Showing 341 - 360 results of 2,101 for search 'patterns research algorithms', query time: 0.16s Refine Results
  1. 341

    Joint Flood Control Operation of Reservoirs in Xiaoshui Basin Based on DP-PS Algorithm by SHENG Dong, XU Xingyi, LIN Fanqi, HE Huaiguang, YUAN Yanmei, LUO Jinming

    Published 2024-10-01
    “…On this basis, the dynamic programming-pattern search algorithm (DP-PS) is introduced to solve the model, and the operation scheme under the most unfavorable flood scenario is obtained. …”
    Get full text
    Article
  2. 342

    Development of a Mobile-Based Application for Classifying Caladium Plants Using the CNN Algorithm by Rudy Chandra, Tegar Arifin Prasetyo, Heni Ernita Lumbangaol, Veny Siahaan, Johan Immanuel Sianipar

    Published 2024-05-01
    “…To overcome this problem, research will use machine learning with the Convolutional Neural Network (CNN) algorithm to build a mobile application that can accurately classify four types of Caladiums. …”
    Get full text
    Article
  3. 343

    Feature Extraction using Histogram of Oriented Gradients and Moments with Random Forest Classification for Batik Pattern Detection by Wafiq Azizah, Soffiana Agustin

    Published 2025-01-01
    “…These findings underscore the efficacy of integrating HOG and Texture Moments with the Random Forest algorithm for automated batik pattern recognition.…”
    Get full text
    Article
  4. 344
  5. 345

    Update on Erythrodermic Psoriasis: Proposal of a Management Algorithm by an Innovative Severity Evaluation Approach by Xu JM, Wu C, Feng H, Jin HZ

    Published 2025-07-01
    “…Jia-Ming Xu,* Chao Wu,* Hao Feng, Hong-Zhong Jin Department of Dermatology, State Key Laboratory of Complex Severe and Rare Diseases, Peking Union Medical College Hospital, Chinese Academy of Medical Sciences and Peking Union Medical College, National Clinical Research Center for Dermatologic and Immunologic Diseases, Beijing, People’s Republic of China*These authors contributed equally to this workCorrespondence: Hong-Zhong Jin, Email jinhongzhong@263.netAbstract: Erythrodermic psoriasis (EP) is an uncommon and severe form of psoriasis, which exhibits a Th1/Th17/TNF inflammatory pattern. …”
    Get full text
    Article
  6. 346
  7. 347

    Similarity measure for intuitionistic fuzzy sets and its applications in pattern recognition and multimodal medical image fusion by Anjali Patel, Deepa Gupta, E. A. Gopalakrishnan, Divya Sasidharan, V. Sowmya, Mohammed Zakariah, Abdulaziz S. Almazyad

    Published 2025-07-01
    “…Abstract Intuitionistic fuzzy similarity measures (IFSMs) play a significant role in applications involving complex decision-making, pattern recognition, and image processing. Several researchers have introduced different methods of IFSMs, yet these IFSMs fail to provide rational decisions. …”
    Get full text
    Article
  8. 348
  9. 349

    IoT-enhanced music therapy: Utilizing genetic algorithms for personalized violin instruction and mental health adjustment by Yuan Wang

    Published 2025-08-01
    “…On the other hand, a genetic algorithm is an intelligent tool that reveals patterns in this information and identifies hidden relationships between instructional variables and the student’s mental health. …”
    Get full text
    Article
  10. 350

    Artificial intelligence in automatic image segmentation system for exploring recurrence patterns in small cell carcinoma of the lung by Jing Shen, Shaobin Wang, Hui Guan, Mingyi Di, Zhikai Liu, Qi Chen, Mei Li, Jie Shen, Ke Hu, Fuquan Zhang

    Published 2025-05-01
    “…Utilizing imaging recurrence data, this study applies a recursive feature elimination algorithm to model and predict patient prognoses, aiming to enhance clinical guidance and prediction accuracy.Materials and MethodsThis research analyzed data from SCLC patients who received curative radiotherapy from January 1, 2010, to December 30, 2021, and had comprehensive follow-up records including pre- and post-treatment imaging. …”
    Get full text
    Article
  11. 351

    A Comparative Study of Machine Learning Algorithms for Intrusion Detection Systems using the NSL-KDD Dataset by Rulyansyah Permata Putra, Amarudin Amarudin

    Published 2025-07-01
    “…In today’s digital era, cyberattacks are becoming increasingly complex, rendering traditional rule-based Intrusion Detection Systems (IDS) often ineffective in recognizing new attack patterns. The primary objective of this study is to design and implement a machine learning model for detecting network intrusions efficiently while minimizing latency, through a comparative analysis of several algorithms: Decision Tree, Random Forest, Support Vector Machine (SVM), and Boosting. …”
    Get full text
    Article
  12. 352

    Evaluation of GLOCK 9 mm Firing Pin Aperture Shear Mark Individuality Based on 3,156 Different Pistols (Manufactured Over a 30 Year Period in Two Countries) Using Additional Patter... by James E. Hamby, Eric Warren, Stephen Norris, Nicholas D.K. Petraco

    Published 2024-07-01
    “…A total of 3156 GLOCK firearms were used to generate a sample of the same size. Our research hypothesis was that no cartridge cases fired from different 9 mm semiautomatic GLOCK pistols would be mistaken as coming from the same gun (a false match). …”
    Get full text
    Article
  13. 353

    Patterns of changing surface climate variability from the Last Glacial Maximum to present in transient model simulations by E. Ziegler, E. Ziegler, N. Weitzel, J.-P. Baudouin, M.-L. Kapsch, U. Mikolajewicz, L. Gregoire, R. Ivanovic, P. J. Valdes, C. Wirths, K. Rehfeld, K. Rehfeld

    Published 2025-03-01
    “…A reanalysis of the LGM exhibits similar global mean variability to most of the ensemble, but spatial patterns vary. However, paleoclimate data assimilation combines model and proxy data information using a Kalman-filter-based algorithm. …”
    Get full text
    Article
  14. 354
  15. 355
  16. 356

    Sports data analysis of track and field athletes based on IID-OPK and NonIID-OPK algorithms by Xiaofeng Chen

    Published 2025-12-01
    “…Therefore, the research introduces the Independent and Identically Distributed (IID) and Non-Independent and Identically Distributed (NonIID) ideas based on the K-means algorithm to optimize the data analysis process. …”
    Get full text
    Article
  17. 357

    Toward Sustainable Campus Energy Management: A Comprehensive Review of Energy Management, Predictive Algorithms, and Recommendations by Noor Islam Jasim, Saraswathy Shamini Gunasekaran, Nouar AlDahoul, Ali Najah Ahmed, Ahmed El-Shafie, Mohsen Sherif, Moamin A Mahmoud

    Published 2025-06-01
    “…The paper states that to facilitate energy efficiency and manage consumption, it is important to extract patterns of energy consumption by data modelling and predictive algorithms to achieve the ultimate goal of consumption recommending and advising. …”
    Get full text
    Article
  18. 358

    High-Performance Number Theoretic Transform on GPU Through radix2-CT and 4-Step Algorithms by Alisah Ozcan, Arsalan Javeed, Erkay Savas

    Published 2025-01-01
    “…These algorithms are based on the radix-2 Cooley-Tukey (CT) and 4-Step techniques, which are rooted in classical FFT research. …”
    Get full text
    Article
  19. 359
  20. 360

    Nursing Value Analysis and Risk Assessment of Acute Gastrointestinal Bleeding Using Multiagent Reinforcement Learning Algorithm by Fang Liu, Xiaoli Liu, Changyou Yin, Hongrong Wang

    Published 2022-01-01
    “…For risk assessment and nursing value analysis, machine learning-based prediction using a multiagent reinforcement algorithm is employed. For improving the performance of the proposed system, we use spider monkey optimization (SMO) algorithm. …”
    Get full text
    Article