Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
26781
Evolutionary Game Analysis of Citizen Data Collection Under Different Reward- Penalty Mechanisms
Published 2024-01-01“…The focus is on comparing and analyzing evolutionarily stable strategies of a collector and a citizen, followed by computational simulations. Key findings include: 1) Under no reward-penalty and static reward-penalty mechanisms, evolutionarily stable strategies typically result in either consistently active or consistently passive behaviors by both the collector and the citizen. …”
Get full text
Article -
26782
RELIABILITY ANALYSIS OF TELESCOPIC ARM OF PIELINE-CATCHING VEHICLE BASED ON SEMI-SUPERVISED DEEP NEURAL NETWORK
Published 2025-08-01“…Traditional methods for reliability face challenges like high computational costs and low accuracy dealing with multidimensional uncertainties. …”
Get full text
Article -
26783
Development and Analysis of a Methodology for Selecting Infrastructure Metrics for Predictive Incident Monitoring
Published 2025-04-01“…The methodology is integrated into an industrial data processing pipeline (Prometheus → Kafka → Spark 3.5 → MLflow 2.11) and aligns with the data minimization principle outlined in GOST R 57580.1-2017 and FSTEC guidelines for information protection.…”
Get full text
Article -
26784
Application of fuzzy credibility graph in climate mitigation strategy assessment
Published 2025-08-01“…For this, we collect the expert information and the fuzzy credibility edges information about the climate change mitigation strategies, and process the proposed model to compute the relative closeness of the alternatives and identify the most suitable climate change mitigation strategy. …”
Get full text
Article -
26785
-
26786
Energy analysis and feasibility of using solar energy in the novel hybrid system of a solar hot plate dryer in Iran
Published 2024-12-01“…Abstract The drying process in agriculture is energy-intensive and traditionally relies on fossil fuels, which are becoming less reliable and more expensive. …”
Get full text
Article -
26787
Stochastic Fractal Search for Bayesian Network Structure Learning Under Soft/Hard Constraints
Published 2025-06-01“…A Bayesian network (BN) is an uncertainty processing model that simulates human cognitive thinking on the basis of probability theory and graph theory. …”
Get full text
Article -
26788
Enhancement of electric field uniformity using 3-phase circular electrodes in RF heating applications
Published 2025-02-01“…Abstract This paper introduces a novel electrode structure designed to enhance electric field uniformity in radio frequency heating applications, such as food processing. The proposed 3-phase circular electrode structure, the top electrode, consists of innermost, middle, and outermost electrodes, with each electrode supplied with a voltage of a different phase. …”
Get full text
Article -
26789
Urban change detection with airborne LiDAR for hostilities’ impact estimation: a case study of Kharkiv
Published 2025-12-01“…Statistical characteristics of computed urban changes reveal distinct spatial patterns, enabling differentiation between the routine urban development observed in Tallinn, Estonia, and the war-affected Kharkiv. …”
Get full text
Article -
26790
Gravitational entropy is observer-dependent
Published 2025-07-01“…Our work makes extensive use of the formalism of quantum reference frames (QRF); indeed, as we point out, the ‘observers’ considered here and in the previous works are nothing but QRFs. In the process, we demonstrate that the description of physical states and observables invoked by Chandrasekaran et al. [1] is equivalent to the Page-Wootters formalism, leading to the informal slogan “PW = CLPW”. …”
Get full text
Article -
26791
Psychosocial impact of dental aesthetics among sudanese high school students.
Published 2016-07-01“…Dental aesthetics were assessed by the IOTN Aesthetic Component (self-rated IOTN-AC). The data was processed and analyzed using computer software program “SPSS” (Statistical Package for Social Sciences) version 17. …”
Get full text
Article -
26792
Transfer learning strategies for neural networks: A case study in amine gas treating units
Published 2024-12-01“…This work presents a framework where strategies are applied within a workflow created to enhance the accuracy and transferability of the transfer learning process. We used a case study for predicting corrosion rates in gas-treating units, employing datasets from two different amines (A and B), where the amine A dataset is large compared to the amine B dataset. …”
Get full text
Article -
26793
Architectural design methods based on image recognition technology and virtual VR
Published 2025-06-01“…The combination of visible image recognition and augmented reality can achieve intelligent processing and application of drawing information, improve design efficiency and quality, and optimize design experience.…”
Get full text
Article -
26794
Effect of Low-Dose MDCT and Iterative Reconstruction on Trabecular Bone Microstructure Assessment.
Published 2016-01-01“…We investigated the effects of low-dose multi detector computed tomography (MDCT) in combination with statistical iterative reconstruction algorithms on trabecular bone microstructure parameters. …”
Get full text
Article -
26795
Automatic eddy detection in the MIZ based on YOLO algorithm and SAR images
Published 2025-06-01“…Thus, we explored the feasibility of automating the eddy detection process by applying YOLOv8, a state-of-the-art computer vision model, to high-resolution synthetic aperture radar data, specifically targeting the dynamic region of the Fram Strait. …”
Get full text
Article -
26796
Machine learning with knowledge constraints for design optimization of microring resonators as a quantum light source
Published 2025-01-01“…Abstract With careful design and integration, microring resonators can serve as a promising foundation for developing compact and scalable sources of non-classical light for quantum information processing. However, the current design flow is hindered by computational challenges and a complex, high-dimensional parameter space with interdependent variables. …”
Get full text
Article -
26797
Comparison of various machine learning regression models based on Human age prediction
Published 2022-11-01“…Recent advancements in machine learning have made it possible for computers to anticipate classification and prediction outcomes more accurately than humans. …”
Get full text
Article -
26798
Qualitative and Quantitative Assessment of the Regenerate Bone Formed During Intramedullary Limb Lengthening Using a Goat (Caprine) Tibia Model: A Pilot Study
Published 2024-12-01“…Introduction: With the increasing popularity of intramedullary limb lengthening, it has been observed that the regenerate bone formed during this process appears visually different from the regenerate bone formed during extramedullary limb lengthening using external fixators. …”
Get full text
Article -
26799
AI-Driven Gamification and Biotechnical Systems in Cardiovascular Monitoring of Cyclic Sport Athletes
Published 2025-01-01“…Additionally, the analytical hierarchy process (AHP) framework is used to organize a systematic evaluation of predictive modeling techniques to identify some best practices related to specific biométrie parameters and athlete performance metrics.This methodological application then furthers the examination of the physiological and computational implications related to the use of AI-driven cardiovascular monitoring in terms of accuracy, efficiency, and adaptability. …”
Get full text
Article -
26800
A lightweight framework to secure IoT devices with limited resources in cloud environments
Published 2025-07-01“…Abstract Billions of IoT devices increasingly function as gateways to cloud infrastructures, making them an inevitable target of cyber threats because of the limited resources and low processing capabilities of IoT devices. This paper proposes a lightweight decision tree-based intrusion detection framework suitable for real-time anomaly detection in a resource-constrained IoT environment. …”
Get full text
Article