Showing 54,781 - 54,800 results of 56,283 for search 'Computex~', query time: 3.31s Refine Results
  1. 54781
  2. 54782
  3. 54783

    E-Commerce Fraud Detection Based on Machine Learning Techniques: Systematic Literature Review by Abed Mutemi, Fernando Bacao

    Published 2024-06-01
    “…Advances in artificial intelligence, Machine Learning (ML), and cloud computing have revitalized research and applications in this domain. …”
    Get full text
    Article
  4. 54784
  5. 54785

    Newly developed genomic SSR markers revealed the population structure and genetic characteristics of abaca (Musa textilis Nee) by Mariecris Rizalyn R. Mendoza, Antonio C. Laurena, Maria Genaleen Q. Diaz, Eureka Teresa M. Ocampo, Tonette P. Laude, Antonio G. Lalusin

    Published 2024-12-01
    “…Our study highlights the diversity, identity, and genetic variation within the abaca collection using accurate, robust, cost-effective, and computationally simple genome-specific markers. These markers are pivotal for genetic studies of abaca, including trait-marker mapping and the differentiation of accessions even in the juvenile stage, when phenotypic differences may be subtle.…”
    Get full text
    Article
  6. 54786

    Adaptive Spatial Regularization Target Tracking Algorithm Based on Multifeature Fusion by Turdi Tohti, Xifeng Guo, Askar Hamdulla

    Published 2022-01-01
    “…It is verified that the improved model not only improves the robustness of the algorithm but also can better adapt to the changes of the target, while effectively reducing the computational overhead and meeting the tracking real-time requirements.…”
    Get full text
    Article
  7. 54787

    Problematic issues of using modern information and other technologies in the implementation of investigator’s and interrogator’s instructions by operational units by O. O. Zahumennyi

    Published 2022-03-01
    “…In the conduct of any investigative (searching) activities in practice, in fact, either technical devices and tools or information technology are used in the sense in which they are proposed in the Code and which cause difficulties in use, especially modern latest information technology in the form of computing hardware and software. It is concluded that the appropriate use of modern information technology, open network resources, government or commercial databases, as well as modern approaches to the implementation of the instructions of investigators and interrogators significantly speed up the pre-trial investigation, as operational units have the opportunity to obtain information in a short period of time, using the capabilities of innovative modern technologies. …”
    Get full text
    Article
  8. 54788

    An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security by Mouaad Mohy-Eddine, Azidine Guezzaz, Said Benkirane, Mourade Azrour, Yousef Farhaoui

    Published 2023-09-01
    “…We combine Isolation Forest (IF) with Pearson’s Correlation Coefficient (PCC) to reduce computational cost and prediction time. IF is exploited to detect and remove outliers from datasets. …”
    Get full text
    Article
  9. 54789

    Deep learning based analysis of G3BP1 protein expression to predict the prognosis of nasopharyngeal carcinoma. by Linshan Zhou, Mu Yang, Jiadi Luo, Hongjing Zang, Songqing Fan, Yuting Zhan

    Published 2025-01-01
    “…<h4>Conclusion</h4>Computational pathology emerges as a transformative tool capable of substantially reducing the burden on pathologists while concurrently enhancing and diagnostic sensitivity and specificity. …”
    Get full text
    Article
  10. 54790
  11. 54791
  12. 54792

    An Optimization Method for the Train Service Network Design Problem by Jie Xiao, Yi Xie, Haowei Yu, Hongying Yan

    Published 2020-01-01
    “…To demonstrate the proposed model and the algorithm, a case study on a real-world sub-network in China is carried out. The computational results show that the proposed approach can obtain high-quality solutions with satisfactory speed. …”
    Get full text
    Article
  13. 54793

    Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm by Saite CHEN, Weihai LI, Yuanzhi YAO, Nenghai YU

    Published 2023-06-01
    “…The use of location-based service brings convenience to people’s daily lives, but it also raises concerns about users’ location privacy.In the k-nearest neighbor query problem, constructing K-anonymizing spatial regions is a method used to protects users’ location privacy, but it results in a large waste of communication overhead.The SpaceTwist scheme is an alternative method that uses an anchor point instead of the real location to complete the k-nearest neighbor query,which is simple to implement and has less waste of communication overhead.However,it cannot guarantee K-anonymous security, and the specific selection method of the anchor point is not provided.To address these shortcomings in SpaceTwist, some schemes calculate the user’s K-anonymity group by introducing a trusted anonymous server or using the way of user collaboration, and then enhance the end condition of the query algorithm to achieve K-anonymity security.Other schemes propose the anchor point optimization method based on the approximate distribution of interest points, which can further reduce the average communication overhead.A lightweight K-anonymity incremental nearest neighbor (LKINN) location privacy protection algorithm was proposed to improve SpaceTwist.LKINN used convex hull mathematical tool to calculate the key points of K-anonymity group, and proposed an anchor selection method based on it, achieving K-anonymity security with low computational and communication costs.LKINN was based on a hybrid location privacy protection architecture, making only semi-trusted security assumptions for all members of the system, which had lax security assumptions compared to some existing research schemes.Simulation results show that LKINN can prevent semi-trusted users from stealing the location privacy of normal users and has smaller query response time and communication overhead compare to some existing schemes.…”
    Get full text
    Article
  14. 54794

    Optimizing humidification–dehumidification desalination systems: Impact of nozzle position and geometric configuration on performance and efficiency by Mohammad Alrbai, Ahmad Al Masri, Dareen Makawii, Ali Alahmer

    Published 2025-03-01
    “…Furthermore, the study compares bottom-nozzle and top-nozzle configurations in both the humidifier and dehumidifier units to evaluate their impact on heat transfer, moisture absorption, and water recovery. Computational Fluid Dynamics (CFD) simulations in ANSYS Fluent® were employed to model fluid dynamics, heat, and mass transfer, while the Discrete Phase Model (DPM) simulated water jet nozzle injections. …”
    Get full text
    Article
  15. 54795

    Spatio-Temporal Segmented Traffic Flow Prediction with ANPRS Data Based on Improved XGBoost by Bo Sun, Tuo Sun, Pengpeng Jiao

    Published 2021-01-01
    “…The experiment results indicate that the proposed framework is convincing, satisfactory, and computationally reasonable.…”
    Get full text
    Article
  16. 54796

    Estimating the Torsional Capacity of Reinforced Concrete Beams Using ANFIS Models by Zhao Wenwu, Zeng Shaowu, Gong Guilin, Li Qiangqiang, Li Kexing

    Published 2024-09-01
    “…To overcome this limitation, accurate Machine Learning (𝑀𝐿) models might replace more sophisticated and computationally intensive models. This work evaluates and determines the most effective tree-based machine learning algorithms to estimate the torsional capacity (𝑇𝑟) of 𝑅𝐶 beams subjected to pure torsion. …”
    Get full text
    Article
  17. 54797

    Exploring the Influence of Lateral Conductivity Contrasts on the Storm Time Behavior of the Ground Electric Field in the Eastern United States by Elena Marshalko, Mikhail Kruglyakov, Alexey Kuvshinov, Benjamin S. Murphy, Lutz Rastätter, Chigomezyo Ngwira, Antti Pulkkinen

    Published 2020-03-01
    “…This result is of special importance since the computation of GICs relies on integrals of the GEF (voltages), but not on the GEF itself. …”
    Get full text
    Article
  18. 54798

    Investigation of the Pulmonary Artery Hypertension Using an Ad Hoc OpenFOAM CFD Solver by Francesco Duronio, Paola Marchetti

    Published 2024-12-01
    “…Cardiovascular diseases are a group of disorders that affect the heart and blood vessels, representing a leading cause of death worldwide. With the help of computational fluid dynamics, it is possible to study the hemodynamics of the pulmonary arteries in detail and simulate various physiological conditions, thus offering numerous advantages over invasive analyses in the phases of diagnosis and surgical planning. …”
    Get full text
    Article
  19. 54799

    Optimization of hydrocyclon for phosphatic rock separation using CFD by Felipe Orlando da Costa, Felipe Leonardo Barcelos Mateus, Irineu Petri Júnior

    Published 2021-08-01
    “…This work aimed to use the computational fluid dynamics to study different multiphase models to represent the hydrocyclones, as well as modifications to its geometry to increase its efficiency. …”
    Get full text
    Article
  20. 54800

    COVID-19 World Vaccine Adverse Reactions Based on Machine Learning Clustering Algorithm by Lozan M. Abdulrahman, Adnan Mohsin Abdulazeez, Dathar A. Hasan

    Published 2021-05-01
    “…Clustering algorithms have been used in computational intelligence and digital analysis, which is one of the areas that has taken this into account. …”
    Get full text
    Article