Search alternatives:
search » research (Expand Search)
Showing 1,881 - 1,900 results of 2,054 for search 'comparative search algorithm', query time: 0.10s Refine Results
  1. 1881

    A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption by Mohamed Elhoseny, Hamdy Elminir, Alaa Riad, Xiaohui Yuan

    Published 2016-07-01
    “…The proposed encryption schema is built upon GASONeC algorithm (Elhoseny et al., 2014) that uses genetic algorithm to build the optimum network structure in the form of clusters. …”
    Get full text
    Article
  2. 1882

    Projection Histogram-Assisted Estimation of Common Phase Error in Coherent Optical OFDM Systems by Zhengxuan Li, Yun Li, Junjie Ma, Jian Chen, Yingxiong Song, Min Wang

    Published 2019-01-01
    “…By simply counting and maximizing the number of the projection points fell into certain intervals, the tile angle can be obtained, which means that the common phase error is known. Compared with the conventional blind phase searching method, the proposed method shows similar performance and reduced complexity. …”
    Get full text
    Article
  3. 1883

    Role of Artificial Intelligence in Minimizing Missed and Undiagnosed Fractures Among Trainee Residents by Sadat-Ali M, Al Omar HK, Alneghaimshi MM, AlHossan AM, Baragabh AM

    Published 2025-07-01
    “…This review was done to evaluate the accuracy of AI-assisted fracture detection and to compare with the residents in training.Methods: We searched all related electronic databases for English language literature between January 2015 and July 2023, Pub Med, Scopus, Web of Science, Cochrane Central Ovid Medline, Ovid Embase, EBSCO Cumulative Index to Allied Health Literature, with keywords of Artificial Intelligence, fractures, dislocations, X-rays, radiographs and missed diagnosis. …”
    Get full text
    Article
  4. 1884

    Evaluation of Plaid Models in Biclustering of Gene Expression Data by Hamid Alavi Majd, Soodeh Shahsavari, Ahmad Reza Baghestani, Seyyed Mohammad Tabatabaei, Naghme Khadem Bashi, Mostafa Rezaei Tavirani, Mohsen Hamidpour

    Published 2016-01-01
    “…Two simulated matrices with different degrees of overlap and noise are generated and then the intrinsic structure of these data is compared with biclusters result. Also, we have searched biologically significant discovered biclusters by GO analysis. …”
    Get full text
    Article
  5. 1885

    Breast thermography: a systematic review and meta-analysis by Ane Goñi-Arana, Jorge Pérez-Martín, Francisco Javier Díez

    Published 2024-11-01
    “…Additional documents were retrieved from the studies included in the systematic reviews that resulted from the search and by searching for the names of commercial systems. …”
    Get full text
    Article
  6. 1886

    Machine learning applications for early detection of esophageal cancer: a systematic review by Farhang Hosseini, Farkhondeh Asadi, Hassan Emami, Rayan Ebnali Harari

    Published 2023-07-01
    “…Methods We conducted a comprehensive systematic search of five databases (PubMed, Scopus, Web of Science, Wiley, and IEEE) using search terms such as “ML”, “Deep Learning (DL (“, “Neural Networks (NN)”, “Esophagus”, “EC” and “Early Detection”. …”
    Get full text
    Article
  7. 1887

    Research on implementation of interventions in tuberculosis control in low- and middle-income countries: a systematic review. by Frank Cobelens, Sanne van Kampen, Eleanor Ochodo, Rifat Atun, Christian Lienhardt

    Published 2012-01-01
    “…Evaluations of diagnostic and screening algorithms were more frequent (n = 19) but geographically clustered and mainly of non-comparative design. …”
    Get full text
    Article
  8. 1888

    Exploring the possibilities of MADDPG for UAV swarm control by simulating in Pac-Man environment by Artem Novikov, Sergiy Yakovlev, Ivan Gushchin

    Published 2025-02-01
    “…Future research should focus on comparing the effectiveness of MADDPG-trained models with multi-agent algorithms, such as Expectimax, Alpha-Beta Pruning, and Monte Carlo Tree Search (MCTS), to further understand the advantages and limitations of learning-based approaches compared with traditional decision-making methods in collaborative and adversarial UAV operations. …”
    Get full text
    Article
  9. 1889

    Evaluation of the Deep Q-Learning Models for Mobile Robot Path Planning Problem by Mehmet Gök

    Published 2024-08-01
    “…Search algorithms such as A* or Dijkstra are generally used to solve the path planning problem for mobile robots. …”
    Get full text
    Article
  10. 1890

    Discriminant Phase Component for Face Recognition by Naser Zaeri

    Published 2012-01-01
    “…Numerous face recognition techniques have been developed owing to the growing number of real-world applications. Most of current algorithms for face recognition involve considerable amount of computations and hence they cannot be used on devices constrained with limited speed and memory. …”
    Get full text
    Article
  11. 1891

    Uso de inteligencia artificial para predecir complicaciones en cirugías de columna toracolumbar degenerativa: revisión sistemática by G. Ricciardi, J.I. Cirillo Totera, R. Pons Belmonte, L. Romero Valverde, F. López Muñoz, A. Manríquez Díaz

    Published 2025-09-01
    “…Additionally, 8 publications were included from other sources (Argentine Association of Orthopedics and Traumatology Library; manual citation search). In 5 (41.6%) articles, the effectiveness of artificial intelligence predictive models was compared with conventional techniques. …”
    Get full text
    Article
  12. 1892

    [Translated article] Use of artificial intelligence to predict complications in degenerative thoracolumbar spine surgery: A systematic review by G. Ricciardi, J.I. Cirillo Totera, R. Pons Belmonte, L. Romero Valverde, F. López Muñoz, A. Manríquez Díaz

    Published 2025-09-01
    “…Additionally, 8 publications were included from other sources (Argentine Association of Orthopaedics and Traumatology Library; manual citation search). In 5 (41.6%) articles, the effectiveness of artificial intelligence predictive models was compared with conventional techniques. …”
    Get full text
    Article
  13. 1893

    Ultra-Wide Color Gamut of Three-Primary and Four-Primary Laser-Based Displays With Large Circadian Tunability by Jingxuan Sun, Liyue Xu, Jingyi Cui, Zixin Huang, Qinzhen Lin, Ruoping Lian, Shaohua Lin, Haoyang Liu, Zhiyi Lin, Shanrong Ke, Xiaoting Xue, Rongting Jin, Xinqin Liao, Zhong Chen, Ziquan Guo

    Published 2023-01-01
    “…In order to evaluate the circadian effect of such LBDs, the circadian parameters, such as melanopic efficacy of luminous radiation (MELR), circadian action factor (CAF), and circadian stimulus (CS), are considered and employed in this investigation. The genetic algorithm (GA) is used to search for the optimal values of circadian parameters at a certain thresholds of color gamut. …”
    Get full text
    Article
  14. 1894
  15. 1895

    Multi-cohort study in gastric cancer to develop CT-based radiomic models to predict pathological response to neoadjuvant immunotherapy by Ze-Ning Huang, Hao-Xiang Zhang, Yu-Qin Sun, Xing-Qi Zhang, Yi-Fen Lin, Cai-Ming Weng, Chao-Hui Zheng, Ping-Li, Jia-Bin Wang, Qi-Yue Chen, Long-Long Cao, Mi Lin, Ru-Hong Tu, Chang-Ming Huang, Jian-Xian Lin, Jian-Wei Xie

    Published 2025-03-01
    “…Radiomic features were extracted from CT images, and a multi-step feature selection procedure was applied to identify the top 20 representative features. Nine ML algorithms were implemented to build prediction models, with the optimal algorithm selected for the final prediction model. …”
    Get full text
    Article
  16. 1896

    An intrusion detection method based on system call sequence for train-mounted host devices by WANG Xue, WANG Lide, WANG Biao, XU Shuxian, WANG Chong

    Published 2023-11-01
    “…In this paper, the structure of Linux system and the principle of system call sequence were analyzed, the original data feature processing methods including feature extraction, bag-of-words, inverse-frequency processing and dimension reduction were designed, and an intrusion detection model based on Grid Search-K-Nearest Neighbor (GS-KNN) was created. The experimental results show that the accuracy of the method designed in this paper is 96.62%, and the method has certain advantages compared with other lightweight algorithms and can detect the network intrusion effectively.…”
    Get full text
    Article
  17. 1897

    A Systematic Survey of Sparse Clustering by Josephine Bernadette M. Benjamin, Miin-Shen Yang

    Published 2025-01-01
    “…We also investigate the use of regularization terms in the sparse clustering algorithms. In this survey, we consider an extensive search on published papers as well as textbooks and discuss important results reported in the literature. …”
    Get full text
    Article
  18. 1898

    A New Conjugate Gradient for Efficient Unconstrained Optimization with Robust Descent Guarantees by Hussein Saleem Ahmed

    Published 2025-06-01
    “… The Conjugate Gradient method is a powerful iterative algorithm aims to find the minimum of a function by iteratively searching along conjugate directions. …”
    Get full text
    Article
  19. 1899

    Optimization of Base Location and Patrol Routes for Unmanned Aerial Vehicles in Border Intelligence, Surveillance, and Reconnaissance by Yao Liu, Zhong Liu, Jianmai Shi, Guohua Wu, Chao Chen

    Published 2019-01-01
    “…The performance of the two algorithms is analysed and compared through randomly generated instances.…”
    Get full text
    Article
  20. 1900

    Bregman–Hausdorff Divergence: Strengthening the Connections Between Computational Geometry and Machine Learning by Tuyen Pham, Hana Dal Poz Kouřimská, Hubert Wagner

    Published 2025-05-01
    “…We propose new algorithms for computing Bregman–Hausdorff divergences based on a recently developed Kd-tree data structure for nearest neighbor search with respect to Bregman divergences. …”
    Get full text
    Article