Search alternatives:
pattern research » pain research (Expand Search)
Showing 341 - 360 results of 2,101 for search 'pattern research algorithms', query time: 0.16s Refine Results
  1. 341
  2. 342
  3. 343

    Machine heuristic in algorithm aversion: Perceived creativity and effort of output created by or with artificial intelligence by Sigurd Birk Heimstad, Anders Hauge Wien, Tarje Gaustad

    Published 2025-08-01
    “…Through two pre-registered experiments, we investigate how individuals evaluate creative content when it is labeled as created by AI, humans, or human-AI collaboration. While previous research has established algorithm aversion across various domains, our findings reveal nuanced patterns in creative contexts. …”
    Get full text
    Article
  4. 344
  5. 345

    Similarity measure for intuitionistic fuzzy sets and its applications in pattern recognition and multimodal medical image fusion by Anjali Patel, Deepa Gupta, E. A. Gopalakrishnan, Divya Sasidharan, V. Sowmya, Mohammed Zakariah, Abdulaziz S. Almazyad

    Published 2025-07-01
    “…Abstract Intuitionistic fuzzy similarity measures (IFSMs) play a significant role in applications involving complex decision-making, pattern recognition, and image processing. Several researchers have introduced different methods of IFSMs, yet these IFSMs fail to provide rational decisions. …”
    Get full text
    Article
  6. 346
  7. 347
  8. 348

    Artificial intelligence in automatic image segmentation system for exploring recurrence patterns in small cell carcinoma of the lung by Jing Shen, Shaobin Wang, Hui Guan, Mingyi Di, Zhikai Liu, Qi Chen, Mei Li, Jie Shen, Ke Hu, Fuquan Zhang

    Published 2025-05-01
    “…Utilizing imaging recurrence data, this study applies a recursive feature elimination algorithm to model and predict patient prognoses, aiming to enhance clinical guidance and prediction accuracy.Materials and MethodsThis research analyzed data from SCLC patients who received curative radiotherapy from January 1, 2010, to December 30, 2021, and had comprehensive follow-up records including pre- and post-treatment imaging. …”
    Get full text
    Article
  9. 349

    Evaluation of GLOCK 9 mm Firing Pin Aperture Shear Mark Individuality Based on 3,156 Different Pistols (Manufactured Over a 30 Year Period in Two Countries) Using Additional Patter... by James E. Hamby, Eric Warren, Stephen Norris, Nicholas D.K. Petraco

    Published 2024-07-01
    “…A total of 3156 GLOCK firearms were used to generate a sample of the same size. Our research hypothesis was that no cartridge cases fired from different 9 mm semiautomatic GLOCK pistols would be mistaken as coming from the same gun (a false match). …”
    Get full text
    Article
  10. 350

    Patterns of changing surface climate variability from the Last Glacial Maximum to present in transient model simulations by E. Ziegler, E. Ziegler, N. Weitzel, J.-P. Baudouin, M.-L. Kapsch, U. Mikolajewicz, L. Gregoire, R. Ivanovic, P. J. Valdes, C. Wirths, K. Rehfeld, K. Rehfeld

    Published 2025-03-01
    “…A reanalysis of the LGM exhibits similar global mean variability to most of the ensemble, but spatial patterns vary. However, paleoclimate data assimilation combines model and proxy data information using a Kalman-filter-based algorithm. …”
    Get full text
    Article
  11. 351

    Deep Learning-Based Dzongkha Handwritten Digit Classification by Yonten Jamtsho, Pema Yangden, Sonam Wangmo, Nima Dema

    Published 2024-03-01
    “…With the advancement in deep learning technology, many machine learning algorithms were developed to tackle the problem of pattern recognition. …”
    Get full text
    Article
  12. 352

    Hypertension Detection Using Passive-Aggressive Algorithm With The PA-I And PA-II Methods by M. Hafidz Ariansyah, Sri Winarno

    Published 2023-03-01
    “…In this paper, the researchers used the Passive-Aggressive algorithm and the PA-I and PA-II methods to make a model for the diagnosis of hypertension. …”
    Get full text
    Article
  13. 353

    Weaponizing the Workplace: How Algorithmic Management Shaped Amazon’s Antiunion Campaign in Bessemer, Alabama by Teke Wiggin

    Published 2025-02-01
    “…The findings reveal that employers can weaponize elements or effects of algorithmic management against unions via repurposing devices that algorithmically control workers, engaging in “algorithmic slack-cutting,” and exploiting patterns of social media activity encouraged by algorithmic management. …”
    Get full text
    Article
  14. 354
  15. 355

    IoT-enhanced music therapy: Utilizing genetic algorithms for personalized violin instruction and mental health adjustment by Yuan Wang

    Published 2025-08-01
    “…On the other hand, a genetic algorithm is an intelligent tool that reveals patterns in this information and identifies hidden relationships between instructional variables and the student’s mental health. …”
    Get full text
    Article
  16. 356
  17. 357

    Toward Sustainable Campus Energy Management: A Comprehensive Review of Energy Management, Predictive Algorithms, and Recommendations by Noor Islam Jasim, Saraswathy Shamini Gunasekaran, Nouar AlDahoul, Ali Najah Ahmed, Ahmed El-Shafie, Mohsen Sherif, Moamin A Mahmoud

    Published 2025-06-01
    “…The paper states that to facilitate energy efficiency and manage consumption, it is important to extract patterns of energy consumption by data modelling and predictive algorithms to achieve the ultimate goal of consumption recommending and advising. …”
    Get full text
    Article
  18. 358

    A Comparative Study of Machine Learning Algorithms for Intrusion Detection Systems using the NSL-KDD Dataset by Rulyansyah Permata Putra, Amarudin Amarudin

    Published 2025-07-01
    “…In today’s digital era, cyberattacks are becoming increasingly complex, rendering traditional rule-based Intrusion Detection Systems (IDS) often ineffective in recognizing new attack patterns. The primary objective of this study is to design and implement a machine learning model for detecting network intrusions efficiently while minimizing latency, through a comparative analysis of several algorithms: Decision Tree, Random Forest, Support Vector Machine (SVM), and Boosting. …”
    Get full text
    Article
  19. 359
  20. 360