Suggested Topics within your search.
Suggested Topics within your search.
-
2481
Ghostly Encounters on Google
Published 2022-03-01“…In so doing, spirit photography anticipates the challenges digitization, manipulation and algorithmically generated images raise to the indexical truth-value of the image. …”
Get full text
Article -
2482
A quasi affine transformation evolution algorithm with evolution matrix selection operation for parameter estimation of proton exchange membrane fuel cells
Published 2025-01-01“…The effectiveness of the proposed QUATRE-EMS algorithm is also checked through statistical analysis and the QUATRE-EMS variant is compared with other variants of DE optimization algorithms which are recently proposed in the state-of-the-art literature such as LSHADE, MadDE, CS-DE, LPalmDE, EDEV, jSO, SHADE, ISDE, and JADE. …”
Get full text
Article -
2483
High-resolution surface wave dispersion spectrum computation based on iterative threshold shrinkage algorithm and its application to irregularly sampled data
Published 2025-07-01“…Also, the resultant shear-velocity inversion result matches better with the collocated micrologging result than the result associated with the conventional Tau-P trans-form algorithm, indicating a higher-precision inversion result.…”
Get full text
Article -
2484
AI-Based Classification Model for Low-Energy Buildings: Promoting Sustainable Economic Development of Smart Cities With Spherical Fuzzy Decision Algorithm
Published 2025-01-01“…For this purpose, we modified the theory of criteria importance through intercriteria correlation (CRITIC) and combined compromise solution (COCOSO) methods to assess suitable optimal options for the multi-attribute group decision-making (MAGDM) problem. Moreover, we also propose a novel decision algorithm of the CRITIC-COCOSO method under consideration of spherical fuzzy situations. …”
Get full text
Article -
2485
A Model Reference Adaptive Controller based Flamingo Search Algorithm for Liquid Level Control in Non-Linear Conical Tank System
Published 2025-06-01“…The complexity in CTs is also increased by the limitation to manipulated variables, interactions in measurements, and frequent disturbances. …”
Get full text
Article -
2486
-
2487
A Novel DV-Hop Localization Method Based on Hybrid Improved Weighted Hyperbolic Strategy and Proportional Integral Derivative Search Algorithm
Published 2024-12-01“…However, this algorithm also has some defects, such as poor localization accuracy and vulnerability to network topology. …”
Get full text
Article -
2488
Optimization of a reinforced concrete structure subjected to dynamic wind action
Published 2022-01-01“…For this, the Whale Optimization Algorithm (WOA) algorithm was used, an algorithm from the group of metaheuristic algorithms, which presents an easy computational implementation. …”
Get full text
Article -
2489
MATHEMATICAL MODEL OF COMPLEX PROTECTION OF AN INFOCOMMUNICATION OBJECT BASED ON "PLAYING WITH NATURE"
Published 2022-08-01“…From a practical point of view, the algorithms proposed by the author for calculating possible winnings in the game are of interest. …”
Get full text
Article -
2490
Streamlining referrals by establishing a UAE-specific referral algorithm for CVD patients with overlapping COPD: a collaborative effort by cardiologists and pulmonologists
Published 2025-06-01“…The task force has proposed an algorithm to expedite the referral of CVD patients suspected of COPD from cardiology to pulmonology.ConclusionImplementing this referral algorithm across all cardiology departments in the UAE can facilitate the diagnosis of COPD in CVD patients, allow timely treatment of COPD, and improve patient outcomes.…”
Get full text
Article -
2491
KDDC: a new framework that integrates kmers, dataset filtering, dimension reduction and classification algorithms to achieve immune cell heterogeneity classification
Published 2025-05-01“…These findings will not only enhance ourunderstanding of immune system functions but also offer new directions for the development and optimization of immunotherapy.…”
Get full text
Article -
2492
A requirements model for AI algorithms in functional safety-critical systems with an explainable self-enforcing network from a developer perspective
Published 2024-01-01“…Modern safety-related systems are becoming increasingly complex, making also the safety integrity assessment more complex and time-consuming. …”
Get full text
Article -
2493
Application of a novel metaheuristic algorithm inspired by connected banking system in truss size and layout optimum design problems and optimization problems
Published 2024-11-01“…This paper aims to utilize a metaheuristic algorithm which is based on some principals of connected banking systems, which is called the Connected Banking System Optimizer(CBSO) algorithm. …”
Get full text
Article -
2494
-
2495
-
2496
Development and validation of a spontaneous preterm birth risk prediction algorithm based on maternal bioinformatics: A single-center retrospective study
Published 2024-11-01“…Furthermore, the external testing set also showed superior performance, with an AUC of 0.79. …”
Get full text
Article -
2497
Predicting low birth weight risks in pregnant women in Brazil using machine learning algorithms: data from the Araraquara cohort study
Published 2025-03-01“…This study aimed to develop and evaluate predictive models for LBW using machine learning algorithms, including Random Forest, XGBoost, Catboost, and LightGBM. …”
Get full text
Article -
2498
An emotional neural network based approach for wind power prediction
Published 2017-03-01“…To prevent ENN from stucking in locally optimal solution in the process of training, genetic algorithm was proposed to train ENN. The root-mean-square and the standard deviation of the forecast errors were also adopted to measure the accuracy and reliability of the forecast to test the performance of ENN. …”
Get full text
Article -
2499
Intrusion detection model based on fuzzy theory and association rules
Published 2019-05-01“…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
Get full text
Article -
2500
Intrusion detection model based on fuzzy theory and association rules
Published 2019-05-01“…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
Get full text
Article