU by Pascal Riedel, Kaouther Belkilani, Manfred Reichert, Gerd Heilscher, Reinhold von Schwerin

    Published 2024-12-01
    “…By leveraging advanced FL algorithms such as FedYogi and FedAdam, we propose a method that not only predicts sequential energy data with high accuracy, achieving an R2 of 97.68%, but also adheres to stringent privacy standards, offering a scalable solution for the challenges of smart grids analytics, thus clearly showing that the proposed approach is promising and worth being pursued further.…”
    Get full text
    Article
  13. 61653

    Time-of-Flight Camera Intensity Image Reconstruction Based on an Untrained Convolutional Neural Network by Tian-Long Wang, Lin Ao, Na Han, Fu Zheng, Yan-Qiu Wang, Zhi-Bin Sun

    Published 2024-08-01
    “…Leveraging intensity information acquired by ToF cameras, we apply various reconstruction algorithms to reconstruct the object’s image. Under undersampling conditions, our reconstruction approach yields higher peak signal-to-noise ratio compared to the raw camera image, significantly improving the quality of the target object’s image. …”
    Get full text
    Article
  14. 61654

    Simulating Future Land Use/Land Cover of Tigris River Basin Assuming the Continuation of the Conditions During 2018 and 2023. by Abolfazl Ghanbari, Ayat Khaleel-Gharibawi, Hala Abdulkareem-Rubaiee, Mehrdad Jeihouni

    Published 2024-12-01
    “…Based on this, the present study developed multi-temporal (2003-2023) LULC maps for TRB through classifying Landsat images using the random forest (RF) and support vector machine (SVM) algorithms, and simulating future LULC states (2028) employing the cellular automata (CA)-Markov model. …”
    Get full text
    Article
  15. 61655

    From Molecules to Medicines: The Role of AI-Driven Drug Discovery Against Alzheimer’s Disease and Other Neurological Disorders by Mashael A. Alghamdi

    Published 2025-07-01
    “…Artificial intelligence (AI) tools are of considerable interest in modern drug discovery processes and, by exploiting machine learning (ML) algorithms and deep learning (DL) tools, as well as data analytics, can expedite the identification of new drug targets and potential lead molecules. …”
    Get full text
    Article
  16. 61656

    PULSE: A Fast Portable Unit for Lab-on-Site Electrochemistry by Cláudia Ferreira, Fiona Barry, Miomir Todorović, Patrick Sugrue, Sofia Rodrigues Teixeira, Paul Galvin

    Published 2025-01-01
    “…The research focuses on optimising analogue front-end circuits, developing data analysis algorithms, and validating the device through experiments to enhance measurement accuracy and detection speed, enabling on-site measurements across diverse applications. …”
    Get full text
    Article
  17. 61657

    Understanding acceptance and resistance toward generative AI technologies: a multi-theoretical framework integrating functional, risk, and sociolegal factors by Priyanka Shrivastava

    Published 2025-04-01
    “…Ethical concerns, including algorithmic bias, data ownership, and the labor market impact of AI, are addressed to offer a more holistic understanding of resistance behavior. …”
    Get full text
    Article
  18. 61658

    HARDWARE AND SOFTWARE COMPLEX FOR FUNCTIONAL STATE MONITORING OF MOTHER AND FETUS by I. V. Tolmachyov, K. S. Brazovsky, A. S. Tsverova, V. S. Ripenko

    Published 2014-08-01
    “…So the main aim of this work is development of hardware and software system to assess the functional status of the mother and fetus by the analysis of the signals recorded from the abdominal electrodes.Objectives:1) to formulate the requirements to noninvasive monitoring system and functional state assessment of mother and fetus.2) to develop algorithms and software for monitoring system and functional state assessment of mother and fetus.3) to determine fetus functional state at 32–33 week in women with uncomplicated pregnancies and in women with placental insufficiency in the compensation stage and subcompensation.The system concept is based on fetal heart rate recognition and analysis. …”
    Get full text
    Article
  19. 61659

    Intrusion Detection System Framework for SDN-Based IoT Networks Using Deep Learning Approaches With XAI-Based Feature Selection Techniques and Domain-Constrained Features by Manlaibaatar Tserenkhuu, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi

    Published 2025-01-01
    “…This study proposes an IDS framework to detect various cyberattacks in SDN-based IoT networks utilizing three deep learning algorithms that incorporate hyperparameter tuning and the feature selection process based on explainable artificial intelligence (XAI), which uses domain-constrained features to improve performance and reduce computational complexity. …”
    Get full text
    Article
  20. 61660

    Complex Therapy for Intraoperative Blood Loss during Pelvic Bone Repair by Z. G. Marutyan, Yu. V Nikiforov, A. B. Kazantsev, A. A. Ter-Grigoryan

    Published 2010-06-01
    “…Objective: to introduce blood saving technologies and to develop algorithms for management of patients with pelvic fractures. …”
    Get full text
    Article