-
11341
Brain Tumor Detection Using a Deep CNN Model
Published 2024-01-01“…The application of these algorithms offers several benefits, including rapid brain tumor prediction, reduced errors, and enhanced precision. …”
Get full text
Article -
11342
Localizing multiple radiation sources actively with a particle filter
Published 2025-02-01“…The performance of the algorithms was tested in a simulation study based on real-world data acquired previously from three radiation sources exhibiting various activities. …”
Get full text
Article -
11343
Link Quality Prediction via a Neighborhood-Based Nonnegative Matrix Factorization Model for Wireless Sensor Networks
Published 2015-10-01“…Traditional link quality prediction algorithms are simply based on the statistical information of the links in the wireless sensor network. …”
Get full text
Article -
11344
For Loan Processing a Fuzzy Process Mining
Published 2023-09-01“…Visualizations of the process have been affected with the help of fuzzy model algorithms necessary for a huge number of incidents and activities. …”
Get full text
Article -
11345
Sql injection detection using Naïve Bayes classifier: A probabilistic approach for web application security
Published 2025-01-01“…This collection of attributes is employed to generate a feature vector that serves as the input for the Naive Bayes classification algorithms. The classifier is trained using a labeled dataset and then learns to distinguish between benign and malicious requests by assessing their computed probabilities. …”
Get full text
Article -
11346
Assessment of food toxicology
Published 2016-09-01“…These systems utilize a combination of complex in vitro cell-based models with computer-based algorithms. A decrease of rodent animal testing with its limitations of high costs, low throughput readouts, inconsistent responses, ethical issues and concerns of extrapolability to humans have led to an increased use of these but also alternative lower hierarchy surrogate animal models (e.g. …”
Get full text
Article -
11347
Separation of the Structure Signal by the Maximal Overlap Discrete Wavelet Transform and Fast Fourier Transform
Published 2021-01-01“…With the combination of these two algorithms, MODWT and FFT, the signals of the synthesized vibration have been separated into component signals with different frequency ranges. …”
Get full text
Article -
11348
A Comprehensive Review of the Diagnostics for Pediatric Tuberculosis Based on Assay Time, Ease of Operation, and Performance
Published 2025-01-01“…Gaps in the existing diagnostic methods, algorithms, and operational costs were also reviewed. …”
Get full text
Article -
11349
Classification Based on Pruning and Double Covered Rule Sets for the Internet of Things Applications
Published 2014-01-01“…However, many traditional rule-based classifiers cannot guarantee that all instances can be covered by at least two classification rules. Thus, these algorithms cannot achieve high accuracy in some datasets. …”
Get full text
Article -
11350
Understanding HLA-DQ in renal transplantation: a mini-review
Published 2025-02-01“…Emerging molecular mismatch algorithms refine immunogenicity assessments by analyzing amino acid differences and structural interactions. …”
Get full text
Article -
11351
Emotional intelligence in management activities аnd artificial intelligence technologies
Published 2025-01-01“…The article examines the role of emotional intelligence (emotional quotient) in the process of management activities and the competing position of artificial intelligence (hereinafter referred to as AI), which is trying to master it through learning algorithms and implementation in management practice. …”
Get full text
Article -
11352
Utilizing Structural Network Positions to Diversify People Recommendations on Twitter
Published 2022-01-01“…Social recommender systems, such as “Who to follow” on Twitter, utilize approaches that recommend friends of a friend or interest-wise similar people. Such algorithmic approaches have been criticized for resulting in filter bubbles and echo chambers, calling for diversity-enhancing recommendation strategies. …”
Get full text
Article -
11353
A New Lifetime Distribution and Its Power Transformation
Published 2014-01-01“…Maximum likelihood estimation for the two-parameter model using complete samples is investigated. Different algorithms for generating random samples from the two new models are given. …”
Get full text
Article -
11354
APPLICATION OF TRADITIONALTHEORIES IN THE AGE OF CYBER COMMUNICATION
Published 2024-06-01“…It argues for the need to adapt and modify these theories to account for the unique characteristics of cyber communication, including networked connectivity, user-generated content, and algorithmic influence. A nuanced understanding of the socio-cultural, technological, and contextual factors shaping digital communication practices is emphasized. …”
Get full text
Article -
11355
Radar system for unmanned aerial vehicles
Published 2024-12-01“…Application of digital signal processing methods for formation of radio holograms and extraction of information about objects. Use of algorithms for automatic processing and analysis of the obtained data in real time. …”
Get full text
Article -
11356
Minimum Risk Facility Location-Allocation Problem with Type-2 Fuzzy Variables
Published 2014-01-01“…On the basis of formula obtained, we can convert original fuzzy FLA model into its equivalent parametric mixed integer programming form, which can be solved by conventional numerical algorithms or general-purpose software. Taking use of structural characteristics of the equivalent optimization, we design a parameter decomposition method. …”
Get full text
Article -
11357
Integrated Experimental and Numerical Comparison of Different Approaches for Planar Biaxial Testing of a Hyperelastic Material
Published 2016-01-01“…Then, material parameters for a suitable hyperelastic law were determined for each configuration examined, employing an inverse method which combines numerical simulations with the finite element method (FEM) and optimization algorithms. Finally, efficiency of examined biaxial configurations was assessed comparing stress reductions factor, degree and uniformity of biaxial deformation, and operative strain ranges.…”
Get full text
Article -
11358
Authorship identification methods in student plagiarism detection
Published 2023-11-01“…Both classical methods, which include text comparison and similarity search, and modern methods based on machine learning algorithms, as well as their combination and potential modifications, are considered. …”
Get full text
Article -
11359
CoAt-Set: Transformed coordinated attack dataset for collaborative intrusion detection simulationMendeley Data
Published 2025-04-01“…It is suitable for various applications, including collective threat intelligence research, analyzing distributed threat patterns, developing machine learning algorithms for distributed systems, and training simulations designed for heterogeneous network environments.…”
Get full text
Article -
11360
SuroTex: Surrounding texture datasetMendeley Data
Published 2025-04-01“…However, the existing texture datasets such as KTH-TIPS, KTH-TIPS2, USPTex, DTD, and ALOT still have limitations which causes the resulting analysis on different texture classification algorithms to be somewhat unreliable. The two main reasons behind this problem are the limited number of texture classes and the non-uniformity of the image sizes. …”
Get full text
Article