-
641
A Pilot Study on Mixed-Reality Approaches for Detecting Upper-Limb Dysfunction in Multiple Sclerosis: Insights on Cerebellar Tremor
Published 2025-01-01“…This study explored the feasibility of using Microsoft HoloLens2 for motion capture to assess upper-limb function in PwMS. Using the ROCKapp application, kinematic metrics such as movement quality and oculomotor coordination were recorded during pick-and-place tasks. …”
Get full text
Article -
642
Enhancing student reflections with natural language processing based scaffolding: A quasi-experimental study in a large lecture course
Published 2025-06-01“…The app uses Natural Language Processing (NLP) algorithms to evaluate students' reflection quality and specificity using a 4-point scale, with 1 indicating shallow reflection and 4 indicating highly relevant or specific reflection. …”
Get full text
Article -
643
Quantification of the heterogeneity of prognostic cellular biomarkers in ewing sarcoma using automated image and random survival forest analysis.
Published 2014-01-01“…Through elimination of bias, the evaluation of high-dimensionality biomarker distribution within cell populations of a tumour using random forest analysis in quality controlled tumour material could be achieved. …”
Get full text
Article -
644
Artificial intelligence for difficult airway assessment: a protocol for a systematic review with meta-analysis
Published 2025-06-01“…The risk of bias will be evaluated using the Quality Assessment of Diagnostic Accuracy Studies 2 tool. …”
Get full text
Article -
645
Adaptive Hybrid PSO-Embedded GA for neuroevolutionary training of multilayer perceptron controllers in VSC-based islanded microgrids
Published 2025-09-01“…The algorithm’s performance is evaluated against conventional optimization methods, demonstrating significant improvements in accuracy, convergence speed, and consistency across multiple runs. …”
Get full text
Article -
646
PCA and PSO based optimized support vector machine for efficient intrusion detection in internet of things
Published 2025-02-01“…After completing the preparation step, the data set is classified using several machine learning techniques such as support vector machine, linear regression, and random forest. Evaluating the veracity, exactness, and retrieval rate of different machine learning algorithms is crucial for choosing the most effective ones. …”
Get full text
Article -
647
APPROACH TO IMAGE ANALYSIS FOR COMPUTER VISION SYSTEMS
Published 2020-03-01“…Experiments were conducted on test datasets provided by Visual Genome database, developed by researchers from Stanford University to evaluate object detection algorithms, image captioning models, and other relevant image analysis tasks. …”
Get full text
Article -
648
Applied Machine Learning to Anomaly Detection in Enterprise Purchase Processes: A Hybrid Approach Using Clustering and Isolation Forest
Published 2025-02-01“…Additionally, the Silhouette index is used to evaluate the quality of the clustering, ensuring each method produces a prioritised list of candidate transactions for further review. …”
Get full text
Article -
649
Integrating Low-Altitude Remote Sensing and Variable-Rate Sprayer Systems for Enhanced Cassava Crop Management
Published 2025-06-01“…The performance of these systems was evaluated using statistical analysis and Geographic Information System (GIS) applications for mapping, with a particular emphasis on the relationship between vegetation indices (NDVI and GNDVI) and the growth stages of cassava. …”
Get full text
Article -
650
Automatic Identification of Calcareous Lithologies Using Support Vector Machines, Borehole Logs and Fractal Dimension of Borehole Electrical Imaging
Published 2018-04-01“…This methodology is highly dependent of the data quality and all intervals affected by bad borehole condition have to be removed prior its application in order to avoid wrong interpretations. …”
Get full text
Article -
651
Inferring Travel Modes from Cellular Signaling Data Based on the Gated Recurrent Unit Neural Network
Published 2023-01-01“…This study may provide some insights for the application and development of cellular signaling-based travel information collection technology for residents in the future.…”
Get full text
Article -
652
Radiomic Feature Extraction Based on Computed Tomography for Stroke Patients
Published 2025-04-01“…Conclusion: In summary, stroke imaging analysis benefits greatly from the deployment of complex image processing techniques, reliable feature extraction methods, and cutting-edge segmentation algorithms. Accurate stroke lesion identification and stratification are made possible by the thorough assessment of diagnostic parameters such as ROC curves and the application of visualization tools such as heatmaps.…”
Get full text
Article -
653
Cost-effectiveness analysis of best management practices for non-point source pollution in watersheds: A review
Published 2017-03-01“…Application of cost-effectiveness analysis method included three categories, coupling NPS model with empirical calculation methods, coupling NPS model with economic model and cost-effectiveness analysis based on optimization algorithm. …”
Get full text
Article -
654
Unveiling nature's secrets: Deep learning for enhanced biogenic emission resolution
Published 2025-03-01“…These compounds, such as carbon monoxide and nitric oxide, play a pivotal role in atmospheric processes and have become a key focus of research over the past two decades due to their influence on atmospheric chemistry.Studying BVOC emissions is essential for numerical evaluations of past, current, and future air quality and climate conditions. …”
Get full text
Article -
655
A secure and efficient user selection scheme in vehicular crowdsensing
Published 2025-05-01“…Security analysis demonstrates that under the Canetti–Krawczyk (CK) model and the Decisional Diffie–Hellman (DDH) security assumption, the SEUS-VCS scheme satisfies the security of session keys. Performance evaluation indicates that compared to other key exchange schemes, the SEUS-VCS scheme shows a significant advantage in supporting national cryptographic algorithms and anonymity. …”
Get full text
Article -
656
An approach to forecasting damage due to unfavorable circumstances associated with indistinguishability of source data
Published 2020-12-01“…The efficiency of predicting damage to complex systems depends directly on the quality of processing methods, systematization, and the amount of input data. …”
Get full text
Article -
657
Investigation of the physically unclonable function of a configurable ring oscillator
Published 2025-03-01“…This serves as a foundation for exploring new methods and algorithms for calculating unique PUF responses.…”
Get full text
Article -
658
Electromyography Signal Acquisition, Filtering, and Data Analysis for Exoskeleton Development
Published 2025-06-01“…Various EMG acquisition methods, including surface, intramuscular, and high-density surface EMG, are evaluated for their applicability in real-time control. …”
Get full text
Article -
659
Structural-methodical model of computer program for control of theoretical knowledge of cadets
Published 2018-06-01“…Basically, readymade computer programs are used, which are universal and are intended for wide application, without taking into account the specifics of Universities.Research and development of structural and methodological model was carried out with the use of theoretical analysis of the provisions of pedagogy on the problems of control, evaluation and analysis of the level of theoretical knowledge, methods of theory of algorithms and decision-making, methods of synthesis and analysis of information processes. …”
Get full text
Article -
660
Artificial Intelligence Approaches for Geographic Atrophy Segmentation: A Systematic Review and Meta-Analysis
Published 2025-04-01“…This review provides a comprehensive evaluation of AI applications for GA segmentation and identifies areas for improvement. …”
Get full text
Article