-
3821
Using neuroevolution for designing soft medical devices
Published 2025-03-01“…Specifically, the best-performing morphologies were discovered by the NEAT algorithm.…”
Get full text
Article -
3822
Geoelectrical Data Inversion by Clustering Techniques of Fuzzy Logic to Estimate the Subsurface Layer Model
Published 2015-01-01“…Here in this approach, graphical user interface (GUI) was developed with the integration of three algorithms and the input data (AB/2 and apparent resistivity), while importing will process each algorithm and interpret the layer model parameters (true resistivity and depth). …”
Get full text
Article -
3823
Global progress in competitive co-evolution: a systematic comparison of alternative methods
Published 2025-01-01“…Finally, we compare the efficacy of four qualitatively different algorithms, including two newly introduced methods. …”
Get full text
Article -
3824
Numerical methods of computation of singular and hypersingular integrals
Published 2001-01-01“…The isolated section is devoted to the optimal with respect to accuracy algorithms of the calculation of the hypersingular integrals.…”
Get full text
Article -
3825
Methods for Solving Generalized Nash Equilibrium
Published 2013-01-01“…In this paper, we present two descent type methods. The algorithms are based on a reformulation of the generalized Nash equilibrium using Nikaido-Isoda function as unconstrained optimization. …”
Get full text
Article -
3826
Generalized Discriminant Orthogonal Nonnegative Tensor Factorization for Facial Expression Recognition
Published 2014-01-01“…In order to overcome the limitation of traditional nonnegative factorization algorithms, the paper presents a generalized discriminant orthogonal non-negative tensor factorization algorithm. …”
Get full text
Article -
3827
Analisis Perbandingan Algoritma SVM, KNN, dan CNN untuk Klasifikasi Citra Cuaca
Published 2021-03-01“…KNN and SVM are Machine Learning classification algorithms, while CNN is a Deep Neural Networks classification algorithm. …”
Get full text
Article -
3828
Diagnostic performance of artificial intelligence in detection of renal cell carcinoma: a systematic review and meta-analysis
Published 2025-01-01“…Moreover, externally validated Al algorithms had a pooled sensitivity and specificity of 80% (95% CI, 73 to 84) and 90% (95% CI, 84 to 93), respectively. …”
Get full text
Article -
3829
OpenWFS—a library for conducting and simulating wavefront shaping experiments
Published 2025-01-01“…This complexity makes it hard to compare different algorithms and to extend existing software with new hardware or algorithms. …”
Get full text
Article -
3830
Convex separable minimization problems with a linear constraint and bounded variables
Published 2005-01-01“…A necessary and sufficient condition and a sufficient condition are proved for a feasible solution to be an optimal solution to these two problems, respectively. Iterative algorithms of polynomial complexity for solving such problems are suggested and convergence of these algorithms is proved. …”
Get full text
Article -
3831
The Computational Solution of Generalized Inverse Eigenvalue Problem for Pseudo-Jacobi Matrix
Published 2024-01-01“…It is shown that a unique pseudo-Jacobi matrix can be recovered from partial eigenpairs and certain special mixed eigendata. Two algorithms are provided for the reconstruction of such a pseudo-Jacobi matrix, and illustrative numerical examples are presented to verify the proposed algorithms.…”
Get full text
Article -
3832
A Note on the Square Roots of a Class of Circulant Matrices
Published 2013-01-01“…Then, we propose two algorithms for computing the square roots of the k-circulant matrix and the skew k-circulant matrix, respectively. …”
Get full text
Article -
3833
Regularized Methods for the Split Feasibility Problem
Published 2012-01-01“…Many applied problems such as image reconstructions and signal processing can be formulated as the split feasibility problem (SFP). Some algorithms have been introduced in the literature for solving the (SFP). …”
Get full text
Article -
3834
Applications of Robust Methods in Spatial Analysis
Published 2023-01-01“…Robust and sequential methods were used to develop algorithms for design construction. The constructed designs are robust against misspecified regression responses and variance/covariance structures of responses. …”
Get full text
Article -
3835
Artificial Intelligence Scribe and Large Language Model Technology in Healthcare Documentation: Advantages, Limitations, and Recommendations
Published 2025-01-01“…The neural network algorithms of LLMs have unpredictable sensitivity to user input and inherent variability in their output. …”
Get full text
Article -
3836
A synthesis method for zero-sum mean-payoff asynchronous probabilistic games
Published 2025-01-01“…Next, two symbolic algorithms running in polynomial time are proposed to calculate the expected mean payoffs, and both algorithms adopt uniform random strategies. …”
Get full text
Article -
3837
ESG IN THE REAL ESTATE VALUATIONS. A PORTFOLIO SELECTION MODEL FOR ENERGY RETROFIT PROGRAMS
Published 2024-11-01“…The ESG triptych constitutes inspiration in the scientific literature in the field for the proposal and testing of valuation algorithms aimed at the optimal structuring of investment portfolios. …”
Get full text
Article -
3838
A Hybrid Approach of Using Wavelets and Fuzzy Clustering for Classifying Multispectral Florescence In Situ Hybridization Images
Published 2006-01-01“…The algorithms have been tested on images from normal cells, showing the improvement in classification accuracy. …”
Get full text
Article -
3839
An Efficient Estimation Method for Reducing the Axial Intensity Drop in Circular Cone-Beam CT
Published 2008-01-01“…Reconstruction algorithms for circular cone-beam (CB) scans have been extensively studied in the literature. …”
Get full text
Article -
3840
Explainable Artificial Intelligence (XAI) to Enhance Trust Management in Intrusion Detection Systems Using Decision Tree Model
Published 2021-01-01“…The previous studies focused more on the accuracy of the various classification algorithms for trust in IDS. They do not often provide insights into their behavior and reasoning provided by the sophisticated algorithm. …”
Get full text
Article