Showing 1,961 - 1,978 results of 1,978 for search 'since algorithm', query time: 0.12s Refine Results
  1. 1961

    An artificial intelligence approach to palaeogeographic studies: a case study of the Late Ordovician brachiopods of Laurentia by Akbar Sohrabi

    Published 2025-06-01
    “…Based on the training algorithm and after 146 periods, the training error decreased, but the validation error increased (Fig. 7). …”
    Get full text
    Article
  2. 1962

    A Deep Learning-Based Echo Extrapolation Method by Fusing Radar Mosaic and RMAPS-NOW Data by Shanhao Wang, Zhiqun Hu, Fuzeng Wang, Ruiting Liu, Lirong Wang, Jiexin Chen

    Published 2025-07-01
    “…A multi-channel radar echo extrapolation network architecture (MR-DCGAN) is then designed based on the DCGAN framework; (3) Since radar echo decay becomes more prominent over longer extrapolation horizons, this study departs from previous approaches that use a single model to extrapolate 120 min. …”
    Get full text
    Article
  3. 1963

    Hybrid closed-loop systems for managing blood glucose levels in type 1 diabetes: a systematic review and economic modelling by Asra Asgharzadeh, Mubarak Patel, Martin Connock, Sara Damery, Iman Ghosh, Mary Jordan, Karoline Freeman, Anna Brown, Rachel Court, Sharin Baldwin, Fatai Ogunlayi, Chris Stinton, Ewen Cummins, Lena Al-Khudairy

    Published 2024-12-01
    “…The system includes a combination of real-time continuous glucose monitoring from a continuous glucose monitoring device and a control algorithm to direct insulin delivery through an insulin pump. …”
    Get full text
    Article
  4. 1964

    Providing a Framework for Assessing and Evaluating Network Data Studies in the Fight Against Social Anomalies by Mohammad Khalili, Hamzehali Nourmohammadi, Nader Naghshineh

    Published 2024-09-01
    “…Additionally, clustering techniques, such as k-means, were employed to identify different forms of theft crimes. Classification algorithms, including neural networks, Bayesian rules, Bayesian navigation, and support vector machines, were used to predict theft crimes. …”
    Get full text
    Article
  5. 1965

    ggClusterNet 2: An R package for microbial co‐occurrence networks and associated indicator correlation patterns by Tao Wen, Yong‐Xin Liu, Lanlan Liu, Guoqing Niu, Zhexu Ding, Xinyang Teng, Jie Ma, Ying Liu, Shengdie Yang, Penghao Xie, Tianjiao Zhang, Lei Wang, Zhanyuan Lu, Qirong Shen, Jun Yuan

    Published 2025-06-01
    “…Abstract Since its initial release in 2022, ggClusterNet has become a vital tool for microbiome research, enabling microbial co‐occurrence network analysis and visualization in over 300 studies. …”
    Get full text
    Article
  6. 1966

    The Milky Way Radial Metallicity Gradient as an Equilibrium Phenomenon: Why Old Stars Are Metal Rich by James W. Johnson, David H. Weinberg, Guillermo A. Blanc, Ana Bonaca, Gwen C. Rudie, Yuxi (Lucy) Lu, Bronwyn Reichardt Chu, Emily J. Griffith, Tawny Sit, Jennifer A. Johnson, Liam O. Dubay, Miqaela K. Weller, Daniel A. Boyea, Jonathan C. Bird

    Published 2025-01-01
    “…We quantify the evolution of the metallicity gradient in the Milky Way as traced by APOGEE red giants with age estimates from machine learning algorithms. Stars up to ages of ∼9 Gyr follow a similar relation between metallicity and Galactocentric radius. …”
    Get full text
    Article
  7. 1967
  8. 1968

    AI-powered literature search: some observations and concerns by Farooq Azam Rathore, Fareeha Farooq

    Published 2024-12-01
    “…They should clearly outline their article selection criteria and summarization algorithms. This should be clearly displayed at the appropriate place at the website…”
    Get full text
    Article
  9. 1969

    Human Action Recognition Method Based on Multi-channel Fusion by Zhiyong TAO, Xijun GUO, Xiaokui REN, Ying LIU, Zemin WANG

    Published 2025-01-01
    “…In this challenging context, innovative algorithms and model designs are crucial for addressing differences in CSI features between various actions and enhancing the model’s generalization ability and robustness.Method This study explores human actions’ physical and MIMO transmission characteristics, proposing a deep learning-based human action recognition method that employs a dual attention mechanism and a multi-channel, multi-scale fusion temporal convolution network to address the above challenges. …”
    Get full text
    Article
  10. 1970

    Evaluation of 1-phase, 3-phase and Lightning Faults on Wind Farms using EMTP-RV by Saber Arabi Nowdeh, Mohsen Chitsaz, Saheb Khanabdal

    Published 2024-02-01
    “…Since development of wind power plants installation is growing, problems related to network connecting, stability and voltage effects become more important. …”
    Get full text
    Article
  11. 1971
  12. 1972

    Thermal comfort and energy related occupancy behavior in Dutch residential dwellings by Anastasios Ioannou

    Published 2018-10-01
    “…Such pattern recognition algorithms can be more effective in the era of mobile internet, which allows the capturing of huge amounts of data. …”
    Get full text
    Article
  13. 1973

    Evaluation of Knowledge Management Maturity Level in Iranian Audiovisual Archives Based on the APQC Model by Sepideh Ciruskabiri, Atefeh Sharif, Saeed Rezaei Sharifabadi, Mohammad Hassanzadeh

    Published 2025-06-01
    “…Moreover, investment in modernizing technological infrastructures and integrating innovative tools—such as artificial intelligence and machine learning algorithms—can markedly enhance the processes of data collection, storage, and retrieval. …”
    Get full text
    Article
  14. 1974

    Project quality, regulation quality by Elena Mussinelli

    Published 2024-06-01
    “…Instead, deductive design approaches seem to prevail today, due to the growing availability of algorithmic procedures that do not merely support the design process, but develop it in an almost automated manner through conditioning and prevailing indicators and parameters. …”
    Get full text
    Article
  15. 1975

    Enhancing Sustainable Manufacturing in Industry 4.0: A Zero-Defect Approach Leveraging Effective Dynamic Quality Factors by Rouhollah Khakpour, Ahmad Ebrahimi, Seyed Mohammad Seyed Hosseini

    Published 2025-06-01
    “…Moreover, the gathered data from defect detection can be used in two ways: to prevent defect occurrence in the future (detect-prevent) and to design algorithms for predicting when a defect may occur in the future, hence, to prevent defects before they arise (predict-prevent). …”
    Get full text
    Article
  16. 1976

    Computing Eigenvalues of Discontinuous Sturm-Liouville Problems with Eigenparameter in All Boundary Conditions Using Hermite Approximation by M. M. Tharwat, A. H. Bhrawy, A. S. Alofi

    Published 2013-01-01
    “…Numerical results indicating the high accuracy and effectiveness of these algorithms are presented. Moreover, it is shown that the proposed methods are significantly more accurate than those based on the classical sinc method.…”
    Get full text
    Article
  17. 1977

    Improving the Performance of CPA Attacks for Ciphers Using Parallel Implementation of S-Boxes by Fu Yao, Yongzhuang Wei, Hua Chen, Enes Pasalic

    Published 2023-01-01
    “…Since their introduction in early 2000, CPA (correlation power analysis), as a cryptographic tool, has been widely used in the cryptanalysis of cryptographic algorithms (being applicable to both symmetric key ciphers as well as to public key encryption schemes). …”
    Get full text
    Article
  18. 1978

    Characterization of CYGNSS Ocean Surface Wind Speed Products by Christopher Ruf, Mohammad Al-Khaldi, Shakeel Asharaf, Rajeswari Balasubramaniam, Darren McKague, Daniel Pascual, Anthony Russel, Dorina Twigg, April Warnock

    Published 2024-11-01
    “…Since its launch in 2016, a number of wind speed retrieval algorithms have been developed for the NASA CYGNSS satellite observations. …”
    Get full text
    Article