Showing 15,901 - 15,920 results of 25,328 for search 'research algorithm', query time: 0.20s Refine Results
  1. 15901

    Sensitivity Analysis of P-Wave Polarization Direction and Velocity Gradient Inversion by Jingru Zhao, Xili Jing, Zhiyong Yin, Mengyu Fang, Shan Gao, Tianrun Zhang

    Published 2025-01-01
    “…It is usually translated from the results of seismic travel-time tomography. Recent researches show seismic polarization direction appears to be a promising data source for obtaining velocity gradient field directly. …”
    Get full text
    Article
  2. 15902
  3. 15903

    Directly from surface to bulk: rapid prediction of internal densification in laser powder bed fusion additively manufactured nickel-based superalloy using machine learning by Longhai Hu, Keyu Shi, Dongdong Gu, Han Zhang, Miao Chang, Menghuan Yin, Jinming Xing, Ruiqi Wang, Kai Tang, Kuanyang Feng, Xuechun Hei

    Published 2025-08-01
    “…The research revealed that when energy input remains conventional thresholds, components exhibit nearly defect-free interiors with densities reaching 99.9%. …”
    Get full text
    Article
  4. 15904

    HPV-negative oropharyngeal carcinoma as a separate prognostkally unfavorable form of cancer, requiring new approaches to treatment (case report) by A. R. Gevorkov, A. V. Boyko, A. P. Polyakov, L. V. Bolotina, N. N. Volchenko, I. V. Rebrikova, A. М. Lemeshko, S. V. Shashkov

    Published 2019-07-01
    “…Herzen Moscow Oncology Research Institute in January 2017 with complaints of pain in the right part of the oropharynx irradiating to the right ear and difficulties with swallowing food and liquids. …”
    Get full text
    Article
  5. 15905

    Harnessing synergy of machine learning and nature-inspired optimization for enhanced compressive strength prediction in concrete by Abba Bashir, Esar Ahmad, Shashivendra Dulawat, Sani I. Abba

    Published 2025-06-01
    “…This study assesses nine machine learning models, integrating conventional AI algorithms, such as artificial neural network (ANN), support vector regression (SVR), and random forest (RF) with nature-inspired optimization techniques including chicken swarm optimization (CSO), moth flame optimization algorithm (MFO), and whale optimization algorithm (WOA). …”
    Get full text
    Article
  6. 15906

    The evaluation of the hemodynamically significant stenosis of the carotid arteries: analyzing the results from the duplex scanning of vessels, from the computed tomographic and the... by Nataly S. Nosenko, Ekaterina M. Nosenko, Daria S. Alemasova, Tatiana V. Dedy

    Published 2025-01-01
    “…RESULTS: The conducted research has shown that there is no complete matching between the data from the transcatheter X-ray contrast angiography, the computed tomographic angiography and the duplex scanning. …”
    Get full text
    Article
  7. 15907

    THE CLINICAL CONFERENCE AS GUIDANCE TO FORMING INTERNS’ PROFESSIONAL COMPETENCIES DURING FORMATION IN THE UMSA’S DEPARTMENT OF POSTGRADUATED EDUCATION OF DENTISTS by T.P. Skripnikova, M.V. Khrebor, Ju. I. Sylenko, O.A. Pisarenko

    Published 2018-09-01
    “…Interns have opportunity to be engaged in the research work of the department or into individual research work. …”
    Get full text
    Article
  8. 15908
  9. 15909
  10. 15910
  11. 15911
  12. 15912
  13. 15913

    Advancing Diabetic Retinopathy Screening: A Systematic Review of Artificial Intelligence and Optical Coherence Tomography Angiography Innovations by Alireza Hayati, Mohammad Reza Abdol Homayuni, Reza Sadeghi, Hassan Asadigandomani, Mohammad Dashtkoohi, Sajad Eslami, Mohammad Soleimani

    Published 2025-03-01
    “…In comparison to conventional ML techniques, our results indicated that DL algorithms significantly improve the accuracy, sensitivity, and specificity of DR screening. …”
    Get full text
    Article
  14. 15914
  15. 15915

    Graph neural networks embedded with domain knowledge for cyber threat intelligence entity and relationship mining by Gan Liu, Kai Lu, Saiqi Pi

    Published 2025-04-01
    “…Next, the features from domain knowledge graph embedding and those generated by the bidirectional encoder representations from transformers (BERT) model are fused using the Layernorm algorithm. Finally, the fused features are processed using the GlobalPointer algorithm to generate both the threat entity type matrix and the threat entity relation type matrix, thereby enabling the identification of threat entities and their relationships. …”
    Get full text
    Article
  16. 15916
  17. 15917
  18. 15918
  19. 15919
  20. 15920