-
1121
-
1122
Prediksi Stok dan Pengaturan Tata Letak Barang Menggunakan Kombinasi Algoritma Triple Exponential Smoothing dan FP-Growth
Published 2020-10-01“…FP-Growth algorithm to find out user behavior patterns can be used to develop Triple Exponential Smoothing decisions and algorithms which are forecasting algorithms for inventory items. …”
Get full text
Article -
1123
Enhanced climate change resilience on wheat anther morphology using optimized deep learning techniques
Published 2024-10-01“…Various Deep Learning algorithms, including Convolution Neural Network (CNN), LeNet, and Inception-V3 are implemented to classify the records and extract various patterns. …”
Get full text
Article -
1124
A machine learning approach to identifying key predictors of Peruvian school principals' job satisfaction
Published 2025-05-01“…Despite the significance of this issue, there is limited research on satisfaction predictors for these professionals, particularly using machine learning approaches. …”
Get full text
Article -
1125
Prediction of knee joint pain in Tai Chi practitioners: a cross-sectional machine learning approach
Published 2023-08-01Get full text
Article -
1126
Comparison of High-Resolution Digital Elevation Models for Customizing Hydrological Analysis of Urban Basins: Considerations, Opportunities, and Implications for Stormwater System...
Published 2025-02-01“…Although some studies claim to have obtained the same results using different software and algorithms, in this research, different results were obtained, and emphasize the importance of establishing procedural standards, as they can significantly impact the design of stormwater drainage systems. …”
Get full text
Article -
1127
-
1128
ADPO: Adaptive DRAM Controller for Performance Optimization
Published 2025-03-01“…The research methodology involves implementing a rank-level timing aware read/write turnaround arbiter and setting read/write queue thresholds and read/write turnaround settings based on observed patterns. …”
Get full text
Article -
1129
A Progressive Clustering Approach for Buildings Using MST and SOM with Feature Factors
Published 2025-02-01“…To address the challenges in current research on spatial clustering algorithms for buildings in topographic maps—namely, their limited ability to effectively accommodate diverse application scenarios, including dense and regular urban environments, sparsely and irregularly distributed rural areas, and urban villages with complex structures—this paper introduces an innovative progressive clustering algorithm framework. …”
Get full text
Article -
1130
Non-invasive detection of Parkinson’s disease based on speech analysis and interpretable machine learning
Published 2025-04-01Get full text
Article -
1131
-
1132
Introduction to Computational Creativity
Published 2025-04-01“…By deconstructing the cognitive processes involved in human creativity, researchers can design algorithms that simulate these processes. …”
Get full text
Article -
1133
Study Comparison Deep Learning and Support Vector Machine for Face Mask Detection
Published 2025-06-01“…Both algorithms have proven to be powerful tools for any classification problem specially to classify or identify image patterns. …”
Get full text
Article -
1134
Reversible Adversarial Examples with Minimalist Evolution for Recognition Control in Computer Vision
Published 2025-01-01Get full text
Article -
1135
Optical Field Localization in the Three-Dimensional Percolating System with Gaussian Distribution Disorder
Published 2024-01-01Get full text
Article -
1136
Machine learning-based characteristic identification of MSG content in gravy foods
Published 2024-01-01“…This research determines the identification of MSG using the Machine Learning method Naive Bayes classifier algorithm in Python software. …”
Get full text
Article -
1137
VIRUS CHANGE MODEL IN ORGANIZATIONAL TRANSFORMATION
Published 2018-09-01“…Virus technology organizational changes model is presented as an outcome of multidisciplinary research. The model consists of organizational virus structure, chang-es algorithm and immune instruments for process interruption. …”
Get full text
Article -
1138
Preliminary Results in the Investigation of In Vivo Iliac and Coronary Flow Collision, Vortex Formation, and Disorganized Flow Degeneration: Insights from Invasive Cardiology Based...
Published 2024-09-01“…<b>Background</b>: In the research of coronary artery disease, the precise initial injury that starts the atherosclerotic cascade remains unidentified. …”
Get full text
Article -
1139
Locality-guided based optimization method for bounded model checker
Published 2018-03-01“…For software model checking,approaches that combine with different kind of verification methods are now under research.The key to improve scale and complexity of verifiable software is handling the method for abstraction widening and strengthening wisely and precisely.To archive that,using extra knowledge that extracted from programming pattern or learned through verifying procedure to help eliminate the redundant state has been proved effective.Definition of program locality was given.It took the important role in accelerating software verification,then the strategy was raised and an algorithm was implemented to take advantage of program locality.This method exploits the features of modern BMC (bounded model checker) and scales up the capability of its power in large scale and comprehensive software modules.…”
Get full text
Article -
1140
A Deep Learning Model Leveraging Time-Series System Call Data to Detect Malware Attacks in Virtual Machines
Published 2025-03-01“…The raw VMM system call traces are transformed into novel Time Series System Call patterns and utilized by a deep learning algorithm for training and building the classifier model. …”
Get full text
Article