Suggested Topics within your search.
Suggested Topics within your search.
-
10581
A Critical Review of the Prospect of Integrating Artificial Intelligence in Infectious Disease Diagnosis and Prognosis
Published 2025-01-01“…This paper reviews how AI-driven models improve diagnostic accuracy, predict patient outcomes, and contribute to effective disease management. It also addresses the challenges and ethical considerations associated with AI, including data privacy, algorithmic bias, and equitable access to healthcare. …”
Get full text
Article -
10582
FedDrip: Federated Learning With Diffusion-Generated Synthetic Image
Published 2025-01-01“…Moreover, we demonstrate that this virtual-client strategy can be integrated into any federated learning framework, including foundational algorithms such as FedAvg and advanced algorithms such as FedDyn and FedProx. …”
Get full text
Article -
10583
Selection of Functional Diagram of Air Multi-Compressor Control System
Published 2019-07-01“…Compressed air generation systems are a necessary facility for most enterprises; they also belong to the most energy-consuming equipment category. …”
Get full text
Article -
10584
Research of a trusted execution environment module for multiple platforms
Published 2014-11-01“…The current TPM,MTM and other trusted computing modules don’t take into account the variety of platforms and the update of the inside algorithms,protocols and functions.A hardware trusted execution environment module (TEEM) architecture,which uses ARM TrustZone technology to build a trusted computing module running in a secure isolated environment is designed.Proposed module not only supports variety of platforms,but also has strong mobility and portability.Moreover,it allows configuring and updating functions and algorithms of the module flexibly.A prototype system is implemented and its performance is tested.By analyzing the security of the system and the measurement results,it is shown that TEEM provides users with a safe,stable,efficient trusted execution environment.…”
Get full text
Article -
10585
Perspective technologies for screening heart rhythm disturbances: focus on mobile ECG devices
Published 2018-12-01“…In this article the overview of modern technologies of screening disturbances of a heart rhythm by means of registration of the single-channel ECG by the smartphone and its subsequent analysis by means of modern mathematical algorithms is provided.…”
Get full text
Article -
10586
Using Weather Data for Improved Analysis of Vehicle Energy Efficiency
Published 2025-02-01“…This article will give an overview of how such data are structured and how they can be accessed in order to augment logs gained during vehicle operation or simulated trips. Two efficient algorithms for such data extraction and augmentation are discussed and several examples for use are provided, also demonstrating that some caveats do exist with respect to the source of weather data.…”
Get full text
Article -
10587
Selection of methods and tools of voltage unbalance reduction within the Eastern part of Siberian integrated power system
Published 2017-12-01“…The article includes the analysis of various technical tools for voltage unbalance reduction within the Eastern part of IPS of Siberia and describes control algorithms for them. It also analyzes the possibility of voltage unbalance reduction through administrative procedures. …”
Get full text
Article -
10588
Review of Artifacts and Related Processing in Ophthalmic Optical Coherence Tomography Angiography (OCTA)
Published 2025-05-01“…Corresponding methods for the identification and processing of these artifacts are also presented. Furthermore, this article also details some recent progress in leveraging artificial intelligence (AI) technology in the identification and suppression of artifacts, showcasing its potential as a powerful tool in OCTA artifact processing. …”
Get full text
Article -
10589
Computer Vision in Augmented, Virtual, Mixed and Extended Reality environments—A bibliometric review
Published 2024-12-01“…This review provides an overview of immersive technologies and their applications, as well as the role of computer vision algorithms in enabling these technologies and the potential benefits of using such algorithms. …”
Get full text
Article -
10590
Research on the use of social media to break the information cocoon of niche cultures
Published 2024-01-01“…To target younger audiences, the study also makes a comparison between musical theatre and Chinese operas in terms of their dissemination. …”
Get full text
Article -
10591
Reliability and Security Analysis of Artificial Intelligence-Based Self-Driving Technologies in Saudi Arabia: A Case Study of Openpilot
Published 2022-01-01“…This analysis can help governments understand the current limitations of such technologies so that they can regulate them and enhance infrastructures to prepare for the mass adoption of self-driving cars. It can also help car manufacturers and developers improve self-driving algorithms to overcome their existing limitations, which will ultimately improve the safety and experience of driving.…”
Get full text
Article -
10592
SELECTION OF LINEAR AND ELLIPTICAL OBJECTS IN THE IMAGE BASED ON THE CALCULATION OF THE CORRELATION COEFFICIENT
Published 2022-08-01“…Traditionally, filtering, binarization, wavelet analysis, contour analysis are used. Also recently, algorithms based on neural networks have become popular. …”
Get full text
Article -
10593
Modeling Multicellular Systems Using Subcellular Elements
Published 2005-07-01“…We also discuss efficient algorithms for encoding the model, and give an example of a simulation of an epithelial sheet. …”
Get full text
Article -
10594
Analysis of the most Important Concepts Related to Social Distancing as A Result of COVID-19 Pandemic: A Review
Published 2023-04-01“…The methods and knowledge of the basic algorithms used by previous researchers and studies, as well as the data set that can be used to evaluate algorithms that can tell when a distance is safe. …”
Get full text
Article -
10595
Memristive linear algebra
Published 2025-06-01“…Our results demonstrate that memristive arrays can reduce computational complexity. We also study power consumption and show a tradeoff between precision and energy. …”
Get full text
Article -
10596
Recognition of chordal graphs and cographs which are Cover-Incomparability graphs
Published 2024-11-01“…Using the structural results of these graphs, we derive linear time recognition algorithms for chordal graphs and cographs which are C-I graphs.…”
Get full text
Article -
10597
Translation Memory and Computer Assisted Translation Tool for Medieval Texts
Published 2013-05-01“…The efficiency of the algorithms is analyzed for recall and precision.…”
Get full text
Article -
10598
Optimal Parameter Extraction of PEM Fuel Cell Using a Hybrid Weighted Mean of Vectors and Nelder-Mead Simplex Method
Published 2024-01-01“…The results reveal that hybrid approach produces better outcomes in terms of accuracy, reliability and effectiveness as compared to other algorithms. Also, the good closeness between the estimated and experimental polarization curves proves that hybrid approach accurately determines unknown parameters. …”
Get full text
Article -
10599
Data Confidentiality in Artificial Intelligence-Assisted Medicine: The Main Ethical Issue
Published 2025-05-01“…However, these developments have also led to serious ethical problems, especially regarding patient privacy, data confidentiality, and informed permission. …”
Get full text
Article -
10600
Simulation Comparison of Several MPPT Methods for Photovoltaic Generation
Published 2014-01-01“…Various MPPT algorithms such as perturbation & observation method, incremental conductance method, etc. were analyzed by simulation at Matlab/Simulink platform based on the same converter circuit, and also were compared in misjudgment, steady-state oscillation, dynamic performance, cumulative power generation, etc. …”
Get full text
Article