Showing 19,661 - 19,680 results of 25,328 for search 'research algorithm', query time: 0.20s Refine Results
  1. 19661

    AI-powered advances in type II endometrial cancer: global trends and African contexts by Thulo Molefi, Thulo Molefi, Thulo Molefi, Lloyd Mabonga, Rodney Hull, Motshedisi Sebitloane, Zodwa Dlamini

    Published 2025-07-01
    “…In Future, with continued research and the development of robust frameworks and transparent algorithms, investment and collaboration, the potential of AI in Type II EC will be realized.…”
    Get full text
    Article
  2. 19662
  3. 19663

    A Systematic Literature Review of Cyber Security Monitoring in Maritime by Risto Vaarandi, Leonidas Tsiopoulos, Gabor Visky, Muaan Ur Rehman, Hayretdin Bahsi

    Published 2025-01-01
    “…The current paper addresses this research gap and surveys the methods, algorithms, tools and architectures used for cyber security monitoring in the maritime sector. …”
    Get full text
    Article
  4. 19664

    Gamified Engagement for Data Crowdsourcing and AI Literacy: An Investigation in Affective Communication Through Speech Emotion Recognition by Eleni Siamtanidou, Lazaros Vrysis, Nikolaos Vryzas, Charalampos A. Dimoulas

    Published 2025-02-01
    “…This research investigates the utilization of entertainment approaches, such as serious games and gamification technologies, to address various challenges and implement targeted tasks. …”
    Get full text
    Article
  5. 19665
  6. 19666

    Survey of artificial intelligence data security and privacy protection by Kui REN, Quanrun MENG, Shoukun YAN, Zhan QIN

    Published 2021-02-01
    “…Artificial intelligence and deep learning algorithms are developing rapidly.These emerging techniques have been widely used in audio and video recognition, natural language processing and other fields.However, in recent years, researchers have found that there are many security risks in the current mainstream artificial intelligence model, and these problems will limit the development of AI.Therefore, the data security and privacy protection was studied in AI.For data and privacy leakage, the model output based and model update based problem of data leakage were studied.In the model output based problem of data leakage, the principles and research status of model extraction attack, model inversion attack and membership inference attack were discussed.In the model update based problem of data leakage, how attackers steal private data in the process of distributed training was discussed.For data and privacy protection, three kinds of defense methods, namely model structure defense, information confusion defense and query control defense were studied.In summarize, the theoretical foundations, classic algorithms of data inference attack techniques were introduced.A few research efforts on the defense techniques were described in order to provoke further research efforts in this critical area.…”
    Get full text
    Article
  7. 19667

    An Overview of Application of Machine Learning Models in Urban Flood Simulation and Forecasting by CHEN Zeming, FANG Xuhong, LI Jiaye, WANG Mengyao, CHEN Aifang, YIN Ling

    Published 2025-01-01
    “…By systematically searching and synthesizing the relevant literature published in the recent decade, this paper sorted out the background, trend causes, and research hotspots of urban floods. Additionally, this paper also focused on the research on urban flood simulation and forecasting models based on machine learning algorithms published in the recent five years, summarized the technical processes for urban flood simulation and forecasting models based on machine learning algorithms, and proposed several current technological bottlenecks and potential solutions. …”
    Get full text
    Article
  8. 19668
  9. 19669

    Mf-net: multi-feature fusion network based on two-stream extraction and multi-scale enhancement for face forgery detection by Hanxian Duan, Qian Jiang, Xin Jin, Michal Wozniak, Yi Zhao, Liwen Wu, Shaowen Yao, Wei Zhou

    Published 2024-11-01
    “…Current face forgery detection algorithms achieve high detection accuracy within-dataset. …”
    Get full text
    Article
  10. 19670
  11. 19671

    Development of a 101.6K liquid‐phased probe for GWAS and genomic selection in pine wilt disease‐resistance breeding in Masson pine by Jingyi Zhu, Qinghua Liu, Shu Diao, Zhichun Zhou, Yangdong Wang, Xianyin Ding, Mingyue Cao, Dinghui Luo

    Published 2025-03-01
    “…A total of 548 SNPs were considerably associated with disease‐resistance traits using four GWAS algorithms. Among them, 283 were located on or linked to 169 genes, including common plant disease resistance‐related protein families such as NBS‐LRR and AP2/ERF. …”
    Get full text
    Article
  12. 19672
  13. 19673

    AI‐Driven TENGs for Self‐Powered Smart Sensors and Intelligent Devices by Aiswarya Baburaj, Syamini Jayadevan, Akshaya Kumar Aliyana, Naveen Kumar SK, George K Stylios

    Published 2025-05-01
    “…The review also identifies key challenges and future research directions, including the development of low‐power AI algorithms, sustainable materials, hybrid energy systems, and robust security protocols for AI‐enhanced TENG solutions.…”
    Get full text
    Article
  14. 19674

    OpenSRANE, a Flexible and Extensible Platform for Quantitative Risk Assessment of NaTech Events by Bijan SayyafZadeh, Abdolreza S. Moghadam, Mahdi Sahrifi, Eslam Kashi

    Published 2024-07-01
    “…The effects of natural hazards triggering technological disaster (NaTech) on a society, economy and the environment is a multi-disciplinary research topic. The novelty of the issue and the lack of a standard procedure for risk assessment of this category of incidents show the need for more research in this area. …”
    Get full text
    Article
  15. 19675
  16. 19676

    Machine learning in predicting firm performance: a systematic review by Yaseen Hezam, Hoa Luong, Lilian Anthonysamy

    Published 2025-07-01
    “…It aims to assess the effectiveness of various ML methods and algorithms used in recent research, focusing on the prediction of firm performance across multiple dimensions. …”
    Get full text
    Article
  17. 19677
  18. 19678
  19. 19679

    An Experimental Test Bed for Developing High-Rate Structural Health Monitoring Methods by Bryan Joyce, Jacob Dodson, Simon Laflamme, Jonathan Hong

    Published 2018-01-01
    “…While high-rate SHM methods are an area of current research, there are no benchmark experiments for validating these algorithms. …”
    Get full text
    Article
  20. 19680

    Horizontal federated learning and assessment of Cox models by Frank Westers, Sam Leder, Lucia Tealdi

    Published 2025-06-01
    “…The Cox Proportional Hazards model is a widely used method for survival analysis in medical research. However, training an accurate model requires access to a sufficiently large dataset, which is often challenging due to data fragmentation. …”
    Get full text
    Article