-
8461
High Performance 3D PET Reconstruction Using Spherical Basis Functions on a Polar Grid
Published 2012-01-01“…In this work, we have implemented the reconstruction algorithm using Graphical Processing Unit (GPU) technology for speed and a precomputed Monte-Carlo-calculated SRM for accuracy. …”
Get full text
Article -
8462
A multi-task genetic programming approach for online multi-objective container placement in heterogeneous cluster
Published 2024-11-01“…Comprehensive experiments show that the proposed algorithm can improve the resource utilization of clusters, reduce the number of physical machines, and effectively meet resource constraints and high availability requirements.…”
Get full text
Article -
8463
Detection of COVID-19 Using Protein Sequence Data via Machine Learning Classification Approach
Published 2023-01-01“…To optimize performance, we employed machine learning classification algorithms such as K-nearest neighbor (KNN), XGBoost, and Naïve Bayes, along with feature selection techniques like genetic algorithm (GA), LASSO, and support vector machine recursive feature elimination (SVM-RFE). …”
Get full text
Article -
8464
Self-Organizing Mapping Neural Network Implementation Based on 3-D NAND Flash for Competitive Learning
Published 2024-01-01“…Self-organizing Map (SOM) neural network is a prominent algorithm in unsupervised machine learning, which is widely used for data clustering, high-dimensional visualization, and feature extraction. …”
Get full text
Article -
8465
Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks
Published 2025-01-01“…The selected features are evaluated by using the Random Forest (RF) algorithm to combine multiple decision trees and create an accurate result. …”
Get full text
Article -
8466
Secure channel estimation model for cognitive radio network physical layer security using two-level shared key authentication
Published 2025-01-01“…The change in channel capacity and utilization augments the need for security through 2-level key shared authentication. The deep learning algorithm verifies the authentication completeness for maximum channel capacity utilization irrespective of adversary interference. …”
Get full text
Article -
8467
Torque Prediction In Deep Hole Drilling: Artificial Neural Networks Versus Nonlinear Regression Model
Published 2025-12-01“…In this paper, we have developed a two-layer artificial neural network (ANN) model for training using the Levenberg-Marquardt algorithm to predict torque during deep drilling. Unlike many previous studies, this model uses hole depth as an input vector element instead of hole diameter. …”
Get full text
Article -
8468
FPGA-Based Implementation of All-Digital QPSK Carrier Recovery Loop Combining Costas Loop and Maximum Likelihood Frequency Estimator
Published 2014-01-01“…Besides, considering that, for MLFE, the accurate estimation of frequency offset is associated with the linear characteristic of its frequency discriminator (FD), the Coordinate Rotation Digital Computer (CORDIC) algorithm is introduced into the FD based on MLFE to unwrap linearly phase difference. …”
Get full text
Article -
8469
Short-Term Traffic Prediction considering Spatial-Temporal Characteristics of Freeway Flow
Published 2021-01-01“…Second, the hybrid model constructed by long short-term memory and K-nearest neighbor (LSTM-KNN) algorithm using transformed grey wolf optimization is discussed. …”
Get full text
Article -
8470
Object Detection Post Processing Accelerator Based on Co-Design of Hardware and Software
Published 2025-01-01“…Given the similarities between the training and inference post processes, we unify four typical post processing algorithms and design a hardware accelerator based on this framework. …”
Get full text
Article -
8471
Application of Radiomics Model of CT Images in the Identification of Ureteral Calculus and Phlebolith
Published 2022-01-01“…Then, the maximum correlation minimum redundancy criterion and the least absolute shrinkage and selection operator algorithm were used for texture feature selection. …”
Get full text
Article -
8472
Optimization of Data Distributed Network System under Uncertainty
Published 2022-01-01“…Because our network design problem is a nonlinear, convex optimization problem, we have employed a well-known Kuhn–Tucker (K-T) optimality algorithm to solve the same. Here, we have used triangular fuzzy numbers to express uncertain traffic rates and data processing rates. …”
Get full text
Article -
8473
On the enhancement of estimator efficiency of population variance through stratification, transformation, and formulation with application to COVID-19 data
Published 2025-02-01“…This work introduces a novel data-driven machine learning algorithm aiming stratification problem, formally based on subjective approach. …”
Get full text
Article -
8474
Application of Extrapolation Capability of Vector Fitting for Out-of-Band Dominant Modal Synthesis of Voltage-Source Converters
Published 2024-01-01“…This identification is achieved through their band-limited frequency responses using the vector fitting (VF) algorithm. On its basis, a sensitivity index of a partial fraction term is derived to explain the out-of-band modal identification behavior of the VF. …”
Get full text
Article -
8475
High-Performance 3D Compressive Sensing MRI Reconstruction Using Many-Core Architectures
Published 2011-01-01“…In this work, we investigate how different throughput-oriented architectures can benefit one CS algorithm and what levels of acceleration are feasible on different modern platforms. …”
Get full text
Article -
8476
Use of Awake Flexible Fiberoptic Bronchoscopic Nasal Intubation in Secure Airway Management for Reconstructive Surgery in a Pediatric Patient with Burn Contracture of the Neck
Published 2018-01-01“…Our findings emphasize the importance of a preplanned algorithm for airway control in secure airway management and feasibility of awake FFB intubation in a pediatric patient with burn contracture of the neck during anesthesia induction for reconstructive surgery. …”
Get full text
Article -
8477
Cognitive strategies for UAV trajectory optimization: Ensuring safety and energy efficiency in real-world scenarios
Published 2025-03-01“…The proposed work offers an energy efficient RRT algorithm, which is used to assess multiple trajectory alternatives. …”
Get full text
Article -
8478
Damage Identification in Bars with a Wave Propagation Approach and a Hybrid Optimization Method
Published 2012-01-01“…Finally, an experimental validation of the sequential algebraic algorithm, used for modeling the direct problem, is presented.…”
Get full text
Article -
8479
Chaotic Dynamics of a Mixed Rayleigh–Liénard Oscillator Driven by Parametric Periodic Damping and External Excitations
Published 2021-01-01“…Bifurcation structures of our system are performed through the fourth-order Runge–Kutta ode 45 algorithm. It is found that the system displays a remarkable route to chaos. …”
Get full text
Article -
8480
A New Asymmetric Fully Homomorphic Encryption Scheme for Cloud Banking Data
Published 2021-01-01“…Our current research provides a new algorithm for a publicly-keyed encryption system to keep bank data from tampering and theft when stored on the cloud computing platform, and our new system achieves fully Homomorphic Encryption, which allows mathematical operations to be performed on the encrypted text without the need for the original text. …”
Get full text
Article