Showing 961 - 980 results of 1,339 for search 'algorithms and theoretical (developments OR development)', query time: 0.17s Refine Results
  1. 961

    AI-driven assistive technologies in inclusive education: benefits, challenges, and policy recommendations by Chokri Kooli, Rim Chakraoui

    Published 2025-12-01
    “…Additionally, the paper highlights limitations related to accuracy, infrastructure needs, educator readiness, and ethical concerns such as data privacy and algorithmic bias.To address these challenges, the study proposes policy recommendations and practical strategies for equitable and responsible AI adoption in education, including targeted educator training, funding for inclusive infrastructure, and development of ethical and technical standards. …”
    Get full text
    Article
  2. 962

    Market and cadastral data comparison for the real estate market value forecasting by M. B. Laskin, P. A. Cherkesova

    Published 2020-09-01
    “…The aim of the research is to develop theoretical and methodological approaches to market value forecasting in the real estate market. …”
    Get full text
    Article
  3. 963

    Low-order harmonic analysis and suppression strategy optimization of cascaded converters for train traction by LI Xiangchao, FENG Jiying, LI Zhenghui

    Published 2024-03-01
    “…Power electronic transformers (PET) incorporating cascaded H-bridge (CHB) converters as the front-stage topology represent an important development trend for future train traction. Minimizing low-order harmonics in CHB converters holds immense importance in enhancing the control performance of PETs. …”
    Get full text
    Article
  4. 964

    Clutaxis: An information-driven source search method balancing exploration and exploitation in turbulent environments by Runkang Guo, Yong Zhao, Yatai Ji, Mengyu Yan, Zhengqiu Zhu

    Published 2025-06-01
    “…Existing studies have developed information-theoretic approaches to fuse intermittent information collected by mobile sensors regarding the sources. …”
    Get full text
    Article
  5. 965

    Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU

    Published 2022-06-01
    “…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
    Get full text
    Article
  6. 966

    The Problem of Choosing a Steganographic Container in Conditions of Attacks against an Embedded Message by Bobok I., Kobozieva A., Sokalsky S.

    Published 2022-11-01
    “…The aim of the work is to increase the resistance of a steganographic system to attacks against an embedded message by developing a method for choosing a contain-er from a finite set of available digital images that ensures the transmitted message the minimum (close to the minimum) possible sensitivity of the generated steganographic message to disturb-ing influences under consideration with the selected steganographic algorithm. …”
    Get full text
    Article
  7. 967

    Modeling and numerical analysis of the effect of dissociation/recombination of water molecules on the transport of salt ions in diffusion layer by N. O. Chubyr, A. V. Kovalenko, M. Kh. Urtenov, A. I. Sukhinov, V. A. Gudza

    Published 2019-10-01
    “…A new mathematical model, a numerical algorithm to solve a boundary value problem, and software are developed. …”
    Get full text
    Article
  8. 968

    Architectural Gaps in Generative AI: Quantifying Cognitive Risks for Safety Applications by He Wen, Pingfan Hu

    Published 2025-06-01
    “…The study advocates for the development of AI architectures that better reflect human cognitive structures to reduce these risks and improve reliability in safety applications.…”
    Get full text
    Article
  9. 969

    Providing a Robust Dynamic Pricing Model and Comparing It with Static Pricing in Multi-level Supply Chains Using a Game Theory Approach by Sara Mehrjoo, Hanan Amoozad Mahdirji, Jalil Heidary Dahoei, Seyyed Hossein Razavi Haji Agha, Mahnaz Hosseinzadeh

    Published 2023-12-01
    “…Results This article introduces the development of a stochastic demand function utilizing genetic algorithms and particle optimization. …”
    Get full text
    Article
  10. 970

    Legal Regulation of Relations in the Sphere of Crowdfunding in the Republic of Belarus by A. V. Vasilevskii

    Published 2023-03-01
    “…Objective: to study the theoretical and legal bases of crowdfunding and to elaborate scientifically grounded proposals for improving the Republic of Belarus legislation in this sphere.Methods: the methodological basis of the research is a system of principles, methods and techniques of studying the general regularities of emergence, formation and development of social-legal phenomena. …”
    Get full text
    Article
  11. 971

    An Analysis of the Vocational-Educational Problematics for Substantiating Production Specialist Competencies by V. E. Steinberg, L. V. Vakhidova, E. M. Gabitova

    Published 2019-02-01
    “…This education should be conducted by means of systematic identification and assessment of multi-dimensional regional and sectoral needs for trained personnel, projections of results of monitoring on educational programmes and development of means for the acquisition of the relevant skills. …”
    Get full text
    Article
  12. 972

    Efficiency Improvement of Wireless Charging System Based on Active Power Source in Receiver by Bingkun Shi, Fuyuan Yang, Shidong Wang, Minggao Ouyang

    Published 2019-01-01
    “…A novel current decoupling algorithm is used to analyze the efficiency of the new configuration, and a simulation model is established to validate the theoretical result and to explain the mechanism of efficiency improvement. …”
    Get full text
    Article
  13. 973

    Accurate calculation of the content volume, density and original weight of museum curated eggs by Valeriy G. Narushin, Michael N. Romanov, Nili Avni-Magen, Darren K. Griffin

    Published 2024-12-01
    “…This study aimed to fill this gap though development of a methodological mechanism for calculating the volume of the egg interior (V i ), its density (D i ) and W. …”
    Get full text
    Article
  14. 974

    A Hierarchical Control Framework for Coordinating CAV-Dedicated Lane Allocation and Signal Timing at Isolated Intersections in Mixed Traffic Environments by Feng Chen, Cunbao Zhang, Yu Cao

    Published 2025-01-01
    “…With the rapid development of connected and automated vehicles (CAVs), numerous studies have demonstrated that CAV-dedicated lanes (CAV-DLs) can significantly enhance traffic efficiency. …”
    Get full text
    Article
  15. 975

    Research review on intelligent object detection technology for coal mines based on deep learning by Fan ZHANG, Jiarong ZHANG, Haixing CHENG

    Published 2025-06-01
    “…With the research and development of deep learning theory, object detection technology based on deep learning has made significant progress in the field of intelligent mining,which has become a typical paradigm and research hotspot of artificial intelligence technology in coal mining application scenarios. …”
    Get full text
    Article
  16. 976

    Socioeconomic status and lifestyle as factors of multimorbidity among older adults in China: results from the China Health and Retirement Longitudinal Survey by Wei Gong, Wei Gong, Wei Gong, Xiaoxiao Hu, Huimin Cui, Huimin Cui, Yuxin Zhao, Yuxin Zhao, Hong Lin, Hong Lin, Hong Lin, Peng Sun, Peng Sun, Jianjun Yang, Jianjun Yang

    Published 2025-07-01
    “…While previous studies have highlighted the role of individual behaviors, the complex interaction between lifestyle factors and socioeconomic status (SES) in multimorbidity remains unclear.MethodsUsing nationally representative data from the China Health and Retirement Longitudinal Study (CHARLS), we developed predictive models to identify key determinants of multimorbidity among individuals aged ≥60 years. …”
    Get full text
    Article
  17. 977

    A Study of Data-Driven Enterprise Human Resource Management Model by Jing Yang, Lili Lang, Shaojuan Song

    Published 2021-01-01
    “…Sense of mission and honor play an important role in the healthy development of enterprises. With the in-depth integration of enterprise management and computer technology, some human resource management problems related to corporate social responsibility often appear in this process. …”
    Get full text
    Article
  18. 978

    Experiential space analysis: scoring tranquil, social, and explorative places in habitable buildings by Rhys Goldstein, Nastaran Shahmansouri, Jeremy P. M. Mogk, Sebastian Herrera, Dianne Gault, Frederik Brudy, Michael Lee, Liviu Calin, Tomas Lay Herrera, Dagmara Szkurlat, Kean Walmsley

    Published 2025-06-01
    “…This exploratory research contributes to a broader discussion about the importance of studying design factors in combination with one another, the challenge of validating the resulting composite metrics, and the role that theoretical best practices might play in the development of experiential space analysis tools for architects and urban designers striving to promote wellbeing.…”
    Get full text
    Article
  19. 979

    Optimization of the Canopy Three-Dimensional Reconstruction Method for Intercropped Soybeans and Early Yield Prediction by Xiuni Li, Menggen Chen, Shuyuan He, Xiangyao Xu, Panxia Shao, Yahan Su, Lingxiao He, Jia Qiao, Mei Xu, Yao Zhao, Wenyu Yang, Wouter H. Maes, Weiguo Liu

    Published 2025-03-01
    “…Subsequently, a stepwise regression model was developed to achieve precise early-stage yield prediction for soybeans. …”
    Get full text
    Article
  20. 980

    To the Definition the Deflections of Flexible Non-centrally Compressed Reinforced Concrete Struts Strengthened in the Transverse Direction with Composite Materials by D. R. Mailyan, S. V. Georgiev

    Published 2023-04-01
    “…The results of the theoretical calculation of deflections are presented and, based on the comparison of experimental and theoretical values of deflections, an algorithm for calculating the second group of limit states was developed.…”
    Get full text
    Article