Showing 941 - 960 results of 2,101 for search 'patterns research algorithms', query time: 0.15s Refine Results
  1. 941

    A systematic review on sleep stage classification and sleep disorder detection using artificial intelligence by Tayab Uddin Wara, Ababil Hossain Fahad, Adri Shankar Das, Md Mehedi Hasan Shawon

    Published 2025-07-01
    “…Brain waves are the most commonly used body signals for studying sleep patterns and disorders. Almost 36 % of the research exclusively used brain activity signals, and 80 % combined them with other body parameters in sleep staging. …”
    Get full text
    Article
  2. 942

    Introduction to Computational Creativity by Anna Longo, ChatGPT

    Published 2025-04-01
    “…By deconstructing the cognitive processes involved in human creativity, researchers can design algorithms that simulate these processes. …”
    Get full text
    Article
  3. 943

    An Investigation of Suicidal Ideation from Social Media Using Machine Learning Approach by Soumyabrata Saha, Suparna Dasgupta, Adnan Anam, Rahul Saha, Sudarshan Nath, Surajit Dutta

    Published 2023-06-01
    “…The machine learning algorithms showed high accuracy, precision, recall, and F1-score in detecting suicide patterns on social media data whereas SVM has the highest performance with an accuracy of 0.886.       …”
    Get full text
    Article
  4. 944

    <b>The investigation of commonalities in human brain semantic representations across people and across languages</b><br> by Augusto Buchweitz

    Published 2011-10-01
    “…These patterns allow computer algorithms to identify the brain activity associated with a specific word or picture. …”
    Get full text
    Article
  5. 945

    Optimizing Personalized and Context-Aware Recommendations in Pervasive Computing Environments by A. C. Kaladevi, V. Vinoth Kumar, T. R. Mahesh, Suresh Guluwadi

    Published 2024-12-01
    “…Abstract The researchers in the current era provided many new recommendation methodologies. …”
    Get full text
    Article
  6. 946

    Quantum-enhanced intelligent system for personalized adaptive radiotherapy dose estimation by Radhey Lal, Rajiv Kumar Singh, Dinesh Kumar Nishad, Saifullah Khalid

    Published 2025-06-01
    “…Abstract This research introduces a novel quantum-enhanced intelligent system tailored for personalized adaptive radiotherapy dose estimation. …”
    Get full text
    Article
  7. 947

    Discovery of Meaningful Rules by using DTW based on Cubic Spline Interpolation by Luis Alexander Calvo-Valverde, David Elías Alfaro-Barboza

    Published 2020-05-01
    “…The discovery of meaningful rules is achieved through efficient algorithms, equipped with a robust and accurate distance measure. …”
    Get full text
    Article
  8. 948

    Minangkabau Language Stemming: A New Approach with Modified Enhanced Confix Stripping by Fadhli Almu'iini Ahda, Aji Prasetya Wibawa, Didik Dwi Prasetya, Danang Arbian Sulistyo, Andrew Nafalski

    Published 2025-06-01
    “…The employed method assesses the efficacy of stemming, which differs according to language. Complex affixation patterns in Indonesian and regional languages such as Minangkabau pose considerable difficulties for traditional algorithms. …”
    Get full text
    Article
  9. 949

    Analyzing Decadal Trends of Vegetation Cover in Djibouti Using Landsat and Open Data Cube by Julee Wardle, Zachary Phillips

    Published 2025-01-01
    “…Using Digital Earth Africa’s Open Data Cube and thirty years of Landsat imagery, change detection algorithms, and statistical analysis, this research explores vegetation dynamics at various spatial and temporal scales. …”
    Get full text
    Article
  10. 950

    A study of Mandelbrot and Julia Sets via Picard-Thakur iteration with s-convexity. by Bashir Nawaz, Krzysztof Gdawiec, Kifayat Ullah, Maggie Aphane

    Published 2025-01-01
    “…Nowadays, many researchers are employing various iterative techniques to analyse the dynamics of fractal patterns. …”
    Get full text
    Article
  11. 951
  12. 952

    Online learning: Attitudes of Russian students by D. V. Rudenkin

    Published 2022-05-01
    “…In the course of the research, it was established that the increasing internetisation of the learning process does not correspond to the real needs and patterns of behaviour of the majority of students and is perceived by them rather negatively. …”
    Get full text
    Article
  13. 953
  14. 954

    AI-Driven Belt Failure Prediction and Prescriptive Maintenance with Motor Current Signature Analysis by João Paulo Costa, José Torres Farinha, Mateus Mendes, Jorge O. Estima

    Published 2025-06-01
    “…The incorporation of LSTM networks and swarm intelligence algorithms led to a significant improvement in predictive capabilities, allowing for the early detection of degradation patterns and timely intervention. …”
    Get full text
    Article
  15. 955

    Learning from Octopuses: Cutting-Edge Developments and Future Directions by Jinjie Duan, Yuning Lei, Jie Fang, Qi Qi, Zhiming Zhan, Yuxiang Wu

    Published 2025-04-01
    “…This paper reviews the research progress of bionic soft robot technology learned from octopuses. …”
    Get full text
    Article
  16. 956
  17. 957

    Detection and location of EEG events using deep learning visual inspection. by Mohammad Amin Fraiwan

    Published 2024-01-01
    “…This signal contains a number of distinctive waveform patterns that reflect the subject's health state in relation to sleep, neurological disorders, memory functions, and more. …”
    Get full text
    Article
  18. 958

    Key Generation and Testing Based on Biometrics by Alaa AbdulRaheeM, shahd Abdulrhman Hasso

    Published 2024-06-01
    “…Creating and testing a biometric key is a critical process used for security and identity verification .When using biometric traits such as fingerprints, facial features, iris patterns, earprints, and voice patterns, a unique key is created and linked to the individual's biometric identity. …”
    Get full text
    Article
  19. 959

    CoAt-Set: Transformed coordinated attack dataset for collaborative intrusion detection simulationMendeley Data by Aulia Arif Wardana, Grzegorz Kołaczek, Parman Sukarno

    Published 2025-04-01
    “…It is suitable for various applications, including collective threat intelligence research, analyzing distributed threat patterns, developing machine learning algorithms for distributed systems, and training simulations designed for heterogeneous network environments.…”
    Get full text
    Article
  20. 960

    Automating the amino acid identification in elliptical dichroism spectrometer with Machine Learning. by Ridhanya Sree Balamurugan, Yusuf Asad, Tommy Gao, Dharmakeerthi Nawarathna, Umamaheswara Rao Tida, Dali Sun

    Published 2025-01-01
    “…Advanced data preprocessing techniques and ML algorithms to learn patterns from the absorption profiles that distinguish different amino acids were investigated to prove the feasibility of this approach. …”
    Get full text
    Article