Showing 5,261 - 5,280 results of 7,873 for search 'comparative research algorithm', query time: 0.23s Refine Results
  1. 5261

    Fingolimod and risk of skin cancer among individuals with multiple sclerosis: a population-based cohort study protocol by Lisa Kuramoto, Larry D Lynd, Amir Khakban, Jacquelyn J Cragg, Anthony Traboulsee, Jiwon Oh, Analisa Jia, Weng Sut Sio, M A De Vera, Jonathan Loree, Roger Tam

    Published 2025-01-01
    “…This study aims to describe a protocol for investigating the relationship between fingolimod use and the incidence of skin cancer among individuals with MS.Methods and analysis We will use population-based administrative health data from two Canadian provinces (British Columbia and Alberta) to conduct an observational cohort ‘trial emulation’ study with an active comparator and new-user design. Individuals with MS aged ≥18 years will be identified using a validated algorithm. …”
    Get full text
    Article
  2. 5262

    Tissue Puncture Event Detection in Needle Procedures using Vibroacoustic Signals - ResNet optimised Phantom Results by Serwatka Witold, Rzepka Dominik, Oran Hamza, Steeg Katharina, Krombach Gabriele, Stefanski Juliusz, Heryan Katarzyna, Friebe Michael

    Published 2024-12-01
    “…This result is very encouraging, as several possible improvements have been identified that will be implemented in the next research steps together with a robot assisted insertion and an automatic video annotation algorithm.…”
    Get full text
    Article
  3. 5263

    GRU-based multi-scenario gait authentication for smartphones by Qi JIANG, Ru FENG, Ruijie ZHANG, Jinhua WANG, Ting CHEN, Fushan WEI

    Published 2022-10-01
    “…At present, most of the gait-based smartphone authentication researches focus on a single controlled scenario without considering the impact of multi-scenario changes on the authentication accuracy.The movement direction of the smartphone and the user changes in different scenarios, and the user’s gait data collected by the orientation-sensitive sensor will be biased accordingly.Therefore, it has become an urgent problem to provide a multi-scenario high-accuracy gait authentication method for smartphones.In addition, the selection of the model training algorithm determines the accuracy and efficiency of gait authentication.The current popular authentication model based on long short-term memory (LSTM) network can achieve high authentication accuracy, but it has many training parameters, large memory footprint, and the training efficiency needs to be improved.In order to solve the above problems a multi-scenario gait authentication scheme for smartphones based on Gate Recurrent Unit (GRU) was proposed.The gait signals were preliminarily denoised by wavelet transform, and the looped gait signals were segmented by an adaptive gait cycle segmentation algorithm.In order to meet the authentication requirements of multi-scenario, the coordinate system transformation method was used to perform direction-independent processing on the gait signals, so as to eliminate the influence of the orientation of the smartphone and the movement of the user on the authentication result.Besides, in order to achieve high-accuracy authentication and efficient model training, GRUs with different architectures and various optimization methods were used to train the gait model.The proposed scheme was experimentally analyzed on publicly available datasets PSR and ZJU-GaitAcc.Compared with the related schemes, the proposed scheme improves the authentication accuracy.Compared with the LSTM-based gait authentication model, the training efficiency of the proposed model is improved by about 20%.…”
    Get full text
    Article
  4. 5264
  5. 5265
  6. 5266

    The Proposal and Validation of a Distributed Real-Time Data Management Framework Based on Edge Computing with OPC Unified Architecture and Kafka by Daixing Lu, Kun Wang, Yubo Wang, Ye Shen

    Published 2025-06-01
    “…This research provides a practical solution for the industrial data management system, not only helping enterprises improve the transparency level of manufacturing sites and the efficiency of resource scheduling but also providing a practical basis for further research on industrial data processing under the “edge-cloud collaboration” architecture in the academic community.…”
    Get full text
    Article
  7. 5267

    3D Synthetic Aperture Imaging Method in Spectrum Domain for Low-Cost Portable Ultrasound Systems by Jurij TASINKIEWICZ

    Published 2023-11-01
    “…Moreover, the computational speed of the fast Fourier transform (FFT) algorithm utilized for the ultrasound image synthesis in the spectrum domain makes the proposed method to be more competitive compared to the conventional time domain (TD) STA method based on the delay-and-sum (DAS) technique, especially in the case of 3D imaging in real time mode. …”
    Get full text
    Article
  8. 5268

    HEALTH CLAIM INSURANCE PREDICTION USING SUPPORT VECTOR MACHINE WITH PARTICLE SWARM OPTIMIZATION by Syaiful Anam, M. Rafael Andika Putra, Zuraidah Fitriah, Indah Yanti, Noor Hidayat, Dwi Mifta Mahanani

    Published 2023-06-01
    “…The derivatives aren’t needed in its computation. Several researches show that PSO give the better solutions if it is compared with GA. …”
    Get full text
    Article
  9. 5269

    Modelling and Simulation of a 3MW, Seventeen-Phase Permanent Magnet AC Motor with AI-Based Drive Control for Submarines Under Deep-Sea Conditions by Arun Singh, Anita Khosla

    Published 2025-08-01
    “…Addressing this gap, this research investigates advanced control methodologies to enhance the performance of such motors. …”
    Get full text
    Article
  10. 5270

    AESware: Developing AES-enabled low-power multicore processors leveraging open RISC-V cores with a shared lightweight AES accelerator by Eunjin Choi, Jina Park, Kyuseung Han, Woojoo Lee

    Published 2024-12-01
    “…Nevertheless, comprehensive research on developing low-power multicore processors with integrated security features using existing open RISC-V cores remains limited. …”
    Get full text
    Article
  11. 5271
  12. 5272

    Distinguishing glioblastoma from brain metastasis; a systematic review and meta-analysis on the performance of machine learning by Mohammad Amin Habibi, Reza Omid, Shafaq Asgarzade, Sadaf Derakhshandeh, Ali Soltani Farsani, Zohreh Tajabadi

    Published 2025-02-01
    “…We systematically reviewed the studies reported the performance of machine learning (ML) algorithms for accurately discrimination of these two entities. …”
    Get full text
    Article
  13. 5273
  14. 5274

    A Novel Two-Stage Deep Learning Model for Network Intrusion Detection: LSTM-AE by Vanlalruata Hnamte, Hong Nhung-Nguyen, Jamal Hussain, Yong Hwa-Kim

    Published 2023-01-01
    “…The constant development of network behavior and the fast growth of attacks need the development of IDS and the evaluation of many datasets produced over time through static and dynamic methods. This kind of research enables the identification of the most efficient algorithm for identifying future cyber-attacks. …”
    Get full text
    Article
  15. 5275
  16. 5276
  17. 5277

    A Crime Data Analysis of Prediction Based on Classification Approaches by Fatima Shaker Hussain, Abbas Fadhil Aljuboori

    Published 2022-10-01
    “…The aim is focused on comparative study between three supervised learning algorithms. …”
    Get full text
    Article
  18. 5278
  19. 5279

    Numerical Solution of Dual Fully Fuzzy Equations System Using Some Meta Heuristic Methods by Aang Nuryaman, Fatimatuzzahra, Rafiq Arssy Arifa, La Zakaria, Muhammad Ahsar Karim

    Published 2025-10-01
    “…We consider the equations system in crisp equations form as an optimization problem, and then its problems are solved. Here we compare the performance of four meta-heuristic methods, i.e., genetic algorithm (GA), chaos optimization algorithm (COA), particle swarm optimization (PSO), and grey wolf optimizer (GWO), to solve some cases in our problems. …”
    Get full text
    Article
  20. 5280