Showing 1,661 - 1,680 results of 1,978 for search 'since algorithm', query time: 0.08s Refine Results
  1. 1661
  2. 1662

    Effect of bit-size reduced half-precision floating-point format on image pixel characterization for AI applications by J. Jean Jenifer Nesam, S. Sankar Ganesh, Sitharthan Ramachandran

    Published 2024-12-01
    “…The updated pixel values after applying the mantissa bit-size reduction are displayed in this study, along with a theoretical explanation of its inaccuracy. Since multipliers and adders are needed for the majority of mathematical equations in machine learning image algorithms, they are developed later in this work to process the image. …”
    Get full text
    Article
  3. 1663

    Comparative analysis of transfer learning performance on generalised EEG data for use in a depression diagnosis task by Shusharina, Natalia Nikolaevna

    Published 2025-01-01
    “…In order to test the quality of contrastive learning, the dataset was augmented and the following algorithms were selected as the donor network: SimCLR, MoCo, NNCLR, BarlowTwins, DINO. …”
    Get full text
    Article
  4. 1664
  5. 1665

    An Efficient Global Optimization Approach for Reliability Maximization of Friction-Tuned Mass Damper-Controlled Structures by Fábio F. S. Nascentes, Rafael H. Lopez, Jose Eduardo S. Cursi, Rubens Sampaio, Leandro F. F. Miguel

    Published 2018-01-01
    “…In order to show the effectiveness of EGO, its results are compared to those of other algorithms from the literature. The results showed that EGO outperformed the competing algorithms, successfully providing the optimum solution of FTMD design under uncertainty within a reasonable computational effort.…”
    Get full text
    Article
  6. 1666

    UNS Geo: LiDAR Dataset for point cloud classification in urban areas by M. Govedarica, G. Jakovljevic, I. Ruskoviski, V. Pajic

    Published 2025-07-01
    “…Although in the last few years, different methodologies and algorithms have been proposed, precise and detailed point cloud labelling is still challenging. …”
    Get full text
    Article
  7. 1667

    Development of an Intelligent System for the Recommendation of the Most Suitable Routes for Pedestrians by M. H. Zali, M. Argany, M. A. Mostafavi, M. A. Mostafavi

    Published 2025-07-01
    “…This data was then integrated into a web-based public participation system, emphasizing the crucial role of citizen input in urban planning. Routing algorithms, including A* and Dijkstra's algorithms, were employed to identify optimized pedestrian routes based on the community feedback. …”
    Get full text
    Article
  8. 1668

    Artificial Intelligence for Automatic Pain Assessment: Research Methods and Perspectives by Marco Cascella, Daniela Schiavo, Arturo Cuomo, Alessandro Ottaiano, Francesco Perri, Renato Patrone, Sara Migliarelli, Elena Giovanna Bignami, Alessandro Vittori, Francesco Cutugno

    Published 2023-01-01
    “…Concerning methods, early studies were conducted by machine learning algorithms such as support vector machine, decision tree, and random forest classifiers. …”
    Get full text
    Article
  9. 1669

    Software Methodology for Data Control and Collection for Autonomous Monitoring Systems with a Large Amount of Generated Information on the Example of Software for a Hydrological Ra... by I. S. Serdiukov, V. I. Veremyev, Van Tuan Nguyen

    Published 2023-05-01
    “…In some applications, such a flow is redundant and can be optimized through the use of various algorithms for the primary processing of information. …”
    Get full text
    Article
  10. 1670

    Architecture of the discrete sosine transformation processor for image compression systems on the losless-to-lossy circuit by V. V. Kliuchenia

    Published 2021-08-01
    “…It is the inequality of the addition and multiplication operations when they are implemented on FPGAs that caused the search for DCT algorithms with the smallest number of factors. However, even this is not enough, since the structure of the multiplier is many times more complex than the structure of the adder, which made it necessary to look for ways to transform without using multiplications at all. …”
    Get full text
    Article
  11. 1671

    Emergence of Technology Driven Promotional Strategies for Commercialised Indian Cinema by Singh Vikash, Dahiya Surbhi, Abraham Albert, Tausif Ahmad

    Published 2024-12-01
    “…The findings of the current study are establishing Online Movie Recommendation System, Classified and Summarized Online Movie Review System and a Personalized Social Networking Marketing (SNM) System by using several ML algorithms such as classification and clustering, KM, SVM, RF, Colour Pair Clustering algorithms. …”
    Get full text
    Article
  12. 1672

    HarmonizR: blocking and singular feature data adjustment improve runtime efficiency and data preservation by Simon Schlumbohm, Julia E. Neumann, Philipp Neumann

    Published 2025-02-01
    “…Due to the inherent presence of missing values by such methods and their additional introduction by means of data integration, renowned algorithms such as ComBat and limma are unable to perform batch effect adjustment. …”
    Get full text
    Article
  13. 1673

    The Prediction of Storm‐Time Thermospheric Mass Density by LSTM‐Based Ensemble Learning by Peian Wang, Zhou Chen, Xiaohua Deng, Jingsong Wang, Rongxing Tang, Haimeng Li, Sheng Hong, Zhiping Wu

    Published 2022-03-01
    “…In this paper, an available prediction model is established by Long Short‐Term Memory (LSTM)‐based ensemble learning algorithms. However, the generalization ability of the deep learning model is often suspicious since training data and testing data are from the same data set in the conventional method. …”
    Get full text
    Article
  14. 1674

    Explainable AI-based suicidal and non-suicidal ideations detection from social media text with enhanced ensemble technique by Daniyal Alghazzawi, Hayat Ullah, Naila Tabassum, Sahar K. Badri, Muhammad Zubair Asghar

    Published 2025-01-01
    “…Our system is compared to cutting-edge methods on several social media datasets using experimental evaluations, demonstrating that it is superior, since it detects suicidal content more accurately than others. …”
    Get full text
    Article
  15. 1675

    MANS-Net: Multiple Attention-Based Nuclei Segmentation in Multi Organ Digital Cancer Histopathology Images by Ibtihaj Ahmad, Zain Ul Islam, Saleem Riaz, Fuzhong Xue

    Published 2024-01-01
    “…We report that MANS-Net significantly outperforms state-of-the-art segmentation algorithms. We achieve F1 score of 0.8457 for PanNuke dataset and F1 score of 0.8137 for Kumar dataset. …”
    Get full text
    Article
  16. 1676

    Enhancing Geomagnetic Navigation with PPO-LSTM: Robust Navigation Utilizing Observed Geomagnetic Field Data by Xiaohui Zhang, Wenqi Bai, Jun Liu, Songnan Yang, Ting Shang, Haolin Liu

    Published 2025-06-01
    “…The results demonstrate that PPO-LSTM outperforms baseline algorithms, achieving smoother trajectories and higher heading accuracy. …”
    Get full text
    Article
  17. 1677

    Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range by Zhe SUN, Hong NING, Lihua YIN, Binxing FANG

    Published 2023-02-01
    “…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
    Get full text
    Article
  18. 1678

    A Novel Method for Community Detection in Bipartite Networks by Ali Khosrozadeh, Ali Movaghar, Mohammad Mehdi Gilanian Sadeghi, Hamidreza Mahyar

    Published 2025-05-01
    “…While several low-time complexity algorithms exist, their practical value in real-world applications is limited since they are typically non-deterministic. …”
    Get full text
    Article
  19. 1679

    A Review of Passenger Counting in Public Transport Concepts with Solution Proposal Based on Image Processing and Machine Learning by Aleksander Radovan, Leo Mršić, Goran Đambić, Branko Mihaljević

    Published 2024-12-01
    “…The research explores various technologies and algorithms, like card swiping, infrared, weight and ultrasonic sensors, RFID, Wi-Fi, Bluetooth, LiDAR, thermos cameras, including CCTV cameras and traditional computer vision methods, and advanced deep learning approaches, highlighting their strengths and limitations. …”
    Get full text
    Article
  20. 1680

    Visible and near‐infrared image fusion based on information complementarity by Zhuo Li, Shiliang Pu, Mengqi Ji, Feng Zeng, Bo Li

    Published 2025-02-01
    “…Unfortunately, current fusion algorithms produce artefacts and colour distortion since they cannot make use of spectrum properties and are lacking in information complementarity. …”
    Get full text
    Article