Showing 1,621 - 1,640 results of 1,978 for search 'since algorithm', query time: 0.10s Refine Results
  1. 1621

    Methodological Tools for Evaluating Effectiveness of Capital Construction Projects of Oil Producing Enterprises by E. L. Chazov, V. P. Grakhov, O. L. Simchenko

    Published 2021-02-01
    “…At each stage, an integral indicator is determined by calculation based on the results of objective data analysis  and using the developed algorithms. Thus, it is possible to judge the effectiveness of any project without being based on a subjective approach in the assessment with the help of expert opinion.…”
    Get full text
    Article
  2. 1622

    Short-Circuit Protection Schemes for LVDC Microgrids Based on the Combination of Hybrid Circuit Breakers and Mechanical Breakers by Riccardo Lazzari, Luigi Piegari

    Published 2023-01-01
    “…The proposed control strategy is compared with a centralized protection scheme available in the literature through numerical simulation. The two algorithms show similar performances, with a mean voltage dip duration of less than 30 ms and a maximum voltage dip duration of about 100 ms in the most severe fault condition, but the proposed solution is more reliable and flexible since it does not depend on the communication system.…”
    Get full text
    Article
  3. 1623

    Analog Circuits Fault Diagnosis Using ISM Technique and a GA-SVM Classifier Approach by Sabah Kouachi, Nacerdine Bourouba, Kamel Mebarkia, Imad Laidani

    Published 2024-12-01
    “…This is built with GA and SVM algorithms combination targeting both data reduction and fault classification accuracy respectively. …”
    Get full text
    Article
  4. 1624

    The Laboratory Diagnosis of HIV Infections by Margaret Fearon

    Published 2005-01-01
    “…Most diagnostic laboratories have complex testing algorithms to ensure accuracy of results and optimal use of laboratory resources. …”
    Get full text
    Article
  5. 1625

    A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods by Tawfiq Aljohani, Abdulaziz Almutairi

    Published 2024-12-01
    “…The third taxonomy discusses the countermeasures and defensive mechanisms to secure the EVs against cyberattacks, including preventive measures, detection algorithms, response strategy, and recovery techniques. …”
    Get full text
    Article
  6. 1626

    Edges are all you need: Potential of medical time series analysis on complete blood count data with graph neural networks. by Daniel Walke, Daniel Steinbach, Sebastian Gibb, Thorsten Kaiser, Gunter Saake, Paul C Ahrens, David Broneske, Robert Heyer

    Published 2025-01-01
    “…<h4>Purpose</h4>Machine learning is a powerful tool to develop algorithms for clinical diagnosis. However, standard machine learning algorithms are not perfectly suited for clinical data since the data are interconnected and may contain time series. …”
    Get full text
    Article
  7. 1627

    Management of Chronic Hepatitis C: Consensus Guidelines by Morris Sherman, Stephen Shafran, Kelly Burak, Karen Doucette, Winnie Wong, Nigel Girgrah, Eric Yoshida, Eberhard Renner, Philip Wong, Marc Deschênes

    Published 2007-01-01
    “…Since the last consensus conference on the management of chronic viral hepatitis, a number of studies looking at modifications of the standard course of treatment have been published. …”
    Get full text
    Article
  8. 1628

    MRCS-Net: Multi-Radar Clustering Segmentation Networks for Full-Pulse Sequences by Tao Chen, Yu Lei, Limin Guo, Boyi Yang

    Published 2025-04-01
    “…The network innovatively addresses the processing challenges of prolonged full-pulse signals and effectively achieves the classification and recognition of different pulses under time–frequency overlapping conditions. The proposed algorithm filters the signal with SincNet and then sequentially feeds the sequence into a long short-term memory network. …”
    Get full text
    Article
  9. 1629
  10. 1630

    Enhancing accuracy through ensemble based machine learning for intrusion detection and privacy preservation over the network of smart cities by Mudita Uppal, Yonis Gulzar, Deepali Gupta, Jayant Uppal, Mukesh Kumar, Shilpa Saini

    Published 2025-02-01
    “…In this study, various supervised machine learning algorithms for anomaly-based detection methods are compared. …”
    Get full text
    Article
  11. 1631

    GenAI-Based Jamming and Spoofing Attacks on UAVs by Burcu Sonmez Sarikaya, Serif Bahtiyar

    Published 2025-01-01
    “…Creating effective intrusion detection systems against such attacks has been a significant challenge since there is a lack of sufficient attack data that can be used to design an intrusion detection system with advanced computing algorithms. …”
    Get full text
    Article
  12. 1632

    An AIoT Architecture for Structural Testing: Application to a Real Aerospace Component (Embraer E2 Model Aircraft Flag Track) by Pablo Venegas, Unai Virto, Isidro Calvo, Oscar Barambones

    Published 2025-04-01
    “…However, its use in aeronautical testing is still incipient, since this kind of test must ensure strict safety requirements. …”
    Get full text
    Article
  13. 1633

    Assessment and Correction of the Cardiac Complications Risk in Non-cardiac Operations – What's New? by A. N. Sumin

    Published 2022-11-01
    “…Recent years have been characterized by the appearance of national and international guidelines with various algorithms for assessing and correcting cardiac risk, as well as publications on the validation of these algorithms. …”
    Get full text
    Article
  14. 1634

    Advanced intrusion detection technique (AIDT) for secure communication among devices in internet of medical things (IoMT) by M. Ramya, Pradeep Sudhakaran, Yuvaraj Sivagnanam, C. Santhana Krishnan

    Published 2025-05-01
    “…However, security and privacy have been issues since IoMT devices are vulnerable to hackers. IoMT devices don’t have enough memory or processing power to set up security features. …”
    Get full text
    Article
  15. 1635

    Distributed Beamforming for Relay Assisted Multiuser Machine-to-Machine Networks by Chen Chen, Lin Bai, Meiping Feng, Minhua Huang, Tian Tian

    Published 2012-08-01
    “…Early works have mostly focused on various centralized relay beamforming schemes based on global channel state information (CSI). Since global CSI is often unavailable due to geometric locations, power limitation, or other constraints of the relay nodes in M2M networks, our work aims to develop distributed algorithms that each relay node individually learns its own beamforming weights with local CSI. …”
    Get full text
    Article
  16. 1636

    Ocean Response Along the East Antarctic Coastal Margin to the Southern Annular Mode by K. Mizobata, D. Hirano, K. Kusahara, S. Aoki, J. Inoue, S. Takao, R. Makabe

    Published 2025-03-01
    “…However, until recently, satellite‐based sea‐level observations have been limited by the presence of sea ice. With improved algorithms, it is now possible to monitor sea‐level fluctuations over most of the Southern Ocean, including sea ice‐covered areas. …”
    Get full text
    Article
  17. 1637

    An Efficient Method to Estimate Admittance of Black-boxed Inverter-based Resources for Varying Operating Points by Weihua Zhou, Bin Liu, Nabil Mohammed, Behrooz Bahrani

    Published 2024-01-01
    “…However, existing admittance estimation algorithms usually face challenges in versatility, data demands, and accuracy. …”
    Get full text
    Article
  18. 1638

    Experimental Assessment of Linear Sampling and Factorization Methods for Microwave Imaging of Concealed Targets by M. N. Akıncı, T. Çağlayan, S. Özgür, U. Alkaşı, M. Abbak, M. Çayören

    Published 2015-01-01
    “…Yet, these methods are rarely employed in real nondestructive testing applications, since they generally require the electrical parameters of outer object as a priori knowledge. …”
    Get full text
    Article
  19. 1639

    Analysis of the Effect of Skin Pigmentation and Oxygen Saturation on Monte Carlo-Simulated Reflectance Photoplethysmography Signals by Raghda Al-Halawani, Meha Qassem, Panicos A. Kyriacou

    Published 2025-01-01
    “…These results suggest that in-built adjustments may be required for data collected from red-light sources in pulse oximeters that do not currently have the necessary post-processing algorithms to account for this difference between diverse skin populations.…”
    Get full text
    Article
  20. 1640

    The use of artificial intelligence for automatic analysis and reporting of software defects by Mark Esposito, Mark Esposito, Saman Sarbazvatan, Terence Tse, Gabriel Silva-Atencio

    Published 2024-12-01
    “…In conclusion, companies that incorporate AI algorithms will be able to include an agile model in their lifecycle, as they will reduce the rate of failures, errors, and breakdowns allowing cost savings, and ensuring quality.…”
    Get full text
    Article