-
501
A Compact UWB Indoor and Through-Wall Radar with Precise Ranging and Tracking
Published 2012-01-01“…Theoretical analysis for the algorithms and their evaluations by measurements are presented in the paper. …”
Get full text
Article -
502
Soft Schemes for Earthquake-Geotechnical Dilemmas
Published 2013-01-01“…Considering the strengths and weaknesses of the algorithms, in this work a criterion to leverage the best features to develop efficient hybrid models is presented. …”
Get full text
Article -
503
CUR matrix approximation through convex optimization for feature selection
Published 2025-08-01“…Work on the CUR matrix approximation has generally focused on algorithm development, theoretical guarantees, and applications. …”
Get full text
Article -
504
Exploration of Advanced Applications of Triboelectric Nanogenerator-Based Self-Powered Sensors in the Era of Artificial Intelligence
Published 2025-04-01“…This review offers theoretical and technical insights into the collaborative innovation of Deep Learning and self-powered sensor technologies, paving the way for the development of next-generation intelligent systems.…”
Get full text
Article -
505
Applications of molecular dynamics in nanomaterial design and characterization - A review
Published 2025-05-01“…In conclusion, the present review highlights the critical role assigned to MD simulations to foster the development of nanosized materials, connecting experimental and theoretical efforts. …”
Get full text
Article -
506
Petri graph neural networks advance learning higher order multimodal complex interactions in graph structured data
Published 2025-05-01“…The work opens new directions in learning over complex structures, transcending transformer-based and traditional hypergraph-based algorithms. We validate results through theoretical analysis and real-world experiments, while demonstrating superior performance in, e.g., stock market prediction.…”
Get full text
Article -
507
Melanoma Skin Lesion Classification Using Neural Networks: A systematic review
Published 2022-12-01“…Based on the decision fusion, theoretical and applied contributions were studied using traditional classification algorithms and multiple neural networks. …”
Get full text
Article -
508
Web Application for Mathematical Modeling of Unsteady Oil Flow in Porous Medium
Published 2023-12-01“…Therefore, mathematical setting of problems related to the account of unsteady fluid flow, the development of effective numerical methods and algorithms, their solution using modern web technologies are pressing. …”
Get full text
Article -
509
Survey of artificial intelligence data security and privacy protection
Published 2021-02-01“…Artificial intelligence and deep learning algorithms are developing rapidly.These emerging techniques have been widely used in audio and video recognition, natural language processing and other fields.However, in recent years, researchers have found that there are many security risks in the current mainstream artificial intelligence model, and these problems will limit the development of AI.Therefore, the data security and privacy protection was studied in AI.For data and privacy leakage, the model output based and model update based problem of data leakage were studied.In the model output based problem of data leakage, the principles and research status of model extraction attack, model inversion attack and membership inference attack were discussed.In the model update based problem of data leakage, how attackers steal private data in the process of distributed training was discussed.For data and privacy protection, three kinds of defense methods, namely model structure defense, information confusion defense and query control defense were studied.In summarize, the theoretical foundations, classic algorithms of data inference attack techniques were introduced.A few research efforts on the defense techniques were described in order to provoke further research efforts in this critical area.…”
Get full text
Article -
510
Initial Recognition of Convertible Bonds in Accordance with IFRS: the Issuer’s Party
Published 2024-06-01“…The purpose of the work is to develop a scientific theoretical and applied toolkit based on the consideration of the practical situation of the issue of convertible bonds. …”
Get full text
Article -
511
A SYNTHESIS METHOD OF BASIC TERNARY BENT-SQUARES BASED ON THE TRIAD SHIFT OPERATOR
Published 2017-05-01“…The paper results are valuable for practical use: the development of new constant amplitude codes for MC-CDMA technology, cryptographic primitives, data compression algorithms, signal structures, algorithms of block and stream encryption, based on advanced principles of many-valued logic. …”
Get full text
Article -
512
Material point physical model rationale while studying kinematic characteristics of a motor vehicle in case of oblique collision with side cable barriers
Published 2021-04-01“…A review of the application of theoretical mechanics methods for the development of algorithms of approximate analytical simulation of a motor vehicle (MV) movement in case of oblique collision with side cable barriers is performed. …”
Get full text
Article -
513
Maximizing the biochemical resolving power of fluorescence microscopy.
Published 2013-01-01“…Our work provides a theoretical framework for the description of the biochemical resolution in fluorescence microscopy, irrespective of spatial resolution, and for the development of a new class of microscopes that exploit multi-parametric detection systems.…”
Get full text
Article -
514
Fully Flexible Parallel Merge Sort for Multicore Architectures
Published 2018-01-01“…The development in multicore architectures gives a new line of processors that can flexibly distribute tasks between their logical cores. …”
Get full text
Article -
515
Profitability Indicators: Critical Analysis and Applicability in Modern Conditions
Published 2024-10-01“…The research applied the methods of analysis, comparison, synthesis, classification, collection and generalization, logic, graphical and tabular display of information. Theoretical significance of the obtained results consists in the development of the methodology of value-oriented management in order to actualize and adapt the algorithms for calculating profitability indicators to domestic conditions, taking into account the interests of the participants of the organization. …”
Get full text
Article -
516
Support Vector Machine and Granular Computing Based Time Series Volatility Prediction
Published 2022-01-01“…With the development of information technology, a large amount of time-series data is generated and stored in the field of economic management, and the potential and valuable knowledge and information in the data can be mined to support management and decision-making activities by using data mining algorithms. …”
Get full text
Article -
517
Advances in Multi-Source Navigation Data Fusion Processing Methods
Published 2025-04-01“…In recent years, the field of multi-source navigation data fusion has witnessed substantial advancements, propelled by the rapid development of multi-sensor technologies, Artificial Intelligence (AI) algorithms and enhanced computational capabilities. …”
Get full text
Article -
518
Phylo-rs: an extensible phylogenetic analysis library in rust
Published 2025-07-01“…As large-scale data become increasingly accessible, there is a concomitant need for efficient computational libraries that facilitate the development and dissemination of specialized algorithms for phylogenetic comparative biology. …”
Get full text
Article -
519
Modern possibilities for optimizing the calculation of intraocular lens optical power using deep machine learning capabilities
Published 2022-12-01“…Fyodorov National Medical Research Center «MNTK «Eye Microsurgery» developed a design project for the LensCalc software application and algorithms of its step-by-step operation. …”
Get full text
Article -
520
Study on the parameters of the matrix NTRU cryptosystem
Published 2025-03-01“…With the rapid development of quantum computers, post-quantum cryptography has emerged as a prominent area of research in cryptography.ObjectivesIn order to avoid the decryption failure in matrix NTRU as NTRU, the Matrix NTRU algorithm was optimized.MethodsBased on the method of constraining the parameter space in congruent cryptographic algorithms, a method for optimal selection of the parameter space of matrix NTRU cryptographic regimes was proposed. …”
Get full text
Article