Suggested Topics within your search.
Suggested Topics within your search.
-
10861
Approaches for treating neuropsychiatric symptoms in Parkinson’s disease: a narrative review
Published 2025-05-01“…However, there are still substantial gaps in therapeutic approaches and algorithms, with limited pharmacological and nonpharmacological treatment options currently available. …”
Get full text
Article -
10862
New insights into methods to measure biological age: a literature review
Published 2024-12-01“…We discussed some novel biomarkers and algorithms that can capture the dynamic and multidimensional aspects of aging at different levels. …”
Get full text
Article -
10863
Co-construction with deathbots: a form of existentialist practice
Published 2025-04-01“…By interrogating the interplay between digital technologies and death, the techno-psychological foundations of deathbots, their therapeutic efficacy in psychological and philosophical frameworks, and the attendant philosophical quandaries, we demonstrate that: (1) The perceived authenticity and meaning co-constructed through human–deathbot interactions endow deathbots with quasi-intersubjectivity, thereby constituting this technologically mediated encounters as existentialist philosophical practice; (2) this co-constructed practice not only delivers therapeutic benefits but also phenomenologically extends the deceased’s presence through an “algorithmic as if” mode of being; (3) the dual-edged sword effect of deathbots’ therapeutic outcomes, coupled with their challenge to the deceased’s dignity, underscores how humanity’s existential perplexity toward death persists in the digital age and continues to generate novel philosophical inquiries.…”
Get full text
Article -
10864
Precision neuropsychology in the area of AI
Published 2025-05-01“…., learning disorders). The paper also addresses critical implementation challenges: ethical considerations including algorithmic bias and data privacy; balancing quantitative AI analytics with qualitative clinical expertise to avoid reductionism; and developing new competencies for neuropsychologists to effectively integrate AI in their research and clinical work. …”
Get full text
Article -
10865
A low complexity dynamic subarray combination method for MIMO transmitter
Published 2020-08-01“…For the mmWave MIMO system using a partially-connected structure,in order to improve the spectral efficiency,the antenna composition of each subarray will be dynamically adjusted according to the channel conditions.However,the optimal grouping of antennas requires exhaustive searching for all possible antenna combinations according to certain criteri,which leads to unacceptable complexity.In response to the problem,a low-complexity sub-array dynamic allocation method was proposed.The core was to introduce certain rules when grouping array elements,thereby significantly reducing the number of combinations and reducing the search range.Specifically,two low-complexity antenna combination algorithms were proposed.Firstly,considering the strong correlation between mmWave antennas,multiple adjacent antennas were virtualized as an array element,thereby reducing the search space.Secondly,by dividing all antennas into upper and lower half areas,the antenna combination based on partition was realized,and the search space was also reduced.Simulation results show that the proposed method can achieve a good trade-off between performance and complexity.…”
Get full text
Article -
10866
A Gaussian Process Latent Variable Model for Subspace Clustering
Published 2021-01-01“…In the experiment, we compare it with the related GPLVMs and clustering algorithms. The experimental results show that the proposed model not only inherits the feature learning ability of GPLVM but also has superior clustering accuracy.…”
Get full text
Article -
10867
Exploring the Role of Artificial Intelligence in Detecting Advanced Persistent Threats
Published 2025-06-01“…By leveraging machine learning algorithms and data analytics, AI systems can identify patterns and anomalies that are indicative of sophisticated cyber-attacks. …”
Get full text
Article -
10868
Detection of offensive content in the Kazakh language using machine learning and deep learning approaches
Published 2025-08-01“…This article demonstrates the effectiveness of combining n-gram and stemming methods with machine learning algorithms, achieving high accuracy in content classification. …”
Get full text
Article -
10869
Summoning the digital investor: Fintech apps and the shaping of everyday financial subjectivities
“…However, users themselves may resist the financial subjectivities promoted by fintech investing, driven by skepticism towards gamified and other algorithmic app features. They are also motivated by feelings of uncertainty towards fledgling fintech startups and difficulties in their interactions with the app user interface. …”
Get full text
Article -
10870
How Re-Infections and Newborns Can Impact Visible and Hidden Epidemic Dynamics?
Published 2025-05-01“…With the use of effective algorithms for parameter identification, the proposed approach can ensure effective predictions of visible and hidden numbers of cases and infectious and removed patients.…”
Get full text
Article -
10871
A Rational Cluster Strategy: Manoeuvring between Market and Government Failures
Published 2012-09-01“…It is argued that an efficient policy should be aimed at dealing with market failures, while the procedures and implementing algorithms — at overcoming government failures. …”
Get full text
Article -
10872
Design and Implementation of a Weather Information Acquisition System Applied to Locomotive Remote Monitoring
Published 2024-10-01“…The proposed system provides not only references for locomotive control tactics in remote driving mode, but also weather information display and warning to remote operators. …”
Get full text
Article -
10873
An efficient detection of Sinkhole attacks using machine learning: Impact on energy and security.
Published 2025-01-01“…SFlexCrypt stands out by seamlessly integrating advanced machine learning algorithms to achieve high-precision detection and effective mitigation of sinkhole attacks. …”
Get full text
Article -
10874
Bayesian and non-bayesian analysis for stress-strength model based on progressively first failure censoring with applications.
Published 2024-01-01“…To evaluate the effectiveness of the several estimators created, a Monte Carlo numerical analysis is also carried out. In the end, for illustrative reasons, an algorithmic application to actual data is investigated.…”
Get full text
Article -
10875
Progressive collapse analysis on multicore computers using nonlinear dynamic approach
Published 2024-11-01“…Unlike most existing approaches, a specialized method has been implemented to simulate the sudden removal of groups of finite elements at given times, which makes it possible to simulate not only the removal of columns but also fragments of load-bearing walls and staircase-elevator blocks. …”
Get full text
Article -
10876
Cardiac computed tomography: Current practice, guidelines, applications, and prospects
Published 2025-04-01“…Prospective studies and ongoing trials such as FASTTRACK coronary artery bypass grafting also underscore the potential of advanced CT technologies in refining procedural planning and execution. …”
Get full text
Article -
10877
Pattern synthesis method for arbitrary arrays with desired mainloble response
Published 2014-09-01“…A pattern synthesis method based on adaptive array theory and convex optimization principle was proposed for arbitrary arrays,especially considering the influence of different orientation on array pattern.Firstly,the array pattern with special sideloble shape is obtained by adaptive array theory method; and then,the mainloble pointing to 0° is taken as reference to determine the pattern mainloble with variant steering angle.Finally,the optimal array pattern synthesis with desired mainloble response is converted to a second-order cone programming problem.The resulting optimization problem is nonconvex and is implemented via iterative algorithms of convex optimization,which can be solved using the second-order cone programming method at each iteration.Taking the method developed can obtain satisfied mainlobe response and less synthesized error in sideloble region.Theoretical analyses and simulation results show that the synthe-sized pattern has the same mainloble performance as the desired mainlabole in different orientation,and also the sideloble can maintain the shape to suppress the dynamic interference.…”
Get full text
Article -
10878
Advancing Breast Cancer Diagnosis: A Comprehensive Machine Learning Approach for Predicting Malignant and Benign Cases with Precision and Insight in a Neutrosophic Environment usin...
Published 2025-07-01“…The work uses an established dataset, and for comparative analysis and for insights into the data distribution, statistical analysis is also incorporated. Four top machine learning algorithms are trained and evaluated with a series of performance measures such as accuracy, positive predictive value (PPV), negative predictive value (NPV), F1-score, etc. …”
Get full text
Article -
10879
Positive relationship between education level and risk perception and behavioral response: A machine learning approach.
Published 2025-01-01“…Further analysis employing SHAP values demonstrates that education level not only exerts a significant influence but also exhibits varying effects across different educational groups. …”
Get full text
Article -
10880
Topology-preserving contourwise shape fusion
Published 2025-03-01“…Abstract The preservation of morphological features, such as protrusions and concavities, and of the topology of input shapes is important when establishing reference data for benchmarking segmentation algorithms or when constructing a mean or median shape. …”
Get full text
Article