Showing 3,521 - 3,540 results of 13,618 for search 'also algorithm', query time: 0.12s Refine Results
  1. 3521

    Accurately assessing congenital heart disease using artificial intelligence by Khalil Khan, Farhan Ullah, Ikram Syed, Hashim Ali

    Published 2024-11-01
    “…In addition, the article also evaluates the strengths and weaknesses of existing algorithms, offering a critical review of their performance and limitations. …”
    Get full text
    Article
  2. 3522

    Optimizing knee osteoarthritis severity prediction on MRI images using deep stacking ensemble technique by Punita Panwar, Sandeep Chaurasia, Jayesh Gangrade, Ashwani Bilandi, Dayananda Pruthviraja

    Published 2024-11-01
    “…KOA is a persistent condition, also referred to as progressive joint Disease, stemming from the continual deterioration of cartilage. …”
    Get full text
    Article
  3. 3523
  4. 3524

    APOTHEOSIS: An efficient approximate similarity search system by Daniel Huici, Ricardo J. Rodríguez, Eduardo Mena

    Published 2025-02-01
    “…Specifically, it uses a custom hierarchical small navigation world as an approximate K-nearest neighbors search method, and approximate similarity digests algorithms to find common features between similar data items, also supporting various distance metrics beyond vector-based approaches. …”
    Get full text
    Article
  5. 3525

    Black-box and white-box machine learning tools to estimate the frost formation condition during cryogenic CO2 capture from natural gas blends by Farag M.A. Altalbawy, Fadhel F. Sead, Dharmesh Sur, Anupam Yadav, José Gerardo León Chimbolema, Suhas Ballal, Abhayveer Singh, Anita Devi, Kamal Kant Joshi, Nizomiddin Juraev, Hossein Mahabadi Asl

    Published 2025-03-01
    “…Three distinct black-box algorithms, including Regression Tree (RT), Radial Basis Function Neural Network (RBF-NN) and Support Vector Machine (SVM) were employed to model FFT. …”
    Get full text
    Article
  6. 3526
  7. 3527

    A secure and scalable blockchain-based model for electronic health record management by Kalyani Pampattiwar, Pallavi Chavan

    Published 2025-04-01
    “…The model also introduces mechanisms for ensuring database integrity, mitigating external attacks, and enhancing usability. …”
    Get full text
    Article
  8. 3528

    Sustainable Innovations in the Food Industry through Artificial Intelligence and Big Data Analytics by Saurabh Sharma, Vijay Kumar Gahlawat, Kumar Rahul, Rahul S Mor, Mohit Malik

    Published 2021-09-01
    “…It is found that utilization of AI techniques and the intelligent optimization algorithm also leads to significant process and production management. …”
    Get full text
    Article
  9. 3529

    Application of machine learning in corrosion inhibition study by Thankappan Sasilatha, Susai Rajendran, Senthil Kumaran Selvaraj, Časlav Lacnjevac, Rajendran Joseph Rathish

    Published 2022-09-01
    “…Deep Learning and Machine Learning are also used in corrosion science and engineering. They are used to choose the inhibitor molecules from a large pool of available molecules.…”
    Get full text
    Article
  10. 3530

    Enhanced forecasting of emergency department patient arrivals using feature engineering approach and machine learning by Bruno Matos Porto, Flavio Sanson Fogliatto

    Published 2024-12-01
    “…Methods Six machine learning (ML) algorithms were tested on forecasting horizons of 7 and 45 days. …”
    Get full text
    Article
  11. 3531

    Leveraging Machine Learning for Optimized Mechanical Properties and 3D Printing of PLA/cHAP for Bone Implant by Francis T. Omigbodun, Norman Osa-Uwagboe, Amadi Gabriel Udu, Bankole I. Oladapo

    Published 2024-09-01
    “…The results indicate that increasing cHAP content improves the tensile and compressive strength of the scaffolds, although it also increases brittleness. Notably, incorporating cHAP at 7.5% and 10% significantly enhances thermal stability and mechanical performance, with properties comparable to or exceeding those of human cancellous bone. …”
    Get full text
    Article
  12. 3532

    A genetic programming-based ensemble method for long-term electricity demand forecasting by Hayat Ahmed Issa, Hasan Hüseyin Çevik, Ahmet Yilmaz, Mehmet Cunkas

    Published 2025-04-01
    “…In the initial stage, genetic algorithms, particle swarm optimization, and simulated annealing methods are applied to various regression models (linear, quadratic, and exponential). …”
    Get full text
    Article
  13. 3533

    Structural health monitoring and evaluation method for an immersed tunnel based on deep learning by Yuhang Wei, Jinfang Hou, Linhu Yang, Bin Li, Zonghao Ma, Zhao Liu, Wenhao Sun, Binlei Wang

    Published 2025-07-01
    “…This research examines sensor data to evaluate variations in critical parameters and their effects on structural integrity. It also compares the efficacy of two deep learning algorithms, Long Short-Term Memory (LSTM) and Transformer, in predicting structural conditions. …”
    Get full text
    Article
  14. 3534

    The Task of Allocating Operations to Work Centers: Modern Approaches to Cost Minimization and Efficiency Improvement under Resource Constraints by Nikolay Nikitin, Igor Ilin, Alissa Dubgorn

    Published 2024-12-01
    “…The paper considers the limitations of classical optimization methods such as linear programming, a review of modern approaches, including combinatorial algorithms, methods of the theory of schedules. Special attention is paid to heuristic algorithms, such as genetic algorithms, simulated annealing, and ant algorithms, which allow us to find acceptable solutions in a short time. …”
    Get full text
    Article
  15. 3535
  16. 3536
  17. 3537

    Approximate String Matching with Non-Overlapping Adjacent Unbalanced Translocations by Domenico Cantone, Simone Faro, Arianna Pavone

    Published 2025-06-01
    “…Our second solution improves the previous one by making use of the Directed Acyclic Word Graph of the pattern. Finally, our third algorithm is based on an alignment procedure. We also show that under the assumptions of equiprobability and independence of characters, our second algorithm has an <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi mathvariant="script">O</mi><mo>(</mo><mi>n</mi><msubsup><mo form="prefix">log</mo><mi>σ</mi><mn>2</mn></msubsup><mi>m</mi><mo>)</mo></mrow></semantics></math></inline-formula> average time complexity for an alphabet of size <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>σ</mi><mo>≥</mo><mn>4</mn></mrow></semantics></math></inline-formula>.…”
    Get full text
    Article
  18. 3538

    A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments by Maryam Abbasi, Filipe Cardoso, Paulo Váz, José Silva, Pedro Martins

    Published 2025-05-01
    “…The emergence of large-scale quantum computing presents an imminent threat to contemporary public-key cryptosystems, with quantum algorithms such as Shor’s algorithm capable of efficiently breaking RSA and elliptic curve cryptography (ECC). …”
    Get full text
    Article
  19. 3539
  20. 3540