Showing 10,741 - 10,760 results of 13,928 for search '(( whole algorithm ) OR ( while algorithm ))', query time: 0.26s Refine Results
  1. 10741

    The impact of artificial intelligence on human resource management practices: An investigation by Thandukwazi R. Ncube, Kusangiphila K. Sishi, Jane P. Skinner

    Published 2025-06-01
    “…These include potential biases within AI algorithms, concerns about data privacy and over-surveillance of employees, along with exacerbating the ‘digital divide’ between those with access to technology and those without. …”
    Get full text
    Article
  2. 10742

    Research Status and Progress of Acoustic Fire Extinguishing Technology by Xinyue Shi, Zhaojun Tian, Yi Lu, Qing Ye

    Published 2025-03-01
    “…Experimental results demonstrate that acoustic cavity focusing technology extends the effective fire suppression distance to 1.8 m while improving cooling efficiency by 10–20%. Integration with drone platforms and adaptive feedback systems enhances fire extinguishing energy efficiency by over 30%. …”
    Get full text
    Article
  3. 10743

    Model order reduction of boiler system using nature-inspired metaheuristic optimization of PID controller by Anurag Singh, Shekhar Yadav, Nitesh Tiwari, Dinesh Kumar Nishad, Saifullah Khalid

    Published 2025-04-01
    “…The HHO-based approach improves overall performance by 15%, while SSO significantly reduces computational complexity by 65% while maintaining 98% system accuracy. …”
    Get full text
    Article
  4. 10744

    A lightweight and optimized deep learning model for detecting banana bunches and stalks in autonomous harvesting vehicles by Duc Tai Nguyen, Phuoc Bao Long Do, Doan Dang Khoa Nguyen, Wei-Chih Lin

    Published 2025-08-01
    “…Developing algorithms to identify fruit cutting locations is important for the functionality of harvesting robots. …”
    Get full text
    Article
  5. 10745

    Financial service composition with various privacy levels in multiple cloud environment by Xianmei Hua, Xinrong Zhan, Feng Li, Junwen Lu

    Published 2025-02-01
    “…To solve these challenges, a novel approach for financial service composition based on Quaternion Genetic Algorithms (QGA) is proposed. Our method optimizes the scheduling of cloud-based services to minimize execution time, energy consumption, and the file size transferred between clouds, while meeting specified privacy requirements. …”
    Get full text
    Article
  6. 10746

    Digital culture in the light of educational processes. Ad vocem for the remarks and musings of Jordan Shapiro concerning the digital childhood by Łukasz Androsiuk, Małgorzata Obrycka

    Published 2025-06-01
    “…The aim of this article is to analyze Jordan Shapiro’s concept of digital childhood and to critically engage with some of its fundamental assumptions. While the authors share the conviction that digital culture plays a crucial role in both institutional and non-institutional education, they emphasize, more than Shapiro does, its structural conditions, including algorithmic control mechanisms and the commercialization of educational processes. …”
    Get full text
    Article
  7. 10747

    Thermal damage detection of EAST internal component based on machine learning by Zhongfang Guan, Bin Zhang, Jian Liu, Jinping Qian, Xianzu Gong, Runze Chen, Zuhao Wang, Binfu Gao, Yutong Guo, Chuannan Xuan, Cong Cao, Tianqi Jia, Pan Li, Wenbin Liu, Wei Wang, Yunchan Hu, Yifan He, Kangjia Yang, Wenyi Lu, Chunyu He, the EAST team

    Published 2025-01-01
    “…The AI-based detection method provides a new solution to safeguarding the fusion device, while also offering potential avenues for integrating artificial intelligence technologies into EAST feedback control and operating systems in the future.…”
    Get full text
    Article
  8. 10748
  9. 10749

    Numerical Investigation of Large Wood Evolution Characteristics Transported by Flash Floods by SONG Siyuan, FEI Gaogao, WANG Xiekang

    Published 2024-01-01
    “…The two-way coupling algorithm can reflect the influence of large wood on water flow, thereby allowing the analysis of backwater rise problems caused by logjams. …”
    Get full text
    Article
  10. 10750
  11. 10751

    Oral contrast-enhanced ultrasonographic features and radiomics analysis to predict NIH risk stratification for gastrointestinal stromal tumors by Fan Yang, Fan Yang, Fan Yang, Fan Yang, Chun-wei Liu, Dai Zhang, Dai Zhang, Dai Zhang, Dai Zhang, Hai-Ling Wang, Hai-Ling Wang, Hai-Ling Wang, Hai-Ling Wang, Xi Wei, Xi Wei, Xi Wei, Xi Wei, Mo Yang, Mo Yang, Mo Yang

    Published 2025-07-01
    “…The clinical profiles, oral contrast-enhanced ultrasonography (CEUS), and endoscopic ultrasound (EUS) imaging data were collected. 105 patients with high-risk and moderate-risk GISTs were classified into the high-risk group, while 99 patients with low-risk and very-low-risk GISTs were classified into the low-risk group. …”
    Get full text
    Article
  12. 10752

    On Remoteness Functions of <i>k</i>-NIM with <i>k</i> + 1 Piles in Normal and in Misère Versions by Vladimir Gurvich, Vladislav Maximchuk, Georgy Miheenkov, Mariya Naumova

    Published 2024-11-01
    “…For <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>n</mi><mo>=</mo><mn>5</mn><mo>,</mo><mn>6</mn></mrow></semantics></math></inline-formula>, a polynomial algorithm computing P-positions was obtained for the normal version. …”
    Get full text
    Article
  13. 10753
  14. 10754

    Classical Benchmarks for Variational Quantum Eigensolver Simulations of the Hubbard Model by Antonios M. Alvertis, Abid Khan, Thomas Iadecola, Peter P. Orth, Norm Tubman

    Published 2025-05-01
    “…While these algorithms have been shown to reproduce the qualitative features of the Hubbard model, their quantitative accuracy in terms of producing true ground state energies and other properties, and the dependence of this accuracy on the system size and interaction strength, the choice of variational ansatz, and the degree of spatial inhomogeneity in the model, remains unknown. …”
    Get full text
    Article
  15. 10755

    Multi-Objective Performance Evaluation Framework for Integrated Fiber-Reinforced Shading Systems by Salman Oukati Sadegh, Emad Tabadkani, Mahmoud Oukati Sadegh

    Published 2025-03-01
    “…The proposed framework benefits from integrating Multi-objective Evolutionary Algorithms (MOEAs). Such algorithms have proven to address conflicting parameters effectively while providing a range of different solutions to problems. …”
    Get full text
    Article
  16. 10756

    Hybrid Filtering Technique for Accurate GNSS State Estimation by Jahnvi Verma, Nischal Bhattarai, Thejesh N. Bandi

    Published 2025-04-01
    “…For the real-world dynamic dataset, our method also provides a better fit to the measurements than the classical algorithms.…”
    Get full text
    Article
  17. 10757

    Can Knowledge Distillation Enable Seismic Interpolation, Super-Resolution, and Denoising Simultaneously? by Benwen Zhang, Linrong Wang

    Published 2025-01-01
    “…For comparison, we combine three interpolation algorithms with three super-resolution algorithms and select the one with the best performance. …”
    Get full text
    Article
  18. 10758

    Pharmacotherapeutic Options for Ophthalmic Conjunctivitis by A. D. van Eyk

    Published 2018-06-01
    “…Herpes simplex and Herpes zoster are the infective organisms also responsible for conjunctivitis while seasonal pollens are usually the cause for allergic conjunctivitis. …”
    Get full text
    Article
  19. 10759

    A network intrusion detection method designed for few-shot scenarios by Weichen HU, Congyuan XU, Yong ZHAN, Guanghui CHEN, Siqing LIU, Zhiqiang WANG, Xiaolin WANG

    Published 2023-10-01
    “…Existing intrusion detection techniques often require numerous malicious samples for model training.However, in real-world scenarios, only a small number of intrusion traffic samples can be obtained, which belong to few-shot scenarios.To address this challenge, a network intrusion detection method designed for few-shot scenarios was proposed.The method comprised two main parts: a packet sampling module and a meta-learning module.The packet sampling module was used for filtering, segmenting, and recombining raw network data, while the meta-learning module was used for feature extraction and result classification.Experimental results based on three few-shot datasets constructed from real network traffic data sources show that the method exhibits good applicability and fast convergence and effectively reduces the occurrence of outliers.In the case of 10 training samples, the maximum achievable detection rate is 99.29%, while the accuracy rate can reach a maximum of 97.93%.These findings demonstrate a noticeable improvement of 0.12% and 0.37% respectively, in comparison to existing algorithms.…”
    Get full text
    Article
  20. 10760

    An optimized elliptic curve digital signature strategy for resource-constrained devices by Nawras H. Sabbry, Alla Levina

    Published 2025-07-01
    “…Abstract Ensuring robust security in resource-constrained environments, such as microcontrollers used in Unmanned Vehicle systems (UVS), poses significant challenges due to the computational and memory demands of cryptographic algorithms. This research addresses these challenges by proposing an optimized ECC digital signature method designed for such environments. …”
    Get full text
    Article