-
161
Self-Supervised Deep Hyperspectral Inpainting with Plug-and-Play and Deep Image Prior Models
Published 2025-01-01“…The proposed algorithm extends the successful joint low-rank and sparse model to further exploit the underlying data structures beyond the conventional and sometimes restrictive unions of subspace models. …”
Get full text
Article -
162
Fast two dimensional to three dimensional registration of fluoroscopy and CT-scans using Octrees on segmentation maps
Published 2012-06-01“…Our approach originates from the segmentation of the volumetric data into multiple regions, which allows a compact representation viaOctree Data Structures. This, in turn, yields efficient storage and access of the attenuation indexes of the volumetric cells, required in the projection procedure that generates the DRR. …”
Get full text
Article -
163
A tensor compression algorithm using Tucker decomposition and dictionary dimensionality reduction
Published 2020-04-01“…In previous work, tensor data structures are usually destroyed by vectorization operations, resulting in information loss and new noise. …”
Get full text
Article -
164
Algorithms for partitioning logical circuits into subcircuits
Published 2020-09-01“…Algorithms perform the partitioning the system of logical equations into subsystems with the restrictions of the number of input and output variables. The data structures to execute the algorithms are defined. …”
Get full text
Article -
165
SA Sorting: A Novel Sorting Technique for Large-Scale Data
Published 2019-01-01“…Sorting is one of the operations on data structures used in a special situation. Sorting is defined as an arrangement of data or records in a particular logical order. …”
Get full text
Article -
166
Data Domain Servitization for Microservices Architecture
Published 2025-01-01“…This article reports an empirical study based on a systematic literature review aimed at identifying modeling techniques for segmenting data structures during microservice design. The review found limited methods to address the appropriate level of data granularity per microservice. …”
Get full text
Article -
167
A Comparative Analysis of Support Vector Machine and K-Nearest Neighbors Models for Network Attack Traffic Detection
Published 2025-01-01“…On the other hand, KNN proves to be more efficient and straightforward when applied to less complex data structures. The outcomes of this study provide significant insights into enhancing cybersecurity systems, with recommendations for refining machine learning models to better address emerging threats. …”
Get full text
Article -
168
Enhancing the Efficiency of a Decision Support System through the Clustering of Complex Rule-Based Knowledge Bases and Modification of the Inference Algorithm
Published 2018-01-01“…Effective exploration of new knowledge in every domain of human life requires new algorithms of knowledge organization and a thorough search of the created data structures. In this work, the author introduces an optimization of both the knowledge base structure and the inference algorithm. …”
Get full text
Article -
169
Automating Risk Analysis of Software Design Models
Published 2014-01-01“…To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. …”
Get full text
Article -
170
Improving stroke risk prediction by integrating XGBoost, optimized principal component analysis, and explainable artificial intelligence
Published 2025-02-01“…To improve stroke risk prediction models in terms of efficiency and interpretability, we propose to integrate modern machine learning algorithms and data dimensionality reduction methods, in particular XGBoost and optimized principal component analysis (PCA), which provide data structuring and increase processing speed, especially for large datasets. …”
Get full text
Article -
171
A Fast CT Reconstruction Scheme for a General Multi-Core PC
Published 2007-01-01“…In the proposed scheme, several techniques are integrated, including utilization of geometric symmetry, optimization of data structures, single-instruction multiple-data (SIMD) processing, multithreaded computation, and an Intel C++ compilier. …”
Get full text
Article -
172
3D Seismic Structural Analysis and Basin Modeling of the Matruh Basin, Western Desert, Egypt
Published 2018-01-01“…In order to evaluate the hydrocarbon potential of the Matruh Basin, North Western Desert of Egypt, the tectonic history, basin analysis, and maturity modeling of the Albian-Cenomanian Formations of the Matruh Basin were investigated using well logs and 3D seismic data. Structural analysis of the tops of the Bahariya, Kharita, and Alamein Dolomite Formations reveals them to dip to the southeast. …”
Get full text
Article -
173
Development of Integrated Choice and Latent Variable (ICLV) Models Using Matrix-Based Analytic Approximation and Automatic Differentiation Methods on TensorFlow Platform
Published 2022-01-01“…It is found that the parameter estimates and standard error estimates are acceptable for both models and the computational time is expected to decrease using tensor data structures on the TensorFlow platform. For the four-alternative ICLV models, the TVBS method has the highest level of accuracy. …”
Get full text
Article -
174
Research on Optimization of Big Data Construction Engineering Quality Management Based on RNN-LSTM
Published 2018-01-01“…Then, with the aid of word cloud visualization and cluster analysis, the associations between data structures are tapped, and the integrated unstructured data is converted into structured data. …”
Get full text
Article -
175
Equivalent Characterizations of Some Graph Problems by Covering-Based Rough Sets
Published 2013-01-01“…Covering is a widely used form of data structures. Covering-based rough set theory provides a systematic approach to this data. …”
Get full text
Article -
176
Providing a model of religious tourism based on the art of ta\'ziyeh (case study: Kashan city)
Published 2024-12-01“…In order to evaluate the validity of qualitative data, structural, external, descriptive and interpretive validity were used and in order to evaluate the reliability, the three approaches of Rao and Perry (2003) were used. …”
Get full text
Article -
177
Evaluation of Machine Learning and Ensemble Learning Models for Classification Using Delivery Data
Published 2025-02-01“…Additionally, the application of ensemble learning methods on complex and large-scale logistics data structures is unique in terms of its contribution to the literature. …”
Get full text
Article -
178
The Experience of Patients with Schizophrenia Treated with Repetitive Transcranial Magnetic Stimulation for Auditory Hallucinations
Published 2013-01-01“…A phenomenological approach was used and modified to involve some predetermined data structuring to accommodate for expected cognitive impairments of participants and the impact of rTMS on auditory hallucinations. …”
Get full text
Article -
179
A cell structure implementation of the multigrid method for the two-dimensional diffusion equation
Published 2025-01-01“…However, it is not easy for beginners to understand the implementation of the multigrid method due to its complex data structures and recursive routines. To resolve these difficulties, we develop a straightforward MATLAB implementation of the two-dimensional diffusion equation using a cell structure in MATLAB. …”
Get full text
Article -
180
An Oseen Two-Level Stabilized Mixed Finite-Element Method for the 2D/3D Stationary Navier-Stokes Equations
Published 2012-01-01“…Firstly, in contrast to other stabilized methods, they are parameter free, no calculation of higher-order derivatives and edge-based data structures, implemented at the element level with minimal cost. …”
Get full text
Article