-
341
Joint Flood Control Operation of Reservoirs in Xiaoshui Basin Based on DP-PS Algorithm
Published 2024-10-01“…On this basis, the dynamic programming-pattern search algorithm (DP-PS) is introduced to solve the model, and the operation scheme under the most unfavorable flood scenario is obtained. …”
Get full text
Article -
342
Development of a Mobile-Based Application for Classifying Caladium Plants Using the CNN Algorithm
Published 2024-05-01“…To overcome this problem, research will use machine learning with the Convolutional Neural Network (CNN) algorithm to build a mobile application that can accurately classify four types of Caladiums. …”
Get full text
Article -
343
Feature Extraction using Histogram of Oriented Gradients and Moments with Random Forest Classification for Batik Pattern Detection
Published 2025-01-01“…These findings underscore the efficacy of integrating HOG and Texture Moments with the Random Forest algorithm for automated batik pattern recognition.…”
Get full text
Article -
344
-
345
Update on Erythrodermic Psoriasis: Proposal of a Management Algorithm by an Innovative Severity Evaluation Approach
Published 2025-07-01“…Jia-Ming Xu,* Chao Wu,* Hao Feng, Hong-Zhong Jin Department of Dermatology, State Key Laboratory of Complex Severe and Rare Diseases, Peking Union Medical College Hospital, Chinese Academy of Medical Sciences and Peking Union Medical College, National Clinical Research Center for Dermatologic and Immunologic Diseases, Beijing, People’s Republic of China*These authors contributed equally to this workCorrespondence: Hong-Zhong Jin, Email jinhongzhong@263.netAbstract: Erythrodermic psoriasis (EP) is an uncommon and severe form of psoriasis, which exhibits a Th1/Th17/TNF inflammatory pattern. …”
Get full text
Article -
346
-
347
Similarity measure for intuitionistic fuzzy sets and its applications in pattern recognition and multimodal medical image fusion
Published 2025-07-01“…Abstract Intuitionistic fuzzy similarity measures (IFSMs) play a significant role in applications involving complex decision-making, pattern recognition, and image processing. Several researchers have introduced different methods of IFSMs, yet these IFSMs fail to provide rational decisions. …”
Get full text
Article -
348
-
349
IoT-enhanced music therapy: Utilizing genetic algorithms for personalized violin instruction and mental health adjustment
Published 2025-08-01“…On the other hand, a genetic algorithm is an intelligent tool that reveals patterns in this information and identifies hidden relationships between instructional variables and the student’s mental health. …”
Get full text
Article -
350
Artificial intelligence in automatic image segmentation system for exploring recurrence patterns in small cell carcinoma of the lung
Published 2025-05-01“…Utilizing imaging recurrence data, this study applies a recursive feature elimination algorithm to model and predict patient prognoses, aiming to enhance clinical guidance and prediction accuracy.Materials and MethodsThis research analyzed data from SCLC patients who received curative radiotherapy from January 1, 2010, to December 30, 2021, and had comprehensive follow-up records including pre- and post-treatment imaging. …”
Get full text
Article -
351
A Comparative Study of Machine Learning Algorithms for Intrusion Detection Systems using the NSL-KDD Dataset
Published 2025-07-01“…In today’s digital era, cyberattacks are becoming increasingly complex, rendering traditional rule-based Intrusion Detection Systems (IDS) often ineffective in recognizing new attack patterns. The primary objective of this study is to design and implement a machine learning model for detecting network intrusions efficiently while minimizing latency, through a comparative analysis of several algorithms: Decision Tree, Random Forest, Support Vector Machine (SVM), and Boosting. …”
Get full text
Article -
352
Evaluation of GLOCK 9 mm Firing Pin Aperture Shear Mark Individuality Based on 3,156 Different Pistols (Manufactured Over a 30 Year Period in Two Countries) Using Additional Patter...
Published 2024-07-01“…A total of 3156 GLOCK firearms were used to generate a sample of the same size. Our research hypothesis was that no cartridge cases fired from different 9 mm semiautomatic GLOCK pistols would be mistaken as coming from the same gun (a false match). …”
Get full text
Article -
353
Patterns of changing surface climate variability from the Last Glacial Maximum to present in transient model simulations
Published 2025-03-01“…A reanalysis of the LGM exhibits similar global mean variability to most of the ensemble, but spatial patterns vary. However, paleoclimate data assimilation combines model and proxy data information using a Kalman-filter-based algorithm. …”
Get full text
Article -
354
-
355
Novel metrics and LSH algorithms for unsupervised, real-time anomaly detection in multi-aspect data streams
Published 2025-09-01Get full text
Article -
356
Sports data analysis of track and field athletes based on IID-OPK and NonIID-OPK algorithms
Published 2025-12-01“…Therefore, the research introduces the Independent and Identically Distributed (IID) and Non-Independent and Identically Distributed (NonIID) ideas based on the K-means algorithm to optimize the data analysis process. …”
Get full text
Article -
357
Toward Sustainable Campus Energy Management: A Comprehensive Review of Energy Management, Predictive Algorithms, and Recommendations
Published 2025-06-01“…The paper states that to facilitate energy efficiency and manage consumption, it is important to extract patterns of energy consumption by data modelling and predictive algorithms to achieve the ultimate goal of consumption recommending and advising. …”
Get full text
Article -
358
High-Performance Number Theoretic Transform on GPU Through radix2-CT and 4-Step Algorithms
Published 2025-01-01“…These algorithms are based on the radix-2 Cooley-Tukey (CT) and 4-Step techniques, which are rooted in classical FFT research. …”
Get full text
Article -
359
-
360
Nursing Value Analysis and Risk Assessment of Acute Gastrointestinal Bleeding Using Multiagent Reinforcement Learning Algorithm
Published 2022-01-01“…For risk assessment and nursing value analysis, machine learning-based prediction using a multiagent reinforcement algorithm is employed. For improving the performance of the proposed system, we use spider monkey optimization (SMO) algorithm. …”
Get full text
Article