-
1741
An Improved Integrity Monitoring Algorithm for GNSS Receiver
Published 2021-06-01“…In view of the problem that the availability judgment process of traditional GNSS receiver integrity monitoring algorithm is too conservative,and the error protection level value is too large,resulting in poor availability,the availability judgment process of the traditional algorithm is optimized,the dynamic allocation method of the missed detection rate according to difficulty of satellite fault detection,and corresponding calculation method about VPL are given. …”
Get full text
Article -
1742
A New Approach Based on Metaheuristic Optimization Using Chaotic Functional Connectivity Matrices and Fractal Dimension Analysis for AI-Driven Detection of Orthodontic Growth and D...
Published 2025-02-01“…Feature selection was performed using a wrapper-based approach combining k-nearest neighbors (kNN) and the Puma optimization algorithm, which efficiently handles the chaotic and computationally complex nature of cervical vertebrae images. …”
Get full text
Article -
1743
Development of AI in the Caribbean: algorithms, challenges and recommendations
Published 2025-03-01“…This article provides a concise overview, explicitly delving into popular AI algorithms employed in developing Anomaly Detection Systems (ADSs) applicable to Cyber-Physical Systems (CPSs), the state of AI and guidelines for adopting AI within the Caribbean region.…”
Get full text
Article -
1744
Prediction of Hypertension Patients with Machine Learning Algorithm
Published 2025-06-01“…These algorithms can predict hypertension risk based on clinical data, such as age, medical history, and lifestyle. …”
Get full text
Article -
1745
Parallelization of the Bison Algorithm Applied to Data Classification
Published 2024-11-01“…Classification algorithms, in particular, play a crucial role in a wide range of applications, from image recognition and natural language processing to fraud detection and medical diagnosis. …”
Get full text
Article -
1746
Research on Spam Filters Based on NB Algorithm
Published 2025-01-01“…The SpamAssassin dataset is used in this study to explore the use of the Naive Bayes (NB) algorithm for spam detection. The algorithm demonstrated high accuracy and efficiency in classifying large-scale text data, achieving an accuracy of 97.74%, a recall rate of 96.60%, and a precision rate of 96.8%, with an F1 score of 0.97. …”
Get full text
Article -
1747
Data Validation Algorithm for Wireless Sensor Networks
Published 2013-12-01“…Compared to other methods, the proposed novel data validation algorithm is effective in detecting different types of data faults and reports high fault detection rate by eliminating false positives.…”
Get full text
Article -
1748
Traffic Management System Using YOLO Algorithm
Published 2024-01-01“…This was accomplished using the cutting-edge, real-time object detection system You Only Look Once (YOLO), which is built on deep convolutional neural networks. …”
Get full text
Article -
1749
A Cuckoo Search Algorithm for Multimodal Optimization
Published 2014-01-01“…On the other hand, the cuckoo search (CS) algorithm is a simple and effective global optimization algorithm which can not be directly applied to solve multimodal optimization problems. …”
Get full text
Article -
1750
Review of Multivariate Time Series Clustering Algorithms
Published 2025-03-01“…For each category of detection technology, a detailed summary is provided, covering algorithm principles, representative methods, advantages and disadvantages, and the problems they address. …”
Get full text
Article -
1751
Multifactor Algorithm for Test Case Selection and Ordering
Published 2021-06-01“…Moreover, evolutionary algorithms such as the genetic process often help in depleting test cases, together with a concurrent decrease in computational runtime. …”
Get full text
Article -
1752
An intelligent algorithm for identifying dropped blocks in wellbores
Published 2025-04-01“…Real-time monitoring of wellbore stability during drilling is crucial for the early detection of instability and timely interventions. …”
Get full text
Article -
1753
Enhanced YOLOv8 with lightweight and efficient detection head for for detecting rice leaf diseases
Published 2025-07-01“…However, the diversity of these diseases, their uneven distribution, and complex field environments create challenges for precise, multi-scale detection. While YOLO object detection algorithms show strong performance in automated detection, their feature extraction capabilities remain limited in complex agricultural settings. …”
Get full text
Article -
1754
Dual-hybrid intrusion detection system to detect False Data Injection in smart grids.
Published 2025-01-01“…Traditional Intrusion Detection Systems (IDS) often fall short in identifying sophisticated FDIAs due to their reliance on predefined rules and signatures. …”
Get full text
Article -
1755
Improved Optimized Minimum Generalized L<sub>p</sub>/L<sub>q</sub> Deconvolution and Application to Bearing Fault Detection
Published 2025-03-01Subjects: Get full text
Article -
1756
Algorithmic bias and the Value Sensitive Design approach
Published 2020-12-01“…Recently, amid growing awareness that computer algorithms are not neutral tools but can cause harm by reproducing and amplifying bias, attempts to detect and prevent such biases have intensified. …”
Get full text
Article -
1757
OPTIMIZATION OF THE PROBABILISTIC ALGORITHM FOR RESOLVING AIRSPACE CONFLICTS
Published 2020-12-01“…In this proposed new form, the algorithm takes into account the previously detected problems and proposes to solve all these problems that inevitably appeared in the process of scientific research.…”
Get full text
Article -
1758
Diagnostic algorithm for axial involvement in psoriatic arthritis
Published 2025-03-01“…The aim – to develop a unified diagnostic algorithm for axial psoriatic arthritis (axPsA).Subjects and methods. 122 patients with psoriatic arthritis (PsA), duration less than 10 years, were included in the study according to CASPAR (The ClASsification for Psoriatic ARthritis) criteria, provided they also had axial involvement. …”
Get full text
Article -
1759
Information Hiding Based on Chan-Vese Algorithm
Published 2011-12-01“…The process of data transfer via the Internet becomes an easy process as a result of the great advances in networking technologies, and now many people can communicate with each other easily and quickly through them.Because the online environment is general and open, the unauthorized one can control information were transmitted between any two parts and interception of getting access for it, because of that there is an emergency need for write covered, which is the science of hiding secret information in a digital cover such as an images, so it is impossible for the normal person and others unauthorized to detected or perceives. In this paper, the technology in the field of information hiding in the images is developed, where first, the cover (PNG, BMP) image is segmented using Chan-Vese algorithm, then the text will hide in the segmented image depending on the areas of clipping.The standards (PSNR, BER) are used to measure technical efficiency. …”
Get full text
Article -
1760
An effective algorithm for measuring diastolic artery diameters
Published 2014-01-01Get full text
Article