-
3001
-
3002
Potential Biomarkers for Predicting the Risk of Developing Into Long COVID After COVID‐19 Infection
Published 2025-01-01Get full text
Article -
3003
-
3004
-
3005
-
3006
Optimizing credit card fraud detection with random forests and SMOTE
Published 2025-05-01“…This research makes use of the UCI ML repository to access the credit card defaulted customer dataset. …”
Get full text
Article -
3007
Evolving Hybrid Deep Neural Network Models for End-to-End Inventory Ordering Decisions
Published 2023-11-01Get full text
Article -
3008
-
3009
Neural Architecture Search for Generative Adversarial Networks: A Comprehensive Review and Critical Analysis
Published 2025-03-01“…The review highlights the benefits of NAS in improving GAN performance, stability, and efficiency, while also identifying limitations and areas for future research. Key findings include the superiority of evolutionary algorithms and gradient-based methods in certain contexts, the importance of robust evaluation metrics beyond traditional scores like Inception Score (IS) and Fréchet Inception Distance (FID), and the need for diverse datasets in assessing GAN performance. …”
Get full text
Article -
3010
Redefining IoT networks for improving energy and memory efficiency through compressive sensing paradigm
Published 2025-07-01Get full text
Article -
3011
Sustainable RCCI engine operation with an ANN based novel tri-fuel approach
Published 2025-07-01Get full text
Article -
3012
-
3013
(<italic>r, k, ε</italic>)-Anonymization: Privacy-Preserving Data Publishing Algorithm Based on Multi-Dimensional Outlier Detection, <italic>k</italic>-Anonymity, and <itali...
Published 2025-01-01“…In this study, a new hybrid anonymization algorithm called (r, k, <inline-formula> <tex-math notation="LaTeX">$\varepsilon $ </tex-math></inline-formula>)-anonymization has been proposed, which combines k-anonymity and <inline-formula> <tex-math notation="LaTeX">$\varepsilon $ </tex-math></inline-formula>-differential privacy models in a consistent framework and provides stronger privacy guarantees compared to existing privacy-preserving models. …”
Get full text
Article -
3014
Multi-objective Windy Postman Problem in a Fuzzy Transportation Network
Published 2025-07-01“…Researchers have become increasingly captivated by the windy postman problem (WPP), a major combinatorial optimisation problem with several practical applications. …”
Get full text
Article -
3015
Optimization of emergency material distribution routes in flood disaster with truck‐speedboat‐drone coordination
Published 2025-03-01“…Comparative analyses are conducted with a genetic algorithm, simulated annealing algorithm, and tabu search algorithm. …”
Get full text
Article -
3016
Double‐row suture‐bridge technique does not yield better clinical and radiological results than single‐row technique in patients older than 55 years at 2 years minimum follow‐up: A...
Published 2025-04-01“…While limitations exist, our findings contribute to understanding optimal surgical approaches, emphasizing individualized treatment based on patient characteristics and surgeon expertise. Further research, including randomized controlled trials with long‐term follow‐up, is needed to refine treatment algorithms and improve patient outcomes in rotator cuff surgery. …”
Get full text
Article -
3017
-
3018
Bionic search for transportation problem solution on the basis of adaptation strategy
Published 2015-06-01Get full text
Article -
3019
-
3020
Intellectual Property Ownership of AI-Generated Content
Published 2024-05-01“…The research is also based on the comparative legal method and analytical legal method of commenting current law of Armenia and foreign countries. …”
Get full text
Article