Showing 7,361 - 7,380 results of 13,928 for search '(( whole algorithm ) OR ( while algorithm ))', query time: 0.18s Refine Results
  1. 7361

    Federated Learning for Brain Tumor Diagnosis: Methods, Challenges and Future Prospects by Ma Yuhan

    Published 2025-01-01
    “…Although these factors limit the widespread application of FL in medical settings, this paper also proposes potential solutions, such as improving algorithm interpretability through interpretable tools, and utilizing transfer learning and domain adaptation methods to enhance model effectiveness across different datasets. …”
    Get full text
    Article
  2. 7362

    TabMoE: A General Framework for Diverse Table-Based Reasoning with Mixture-of-Experts by Jie Wu, Mengshu Hou

    Published 2024-09-01
    “…However, existing table-based pre-training methods frequently exhibit constraints, supporting only single tasks while requiring substantial computational resources, which hinders their efficiency and applicability. …”
    Get full text
    Article
  3. 7363

    ZEMAX Simulations and Experimental Validation of Laser Interferometers by Muddasir Naeem, Tayyab Imran

    Published 2025-02-01
    “…Using ZEMAX OpticStudio in non-sequential mode with the physical optics propagation (POP) algorithm, the simulations provide detailed insights into the optical performance of these interferometers. …”
    Get full text
    Article
  4. 7364

    Artificial Blur Effect for Optical See-Through Near-Eye Displays by Shiva Sinaei, Daisuke Iwai, Kosuke Sato

    Published 2025-01-01
    “…Furthermore, we propose an algorithm to mitigate artifacts around the border region between the sharp and blur regions that appear due to the magnification of the ETL. …”
    Get full text
    Article
  5. 7365

    Exosomal insights into ovarian cancer stem cells: revealing the molecular hubs by Kiana Sojoudi, Maryam Solaimani, Hossein Azizi

    Published 2025-01-01
    “…A four-fold algorithmic approach, including MCC, DMNC, Degree, and EPC, identified 12 common hub genes. …”
    Get full text
    Article
  6. 7366

    Affinity Propagation-Based Hybrid Personalized Recommender System by Iqbal Qasim, Mujtaba Awan, Sikandar Ali, Shumaila Khan, Mogeeb A. A. Mosleh, Ahmed Alsanad, Hizbullah Khattak, Mahmood Alam

    Published 2022-01-01
    “…A personalized recommender system is broadly accepted as a helpful tool to handle the information overload issue while recommending a related piece of information. …”
    Get full text
    Article
  7. 7367

    Approach to Semantic Visual SLAM for Bionic Robots Based on Loop Closure Detection with Combinatorial Graph Entropy in Complex Dynamic Scenes by Dazheng Wang, Jingwen Luo

    Published 2025-07-01
    “…To address this problem, we propose a semantic visual SLAM (vSLAM) algorithm based on loop closure detection with combinatorial graph entropy. …”
    Get full text
    Article
  8. 7368

    Texture Analysis and Classification using Local Binary Patterns and Statistical Features by Hasan Maher

    Published 2024-09-01
    “…On the other hand, there is HOG which emphasizes edge and gradient information to detect the orientation and shape of a texture in a given image. While LBP describes the local micro-patterns HOG gives the perspective of the global gradient orientation. …”
    Get full text
    Article
  9. 7369

    Sorting rare earth magnets motors for recycling without opening the motors by A. P. S. Baghel, A. Karati, D. Prodius, I. C. Nlebedim

    Published 2025-04-01
    “…The former was accomplished with 100% accuracy while the latter was accomplished with ~ 78% accuracy. …”
    Get full text
    Article
  10. 7370

    Rough Set Theory and Soft Computing Methods for Building Explainable and Interpretable AI/ML Models by Sami Naouali, Oussama El Othmani

    Published 2025-05-01
    “…Applied to a private cardiovascular dataset, our MLSpecialReduct algorithm achieves a peak Random Forest accuracy of 0.99 (versus 0.85 without feature selection), while MLFuzzyRoughSet improves accuracy to 0.83, surpassing our MLVarianceThreshold (0.72–0.77), an adaptation of the traditional VarianceThreshold method. …”
    Get full text
    Article
  11. 7371

    Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures by Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari

    Published 2021-05-01
    “…Abstract A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to remove the mark (unremovability) or mark a fresh object without the marking key (unforgeability). …”
    Get full text
    Article
  12. 7372

    A Machine Learning Approach for Predicting Particle Spatial, Velocity, and Temperature Distributions in Cold Spray Additive Manufacturing by Lurui Wang, Mehdi Jadidi, Ali Dolatabadi

    Published 2025-06-01
    “…The ML predictions closely match CFD outputs while reducing computation time by orders of magnitude, demonstrating that ML-CFD integration can accelerate CSAM process design. …”
    Get full text
    Article
  13. 7373

    Financial Management of Innovative Activity by V. P. Shestak, E. I. Moreva, I. G. Tyutyunnik

    Published 2019-12-01
    “…This allows to create a control algorithm to maximize the effectiveness. The methods of computational diagnostics and tomographic economics are used for the element-by-element analysis of the subsystems of the innovation system. …”
    Get full text
    Article
  14. 7374

    Allosteric communication occurs via networks of tertiary and quaternary motions in proteins. by Michael D Daily, Jeffrey J Gray

    Published 2009-02-01
    “…The GCN reveals allosteric communication among all substrate and effector sites in 15 of 18 multidomain and multimeric proteins, while tertiary and quaternary networks exhibit such communication in only 4 and 3 of these proteins, respectively. …”
    Get full text
    Article
  15. 7375

    Drone-Captured Wildlife Data Encryption: A Hybrid 1D–2D Memory Cellular Automata Scheme with Chaotic Mapping and SHA-256 by Akram Belazi, Héctor Migallón

    Published 2024-11-01
    “…Extensive performance evaluations demonstrate the effectiveness of the proposed scheme, which balances security and complexity while outperforming existing algorithms.…”
    Get full text
    Article
  16. 7376

    The Footropter: A Passive Prosthetic Prescription Tool With Adjustable Forefoot and Hindfoot Stiffness by Harrison L. Bartlett, Brittany M. Moores, Brian E. Lawson, Max K. Shepherd

    Published 2025-01-01
    “…The Footropter, when paired with a preference optimization algorithm, can enable CPs to integrate patients’ experiential input into the clinical prescription process.…”
    Get full text
    Article
  17. 7377

    Accelerated Computation of Linear Complementarity Problem in Dexterous Robotic Grasping via Newton-Subgradient Non-Smooth Multi-Step Greedy Kaczmarz Method by Zhiwei Ai, Chenliang Li

    Published 2025-06-01
    “…The methodology effectively mitigates inherent limitations of conventional randomized row selection, including unpredictable iteration counts and computational overhead from repeated Jacobian updates, while maintaining deterministic convergence behavior. …”
    Get full text
    Article
  18. 7378

    Image and audio steganography based on indirect LSB by Zainab Namh Sultani, Ban Nadeem Dhannoon

    Published 2021-08-01
    “…The experimental results indicate that the proposed algorithm achieves promising performance in terms of the quality metrics PSNR, SNR and SSIM. …”
    Get full text
    Article
  19. 7379

    The Concept of ‘Truth’ in Legal Science: A Theoretical Exploration by Pavel L. Likhter

    Published 2025-07-01
    “…The article pays special attention to the algorithm for distinguishing between real and apparent phenomena of legal reality. …”
    Get full text
    Article
  20. 7380

    Markov approach for inventory control with meta-heuristics in intermittent demand environment. by Ferhat Yuna, Burak Erkayman, Mustafa Yılmaz

    Published 2025-01-01
    “…The variability of intermittent demand causes high lost sales or holding costs. While lost sales reduce customer satisfaction, keeping excessive stock also creates high costs for companies. …”
    Get full text
    Article