Showing 1,141 - 1,160 results of 1,978 for search 'since algorithm', query time: 0.08s Refine Results
  1. 1141

    The Accuracy of Diagnostic Tests for Lyme Disease in Humans, A Systematic Review and Meta-Analysis of North American Research. by Lisa A Waddell, Judy Greig, Mariola Mascarenhas, Shannon Harding, Robbin Lindsay, Nicholas Ogden

    Published 2016-01-01
    “…Recent studies examining the sensitivity and specificity of various test protocols noted that the Immunetics® C6 B. burgdorferi ELISA™ and the two tier approach have superior specificity compared to proposed replacements, and the CDC recommended western blot algorithm has equivalent or superior specificity over other proposed test algorithms. …”
    Get full text
    Article
  2. 1142

    Seismic Damage Quantification of RC Short Columns from Crack Images Using the Enhanced U-Net by Zixiao Chen, Qian Chen, Zexu Dai, Chenghao Song, Xiaobin Hu

    Published 2025-01-01
    “…It is of great importance to quantify the seismic damage of reinforced concrete (RC) short columns since they often experience severe damage due to likely excessive shear deformation. …”
    Get full text
    Article
  3. 1143

    Forecasting the vapor pressure deficit in vertical farming facilities aiming to provide optimal indoor conditions by Carlos Alejandro Perez Garcia, Dafni Despoina Avgoustaki, Enrica Santolini, Daniele Torreggiani, Thomas Bartzanas, Patrizia Tassinari, Marco Bovo

    Published 2025-07-01
    “…This research develops and validates a prediction model based on NeuralProphet algorithm to assess the vapor pressure deficit in a vertical farming facility. …”
    Get full text
    Article
  4. 1144

    PEMANFAATAN DIGITAL TERRAIN MODEL HASIL FOTOGRAMETRI UNMANED AERIAL VEHICLE UNTUK ESTIMASI KETINGGIAN GENANGAN AIR BANJIR HASIL DETEKSI CITRA SYNTHETIC APPERTURE RADAR by Hariady Indra Mantong

    Published 2021-05-01
    “…This study has produced 4 sets of DTMs; 2 sets of DTMs with different grid resolution which are 2 cm & 40 cm, also the 2 other sets of DTM with extra fine nature algorithm and set of filtering parameters adjustment; bulge, offset, spike and standard deviation. …”
    Get full text
    Article
  5. 1145

    Multi-Scale Multi-Domain Hybrid Finite Element Modeling of Light Propagation by Jingwei Wang, Zhanwen Wang, Lida Liu, Yuntian Chen

    Published 2024-12-01
    “…Since the computational time is inversely proportional to the number of decomposed subdomains (N) under the parallel computing configuration, the computational time in our work is approximately reduced to \begin{document}${1}/{3N}$\end{document} of that using standard FEM for the two examples.…”
    Get full text
    Article
  6. 1146

    A framework for locating multiple RFID tags using RF hologram tensors by Xiangyu Wang, Jian Zhang, Shiwen Mao, Senthilkumar CG Periaswamy, Justin Patton

    Published 2025-04-01
    “…We also present an intuitive peak finding algorithm to obtain estimated locations using the sanitized hologram tensors. …”
    Get full text
    Article
  7. 1147

    A lightweight hardware implementation of CRYSTALS-Kyber by Shiyang He, Hui Li, Fenghua Li, Ruhui Ma

    Published 2024-03-01
    “…Since December 2016, the National Institute of Standards and Technology (NIST) has begun to solicit post-quantum cryptographic (PQC) algorithms worldwide. …”
    Get full text
    Article
  8. 1148

    Diaphragm injuries in a mature trauma system: still a diagnostic challenge by S. Karhof, R. K. J. Simmermacher, P. Gerbranda, K. J. P. van Wessem, L. P. H. Leenen, F. Hietbrink

    Published 2024-12-01
    “…Even more, despite major improvement in diagnostic modalities over the past 2 decades, the algorithm for detection of diaphragmatic injuries has not changed nor has its outcome. …”
    Get full text
    Article
  9. 1149

    Toward Automated Air Leak Localization: A Machine Learning-Enhanced Ultrasonic and LiDAR-SLAM Framework for Industrial Environments by Anthony Schenck, Walter Daems, Jan Steckel

    Published 2025-01-01
    “…Typically ultrasonic microphone arrays are used to detect the leaks, since the escaping air causes turbulences around the leak opening. …”
    Get full text
    Article
  10. 1150

    Phenotypic heterogeneity and diagnostic features of transthyretin amyloidosis with polyneuropathy by S. S. Nikitin, S. N. Bardakov, N. A. Suponeva, I. V. Zhirov, T. A. Adyan, D. A. Grishina, R. V. Deev

    Published 2021-12-01
    “…Early diagnosis is critically important for patients with ATTR polyneuropathy, since the early prescription of Vyndaqel (tafamidis), registered in the Russian Federation in 2017, allows a significant clinical effect to be obtained. …”
    Get full text
    Article
  11. 1151

    Polarimetric Identification of 3D-Printed Nano Particle Encoded Optical Codes by Kavan Ahmadi, Pedro Latorre-Carmona, Bahram Javidi, Artur Carnicer

    Published 2020-01-01
    “…Recently, this concept was extended to optical codes: we demonstrated that the combined use of optical techniques and machine learning algorithms might be able to distinguish among different classes of samples. …”
    Get full text
    Article
  12. 1152

    Restoration of Hardware Function of Spectral Colorimeters Using Regularization Methods by M. A. Radjabova, B. I. Eshmatova, N. K. Babanazarova

    Published 2021-12-01
    “…An algorithm for restoring the hardware function of a spectral device based on regular methods for solving ill-posed problems is proposed. …”
    Get full text
    Article
  13. 1153

    Detection of anthropogenic noise pollution as a possible chronic stressor in Antarctic Specially Protected Area N°150, Ardley Island by Maximiliano Anzibar Fialho, Martín Rocamora, Lucía Ziegler

    Published 2025-07-01
    “…Anthropogenic noise pollution is emerging as an important environmental stressor with the potential effect of disrupting natural ecosystems, since many taxa rely on acoustic signals for social interaction and communication. …”
    Get full text
    Article
  14. 1154

    Text mining of hypertension researches in the west Asia region: a 12-year trend analysis by Mohammad Rezapour, Mohsen Yazdinejad, Faezeh Rajabi Kouchi, Masoomeh Habibi Baghi, Zahra Khorrami, Morteza Khavanin Zadeh, Elmira Pourbaghi, Hassan Rezapour

    Published 2024-12-01
    “…Present analysis uses Latent Dirichlet allocation (LDA) as an algorithm of topic modeling (TM) in text mining, to obtain subjective topic-word distribution from the 2790 studies over the EMRO. …”
    Get full text
    Article
  15. 1155

    Efficient Bayesian inference for stochastic agent-based models. by Andreas Christ Sølvsten Jørgensen, Atiyo Ghosh, Marc Sturrock, Vahid Shahrezaei

    Published 2022-10-01
    “…However, we find that while some methods generally produce more robust results than others, no algorithm offers a one-size-fits-all solution when attempting to infer model parameters from observations. …”
    Get full text
    Article
  16. 1156

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article
  17. 1157

    DTIP-WINDGRU a novel drug-target interaction prediction with wind-enhanced gated recurrent unit by Kavipriya Gananathan, D. Manjula, Vijayan Sugumaran

    Published 2025-07-01
    “…Finally, the Wind Driven Optimization (WDO) algorithm is utilized to optimally choose the hyperparameters involved in the GRU model. …”
    Get full text
    Article
  18. 1158

    Constructing a web recommender system using web usage mining and user’s profiles by T. Mombeini, A. Harounabadi, J. Rezaeian Sheshdeh

    Published 2014-12-01
    “…Following the creation of user profiles, users are categorized in clusters using the Fuzzy C-means clustering algorithm and S(c) criterion based on their similarities. …”
    Get full text
    Article
  19. 1159

    Leveraging stacking machine learning models and optimization for improved cyberattack detection by Neha Pramanick, Jimson Mathew, Shitharth Selvarajan, Mayank Agarwal

    Published 2025-05-01
    “…There are high hurdles in managing high-dimensional network traffic since current methodologies are limited in dealing with imbalanced data issues of minority classes versus the majority and high false positive rate in classification accuracy. …”
    Get full text
    Article
  20. 1160

    UAV-Based SAR-Imaging of Objects From Arbitrary Trajectories Using Weighted Backprojection by Alexander Grathwohl, Julian Kanz, Christina Bonfert, Christian Waldschmidt

    Published 2025-01-01
    “…Both the distance between radar and targets as well as the viewing angle of the radar change significantly during flight. A common imaging algorithm for close-range and nonlinear flightpaths is therefore backprojection (BP), since it respects the nonlinear flightpath. …”
    Get full text
    Article