-
10041
Terminal ileitis: Questions of differential diagnosis and prospects for treatment. A review
Published 2025-01-01“…The article is devoted to the development of an algorithm for the diagnosis and treatment of ITI, which determines its relevance. …”
Get full text
Article -
10042
Uncovering causal graphs in air traffic control communication logs for explainable root cause analysis
Published 2025-07-01“…This paper presents a novel approach for identifying system topology and detecting causal relationships between servers in Air Traffic Control systems (ATC) by utilizing unstructured, raw communication logs. …”
Get full text
Article -
10043
Decoding Anomalous Diffusion Using Higher-Order Spectral Analysis and Multiple Signal Classification
Published 2025-02-01“…Specifically, we propose the use of higher-order statistics, such as the bispectrum, and a hybrid algorithm that combines kurtosis with a multiple-signal classification technique. …”
Get full text
Article -
10044
Comparative Study of CNN Architectures for Brain Tumor Classification Using MRI: Exploring GradCAM for Visualizing CNN Focus
Published 2025-02-01“…Brain cancer, with its varied nature, demands early detection for timely treatment. This study aims to refine the diagnosis of brain tumors using convolutional neural network algorithms. …”
Get full text
Article -
10045
Pathogenesis and clinical significance of atrial fibrillation in myocardial infarction
Published 2021-03-01“…Currently, there is no information in novel clinical guidelines on the importance of active detection of atrial fibrillation (AF) in myocardial infarction (MI), as well as on the management of such patients. …”
Get full text
Article -
10046
Assessing Similarity Between Datasets Using Vector Representations
Published 2025-07-01“…The article considers an approach to determining the similarity of datasets for training algorithms using datasets with human faces as an example. …”
Get full text
Article -
10047
Transverse cracking in glass fibre-reinforced composites monitored with synchrotron X-ray multi-projection imaging
Published 2025-02-01“…An extensive data set was gathered to make a 3D reconstruction of the crack evolution over time using XMPI and machine learning-based reconstruction algorithms. …”
Get full text
Article -
10048
Deep learning and hyperspectral features for seedling stage identification of barnyard grass in paddy field
Published 2025-02-01“…Barnyard grass, a pernicious weed thriving in rice fields, poses a significant challenge to agricultural productivity. Detection of barnyard grass before the four-leaf stage is critical for effective control measures. …”
Get full text
Article -
10049
Dark Energy Survey Year 6 Results: Synthetic-source Injection Across the Full Survey Using Balrog
Published 2025-05-01“…Within the Dark Energy Survey (DES), SSI plays a critical role in characterizing all necessary algorithms used in converting images to catalogs, and in deriving quantities needed for the cosmology analysis, such as object detection rates, galaxy redshift estimation, galaxy magnification, star-galaxy classification, and photometric performance. …”
Get full text
Article -
10050
Increasing use of artificial intelligence in genomic medicine for cancer care- the promise and potential pitfalls
Published 2025-04-01“…Artificial intelligence thrives on data, processing and learning from datasets with a degree of accuracy and efficiency that traditional computing algorithms can not achieve. Based on a patient’s genome sequence, AI could allow earlier detection of cancer, inform personalised treatment plans and provide insights into prognostication. …”
Get full text
Article -
10051
Dependable identity recognition and authorization based on visual information
Published 2020-11-01“…Recently,deep learning has been widely applied to video and image based identity recognition and authorization tasks,including face recognition and person identification.However,machine learning models,especially deep learning models,can be easily fooled by adversarial attacks,which may cause the identity recognition systems to make a wrong decision.Therefore,dependable identity recognition and authorization has become one of the hot topics currently.Recent advances on dependable identity recognition and authorization from both information space and physical space were presented,where the development of the attack models on face detection,face recognition,person re-identification,and face anti-spoofing as well as printable adversarial patches were introduced.The algorithms of visual identity anonymization and privacy protection were further discussed.Finally,the datasets,experimental protocols and performance of dependable identity recognition methods were summarized,and the possible directions in the future research were presented.…”
Get full text
Article -
10052
Blockchain based solid waste classification with AI powered tracking and IoT integration
Published 2025-04-01“…IoT-connected bins transmit data to a central server, which uses blockchain to ensure secure, transparent data storage. AI algorithms, including machine learning (ML) and deep learning (DL), classify waste in real-time, optimizing waste collection and recycling. …”
Get full text
Article -
10053
Overbounding of Near Real-Time Estimated Ionospheric Gradient Slope in Low-Latitude Regions
Published 2025-03-01“…This paper proposes to expand this approach by including the derivation of an uncertainty model for the estimated gradient slope, allowing the threat model to be substituted with the near real-time estimated and overbounded gradient slope in current GBAS algorithms. Evaluations with simulated and real anomalous gradients produced by equatorial plasma bubbles demonstrate the efficacy of this methodology, indicating its potential to enhance GBASs by dynamically detecting, estimating, and overbounding the estimated anomalous gradients instead of relying solely on worst-case models, thus improving system availability and continuity.…”
Get full text
Article -
10054
Enhanced Neutrosophic Set and Machine Learning Approach for Breast Cancer Prediction
Published 2024-11-01“…When trained on the N-dataset instead of traditional datasets, ML algorithms such as Decision Tree (DT), Random Forest (RF), and Adaptive Boosting (AdaBoost) perform better. …”
Get full text
Article -
10055
Les machines y voient-elles quelque chose ?
Published 2021-12-01“…But does this mean that machines really can see, or is computer vision just a fancy metaphor for object detection? This paper aims to provide a reasoned answer to the question. …”
Get full text
Article -
10056
Study of Driving Fatigue Alleviation by Transcutaneous Acupoints Electrical Stimulations
Published 2014-01-01“…Performances of the two algorithms (θ+α)/(α+β) and θ/β are also assessed as possible indicators for fatigue detection. …”
Get full text
Article -
10057
Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography
Published 2019-01-01“…In the encryption system, a plurality of light paths are set, and the Hadamard basis patterns are used for illumination, so that each light path is concentrated in a bucket detector to obtain intensity values of all images. Then, all the detected intensity values are encrypted by using public key cryptography algorithm to obtain the final ciphertext. …”
Get full text
Article -
10058
Bootstrap Confidence Intervals for Multiple Change Points Based on Two-Stage Procedures
Published 2025-05-01“…Specifically, we exploit an orthogonal greedy algorithm to recover the number of change points consistently in the cutting stage, and employ the sup-Wald-type test statistic to determine the locations of multiple change points in the refinement stage. …”
Get full text
Article -
10059
Web Spider Defense Technique in Wireless Sensor Networks
Published 2014-07-01“…Generally, when an intruder is detected in the WSN, its connection is immediately stopped. …”
Get full text
Article -
10060
Influence of Aerobic Exercise Load Intensity on Children’s Mental Health
Published 2022-01-01“…This technique includes several commonly used and improved video analysis algorithms. The use of moving target and tracking technology and algorithms can completely extract moving targets, eliminate the phenomenon of void and nothingness, and improve data acquisition and analysis capabilities. …”
Get full text
Article