Showing 5,661 - 5,680 results of 12,475 for search '"algorithms"', query time: 0.07s Refine Results
  1. 5661

    Robust fully distributed file caching for delay-tolerant networks: A reward-based incentive mechanism by Sidi Ahmed Ezzahidi, Essaid Sabir, Sara Koulali, El-Houssine Bouyakhf

    Published 2017-04-01
    “…Then, we propose three fully distributed algorithms to ensure convergence to the Nash equilibria (for both pure equilibrium and mixed equilibrium). …”
    Get full text
    Article
  2. 5662

    Refining the prediction of user satisfaction on chat-based AI applications with unsupervised filtering of rating text inconsistencies by Hae Sun Jung, Jang Hyun Kim, Haein Lee

    Published 2025-02-01
    “…Subsequently, the authors conduct supervised sentiment analysis using various machine learning and deep learning algorithms. The experimental results confirm the effectiveness of the proposed approach showing improvement in prediction accuracy with cost efficiency. …”
    Get full text
    Article
  3. 5663

    The Video Manipulation Effect (VME): A quantification of the possible impact that the ordering of YouTube videos might have on opinions and voting preferences. by Robert Epstein, Alex Flores

    Published 2024-01-01
    “…In 2018, a YouTube official revealed that 70% of the time people spend watching videos on the site, they are watching content that has been suggested by the company's recommender algorithms. If the findings in the present study largely apply to YouTube, this popular video platform might have unprecedented power to impact thinking and behavior worldwide.…”
    Get full text
    Article
  4. 5664

    Scalable Video Streaming for Single-Hop Wireless Networks Using a Contention-Based Access MAC Protocol by Monchai Lertsutthiwong, Thinh Nguyen, Alan Fern

    Published 2008-01-01
    “…We present some hardness results for the optimization problem under various conditions and propose some heuristic algorithms for finding a good solution. In particular, we show that a simple greedy layer-allocation algorithm can perform reasonably well, although it is typically not optimal. …”
    Get full text
    Article
  5. 5665

    Outlier Detection and Correction for Monitoring Data of Water Quality Based on Improved VMD and LSSVM by Guangpei Sun, Peng Jiang, Huan Xu, Shanen Yu, Dong Guo, Guang Lin, Hui Wu

    Published 2019-01-01
    “…To improve the detection rate and reduce the correction error of abnormal data for water quality, an outlier detection and correction method is proposed based on the improved Variational Mode Decomposition (improved VMD) and Least Square Support Vector Machine (LSSVM) algorithms. The correlation coefficient is introduced, for solving the optimal parameter k of VMD algorithm, and an improved VMD algorithm is obtained. …”
    Get full text
    Article
  6. 5666

    Time Series Data Augmentation for Energy Consumption Data Based on Improved TimeGAN by Peihao Tang, Zhen Li, Xuanlin Wang, Xueping Liu, Peng Mou

    Published 2025-01-01
    “…Using deep learning algorithms to establish prediction models for sensor data is an effective approach; however, the performance of these models is significantly influenced by the quantity and quality of the training data. …”
    Get full text
    Article
  7. 5667

    FFA-GAN: A Generative Adversarial Network Based on Feature Fusion Attention for Intelligent Safety Monitoring by R. Chang, B. Zhang, Y. Zhang, S. Gao, S. Zhao, Y. Rao, X. Zhai, T. Wang, Y. Yang

    Published 2023-01-01
    “…However, the current detection algorithms have limited abilities under adverse conditions, especially in regions like Yunnan Province with complex terrain. …”
    Get full text
    Article
  8. 5668

    Prediction of the Strength of Rubberized Concrete by an Evolved Random Forest Model by Yuantian Sun, Guichen Li, Junfei Zhang, Deyu Qian

    Published 2019-01-01
    “…In this study, an evolutionary random forest model (BRF) combining random forest (RF) and beetle antennae search (BAS) algorithms was proposed, which can be used for establishing the relationship between UCS of RC and its key variables. …”
    Get full text
    Article
  9. 5669

    Handling Multiple-Fuel Options in Economic Dispatch of Thermal Power Plants Through a Tight Model Applying Indicator Variables by Hossein Sharifzadeh

    Published 2025-01-01
    “…Furthermore, the proposed approach generally outperforms earlier algorithms in terms of solution quality and robustness. …”
    Get full text
    Article
  10. 5670

    Optical Coherence Tomography Noise Reduction Using Anisotropic Local Bivariate Gaussian Mixture Prior in 3D Complex Wavelet Domain by Hossein Rabbani, Milan Sonka, Michael D. Abramoff

    Published 2013-01-01
    “…On this base, several OCT despeckling algorithms are obtained based on using Gaussian/two-sided Rayleigh noise distribution and homomorphic/nonhomomorphic model. …”
    Get full text
    Article
  11. 5671

    Sleeping Schedule-Aware Local Broadcast in Wireless Sensor Networks by Jue Hong, Zhuo Li, Dianjie Lu, Sanglu Lu

    Published 2013-12-01
    “…To handle the periodical sleep issue, we focus on designing effective sleeping schedule-aware broadcast algorithms. We practically propose SALB, a sleeping schedule-aware local broadcast algorithm. …”
    Get full text
    Article
  12. 5672

    A systematic review of AI-enhanced techniques in credit card fraud detection by Ibrahim Y. Hafez, Ahmed Y. Hafez, Ahmed Saleh, Amr A. Abd El-Mageed, Amr A. Abohany

    Published 2025-01-01
    “…This paper provides a systematic review of enhanced techniques using Artificial Intelligence (AI), machine learning (ML), deep learning (DL), and meta-heuristic optimization (MHO) algorithms for credit card fraud detection (CCFD). Carefully selected recent research papers have been investigated to examine the effectiveness of these AI-integrated approaches in recognizing a wide range of fraud attacks. …”
    Get full text
    Article
  13. 5673

    Secret sharing in a special linear group by V. I. Yanchevskiĭ, I. A. Havarushka, G. V. Matveev

    Published 2024-09-01
    “…A rigorous mathematical justification is given for the correctness of the algorithms for generating partial secrets and restoring the main secret in the special linear group over the ring of integers. …”
    Get full text
    Article
  14. 5674

    A System of Remote Patients’ Monitoring and Alerting Using the Machine Learning Technique by M. Dhinakaran, Khongdet Phasinam, Joel Alanya-Beltran, Kingshuk Srivastava, D. Vijendra Babu, Sitesh Kumar Singh

    Published 2022-01-01
    “…The proposed methodology makes use of different machine learning algorithms along with cloud computing for continuous data storage. …”
    Get full text
    Article
  15. 5675

    Dense Sandstone Material Decomposition Based on Improved Convolutional Neural Network by Ran ZHANG, Huihua KONG, Jiaxin LI, Yijiao SONG

    Published 2025-01-01
    “…At present, the material decomposition method based on neural networks overcomes the limited decomposition effect of traditional iterative algorithms. However, the performance of traditional neural networks in feature detail recovery is still not satisfactory. …”
    Get full text
    Article
  16. 5676

    Shape Restoration by Active Self-Assembly by D. Arbuckle, A. A. G. Requicha

    Published 2005-01-01
    “…Simulations presented here show that swarms of such robots organize themselves to achieve shape restoration by using distributed algorithms. This is one more example of an interesting geometric problem that can be solved by the Active Self-Assembly paradigm introduced in previous papers by the authors.…”
    Get full text
    Article
  17. 5677

    A Novel Approximation Method for Solving Ordinary Differential Equations Using the Representation of Ball Curves by Abdul Hadi Bhatti, Sharmila Karim, Ala Amourah, Ali Fareed Jameel, Feras Yousef, Nidal Anakira

    Published 2025-01-01
    “…To achieve minimal error and higher accuracy in approximate solutions, researchers have focused on developing algorithms using various numerical techniques. This study proposes the application of Ball curves, specifically the Said–Ball curve, for estimating solutions to higher-order ODEs. …”
    Get full text
    Article
  18. 5678

    Comprehensive Survey of Big Data Mining Approaches in Cloud Systems by Zainab Salih Ageed, Subhi R. M. Zeebaree, Mohammed Mohammed Sadeeq, Shakir Fattah Kak, Hazha Saeed Yahia, Mayyadah R. Mahmood, Ibrahim Mahmood Ibrahim

    Published 2021-04-01
    “…The effect of computing conventions and algorithms on detailed storage and data communication requirements has been studied. …”
    Get full text
    Article
  19. 5679

    QUANTITATIVE STRUCTURE-ACTIVITY RELATIONSHIP AND MOLECULAR DOCKING STUDIES OF HYDROXAMIC ACID DERIVATIVES AS NOVEL CLASS INHIBITORS AGAINST HELICOBACTER PYLORI UREASE by Ibrahim Tijjani Ibrahim, Adamu Uzairu, Balarabe Sagagi

    Published 2019-12-01
    “…Relevant molecular descriptors were selected by Genetic Function Algorithms (GFA). The best model obtained was given a distinct validated, good and robust statistical parameters which include; square correlation coefficient R2 value of (0.9989), adjusted determination coefficient, R2adj value of (0.9984), Leave one out cross validation determination coefficient Q2 value of (0.9948) and external validation as predicted determination coefficient R2 value of(0.8409). …”
    Get full text
    Article
  20. 5680

    Recent Research Progress on Ground-to-Air Vision-Based Anti-UAV Detection and Tracking Methodologies: A Review by Arowa Yasmeen, Ovidiu Daescu

    Published 2025-01-01
    “…Our study examines recent UAV detection and tracking algorithms, outlining their operational principles, advantages, and disadvantages. …”
    Get full text
    Article