Suggested Topics within your search.
Suggested Topics within your search.
-
61641
Psychosocial risk factors among young people of medium urban Siberian city: a gender aspect (according to a cross-sectional epidemiological study)
Published 2019-12-01“…The PSF examination was carried out according to the algorithms of the WHO MONICA-Psychosocial Program.Results. …”
Get full text
Article -
61642
Conic curve encryption and digital signature based on complex number theory for cybersecurity applications
Published 2025-07-01“…Abstract Secure image transmission requires robust algorithms to ensure authentication, integrity, non-repudiation, and confidentiality. …”
Get full text
Article -
61643
Repeatability of carbon dioxide and methane emissions and oxygen consumption by forage-consuming beef heifers
Published 2025-04-01“…Data were uploaded to a server, and proprietary algorithms were used to calculate CH4 and CO2 emission and O2 consumption of the heifers. …”
Get full text
Article -
61644
An Improved Tree Crown Delineation Method Based on a Gradient Feature-Driven Expansion Process Using Airborne LiDAR Data
Published 2025-01-01“…However, the accuracy of current existing algorithms is limited due to the influence of understory vegetation and variations in tree crown geometry (e.g., the delineated crown boundaries consistently extend beyond their actual boundaries). …”
Get full text
Article -
61645
A mechanism for the emergence of low-dimensional structures in brain dynamics
Published 2025-04-01“…These range from linear algorithms to more intricate non-linear methods for manifold extraction. …”
Get full text
Article -
61646
Leveraging machine learning techniques to analyze nutritional content in processed foods
Published 2024-12-01“…After data preprocessing, two primary machine learning algorithms were employed: Support Vector Regression (SVR) and Random Forest (RF), both implemented using Scikit-learn. …”
Get full text
Article -
61647
Multi-Temporal Assessment of Soil Erosion After a Wildfire in Tuscany (Central Italy) Using Google Earth Engine
Published 2024-11-01“…The results suggest the need to plan mitigation strategies towards reducing soil erodibility, directly and indirectly, with a continuous monitoring of erosion rates and the application of machine learning algorithms to thoroughly understand the relationships between variables.…”
Get full text
Article -
61648
Anomaly Detection Dataset for Industrial Control Systems
Published 2023-01-01“…Using Machine Learning (ML) for Intrusion Detection Systems (IDS) is a promising approach for ICS cyber protection, but the lack of suitable datasets for evaluating ML algorithms is a challenge. Although a few commonly used datasets may not reflect realistic ICS network data, lack necessary features for effective anomaly detection, or be outdated. …”
Get full text
Article -
61649
ASAD: A Meta Learning-Based Auto-Selective Approach and Tool for Anomaly Detection
Published 2025-01-01“…It is trained using 139 datasets built upon 60 base datasets from 11 diverse domains (finance, healthcare, network security) and 80 ML and DL models composed of 22 base anomaly detection algorithms. It uses meta-features and correlation functions to evaluate 300 features. …”
Get full text
Article -
61650
Embracing or rejecting AI? A mixed-method study on undergraduate students’ perceptions of artificial intelligence at a private university in China
Published 2025-02-01“…Positive attitudes toward AI’s value in education were evident, although concerns such as dependence and reduced independent thinking, algorithmic bias and ethical concerns, accuracy and information quality, data security, and privacy concerns were observed among students. …”
Get full text
Article -
61651
Jointly Optimized Placement of Application VM and VNF in NFV Based Data Center
Published 2024-01-01“…Finally, through a large number of experiments, compared with the algorithms that deal with the AppVM and VNF placement separately, the advantages of the proposed joint optimization methods in improving the request acceptance rate are verified.…”
Get full text
Article -
61652
Enhancing PV feed-in power forecasting through federated learning with differential privacy using LSTM and GRU
Published 2024-12-01“…By leveraging advanced FL algorithms such as FedYogi and FedAdam, we propose a method that not only predicts sequential energy data with high accuracy, achieving an R2 of 97.68%, but also adheres to stringent privacy standards, offering a scalable solution for the challenges of smart grids analytics, thus clearly showing that the proposed approach is promising and worth being pursued further.…”
Get full text
Article -
61653
Time-of-Flight Camera Intensity Image Reconstruction Based on an Untrained Convolutional Neural Network
Published 2024-08-01“…Leveraging intensity information acquired by ToF cameras, we apply various reconstruction algorithms to reconstruct the object’s image. Under undersampling conditions, our reconstruction approach yields higher peak signal-to-noise ratio compared to the raw camera image, significantly improving the quality of the target object’s image. …”
Get full text
Article -
61654
Simulating Future Land Use/Land Cover of Tigris River Basin Assuming the Continuation of the Conditions During 2018 and 2023.
Published 2024-12-01“…Based on this, the present study developed multi-temporal (2003-2023) LULC maps for TRB through classifying Landsat images using the random forest (RF) and support vector machine (SVM) algorithms, and simulating future LULC states (2028) employing the cellular automata (CA)-Markov model. …”
Get full text
Article -
61655
From Molecules to Medicines: The Role of AI-Driven Drug Discovery Against Alzheimer’s Disease and Other Neurological Disorders
Published 2025-07-01“…Artificial intelligence (AI) tools are of considerable interest in modern drug discovery processes and, by exploiting machine learning (ML) algorithms and deep learning (DL) tools, as well as data analytics, can expedite the identification of new drug targets and potential lead molecules. …”
Get full text
Article -
61656
PULSE: A Fast Portable Unit for Lab-on-Site Electrochemistry
Published 2025-01-01“…The research focuses on optimising analogue front-end circuits, developing data analysis algorithms, and validating the device through experiments to enhance measurement accuracy and detection speed, enabling on-site measurements across diverse applications. …”
Get full text
Article -
61657
Understanding acceptance and resistance toward generative AI technologies: a multi-theoretical framework integrating functional, risk, and sociolegal factors
Published 2025-04-01“…Ethical concerns, including algorithmic bias, data ownership, and the labor market impact of AI, are addressed to offer a more holistic understanding of resistance behavior. …”
Get full text
Article -
61658
HARDWARE AND SOFTWARE COMPLEX FOR FUNCTIONAL STATE MONITORING OF MOTHER AND FETUS
Published 2014-08-01“…So the main aim of this work is development of hardware and software system to assess the functional status of the mother and fetus by the analysis of the signals recorded from the abdominal electrodes.Objectives:1) to formulate the requirements to noninvasive monitoring system and functional state assessment of mother and fetus.2) to develop algorithms and software for monitoring system and functional state assessment of mother and fetus.3) to determine fetus functional state at 32–33 week in women with uncomplicated pregnancies and in women with placental insufficiency in the compensation stage and subcompensation.The system concept is based on fetal heart rate recognition and analysis. …”
Get full text
Article -
61659
Intrusion Detection System Framework for SDN-Based IoT Networks Using Deep Learning Approaches With XAI-Based Feature Selection Techniques and Domain-Constrained Features
Published 2025-01-01“…This study proposes an IDS framework to detect various cyberattacks in SDN-based IoT networks utilizing three deep learning algorithms that incorporate hyperparameter tuning and the feature selection process based on explainable artificial intelligence (XAI), which uses domain-constrained features to improve performance and reduce computational complexity. …”
Get full text
Article -
61660
Complex Therapy for Intraoperative Blood Loss during Pelvic Bone Repair
Published 2010-06-01“…Objective: to introduce blood saving technologies and to develop algorithms for management of patients with pelvic fractures. …”
Get full text
Article