Suggested Topics within your search.
Suggested Topics within your search.
-
11421
Rolling Cargo Management Using a Deep Reinforcement Learning Approach
Published 2021-02-01“…In this paper, we apply state-of-the-art deep reinforcement learning algorithms to automate these operations in a complex and real environment. …”
Get full text
Article -
11422
Routing Protocols for Vehicular Delay Tolerant Networks: A Survey
Published 2015-03-01“…However, the choice of routing algorithms in VDTNs is still under study. The main objective of routing protocols in VDTNs is to maximize the probability of delivery at the destination while minimizing the end-to-end delay. …”
Get full text
Article -
11423
Wearable sensing in eating episode monitoring: an updated systematic review protocol
Published 2025-06-01“…Studies that focus solely on the development of algorithms or applications for these sensors will be excluded. …”
Get full text
Article -
11424
Intelligent Malfunction Identification Method in Mechanical Manufacturing Process Based on Multisensor Data
Published 2022-01-01“…This time, through the application of smart algorithms in machinery manufacturing and its automation, we expect that such a technological revolution can provide a new development prospect for the development of manufacturing intelligence and automation. …”
Get full text
Article -
11425
Optimizing Bi-LSTM networks for improved lung cancer detection accuracy.
Published 2025-01-01“…We employed traditional hand-crafted features, such as Gray Level Co-occurrence Matrix (GLCM) features, in conjunction with traditional machine learning algorithms. To explore the potential of deep learning, we also optimized and implemented a Bidirectional Long Short-Term Memory (Bi-LSTM) network for lung cancer detection. …”
Get full text
Article -
11426
Internal Clock Drift Estimation in Computer Clusters
Published 2008-01-01“…This article studies the clock precision and stability of several computer systems, with different architectures. It also studies the typical network delay characteristics, since time synchronization algorithms rely on the exchange of network packets and are dependent on the symmetry of the delays. …”
Get full text
Article -
11427
Professional Judgment and Skepticism Amidst the Interaction of Artificial Intelligence and Human Intelligence
Published 2024-10-01“…The integration of AI in auditing promises enhanced efficiency, precision, and data processing capabilities beyond human limits. However, it also raises ethical concerns regarding data privacy, algorithmic bias, and accountability. …”
Get full text
Article -
11428
TIBA: A web application for the visual analysis of temporal occurrences, interactions, and transitions of animal behavior.
Published 2024-10-01“…Several filtering options (selection of behaviors and individuals) together with options to set node and edge properties (in the network drawings) allow for interactive customization of the output drawings, which can also be downloaded afterwards. TIBA accepts data outputs from popular logging software and is implemented in Python and JavaScript, with all current browsers supported. …”
Get full text
Article -
11429
Bounds on the initial macroporosity of sea ice pressure ridges
Published 2025-01-01“…Taking into account this effect, field observations are also consistent with random loose packing of ice blocks. …”
Get full text
Article -
11430
Identification of core therapeutic targets for Monkeypox virus and repurposing potential of drugs: A WEB prediction approach.
Published 2024-01-01“…In addition, the update of the three databases can also effectively promote the study of monkeypox drug inhibition mechanism and provide theoretical guidance for the development of drugs for monkeypox.…”
Get full text
Article -
11431
Facilitate integrated analysis of single cell multiomic data by binarizing gene expression values
Published 2025-07-01“…Here, we demonstrate that a direct concatenation of the binarized scRNA-seq data and the standard single cell ATAC-seq data is sufficient and effective for vertical integrated clustering analysis, after applying term-frequency-inverse document frequency (TF-IDF) and single value decomposition (also called latent semantic indexing, LSI) algorithms to the combined data, when the two data modalities are collected using a paired multiomic technology. …”
Get full text
Article -
11432
Predictive Analytics in Finance Using the Arima Model. Application for Bucharest Stock Exchange Financial Companies Closing Prices
Published 2024-12-01“…Moreover, the selected model is part of the time series analysis under prediction algorithms, the purpose of the research being to predict the prices of the selected shares. …”
Get full text
Article -
11433
Classifying software security requirements into confidentiality, integrity, and availability using machine learning approaches
Published 2024-11-01“…Also, we developed a web interface that facilitates real-time analysis and classifies security requirements into CIA triads. …”
Get full text
Article -
11434
Assortment and promotion optimization in a retail chain
Published 2024-01-01“…Small- and medium-sized problems can therefore be solved using MIP solver software. Firefly algorithms are designed to solve large-scale problems. …”
Get full text
Article -
11435
The Disaggregation of Platform Labor: Theorizing Skin Tone Work in the Black Influencer Beauty Economy
Published 2025-02-01“…This research asserts that the first layer of RPL involves skin tone work, where beauty influencers must combat the negative preconceptions and discourses typically associated with dark skin. I also suggest that they must combat these biases while simultaneously presenting themselves as marketable to cosmetics companies, viewers, and platform algorithms. …”
Get full text
Article -
11436
THE ROLE OF BIG DATA IN DIGITALIZING INFORMATION
Published 2023-01-01“…Its efficacy is contingent upon not merely the escalating capabilities of technology to facilitate the accumulation and retention of substantial data quantities, but also on its proficiency to conduct thorough analysis, comprehension, and effective utilization of the data's complete worth.…”
Get full text
Article -
11437
An efficient post-processing adaptive filtering technique to rectifying the flickering effects.
Published 2021-01-01“…Compression at a very low bit rate(≤0.5bpp) causes degradation in video frames with standard decoding algorithms like H.261, H.262, H.264, and MPEG-1 and MPEG-4, which itself produces lots of artifacts. …”
Get full text
Article -
11438
Research on Key Technologies of Virtual Coupling Control System for Autonomous-rail Rapid Tram
Published 2023-06-01“…A safe braking model of autonomous-rail rapid tram is initiatively used to derive the minimum space headway for operation safety between coupled formations, and the collaborative planning and MPC-based collaborative control algorithms utilizing an optimal control approach are applied to guarantee the safe, punctual, comfortable, and efficient operation of coupled formations. …”
Get full text
Article -
11439
Hierarchical Clustering as a Dimension Reduction Technique for Markowitz Portfolio Optimization
Published 2020-03-01“…Clustering is widely used in computer science, a lot of algorithms and computational methods have been developed for it. …”
Get full text
Article -
11440
Edge vs. Cloud: Empirical Insights into Data-Driven Condition Monitoring
Published 2025-05-01“…The tested induction machine fault diagnosis models are developed using popular algorithms, namely support vector machines, k-nearest neighbours, and decision trees. …”
Get full text
Article