Showing 9,741 - 9,760 results of 12,962 for search 'while algorithm', query time: 0.15s Refine Results
  1. 9741

    Oral contrast-enhanced ultrasonographic features and radiomics analysis to predict NIH risk stratification for gastrointestinal stromal tumors by Fan Yang, Fan Yang, Fan Yang, Fan Yang, Chun-wei Liu, Dai Zhang, Dai Zhang, Dai Zhang, Dai Zhang, Hai-Ling Wang, Hai-Ling Wang, Hai-Ling Wang, Hai-Ling Wang, Xi Wei, Xi Wei, Xi Wei, Xi Wei, Mo Yang, Mo Yang, Mo Yang

    Published 2025-07-01
    “…The clinical profiles, oral contrast-enhanced ultrasonography (CEUS), and endoscopic ultrasound (EUS) imaging data were collected. 105 patients with high-risk and moderate-risk GISTs were classified into the high-risk group, while 99 patients with low-risk and very-low-risk GISTs were classified into the low-risk group. …”
    Get full text
    Article
  2. 9742

    On Remoteness Functions of <i>k</i>-NIM with <i>k</i> + 1 Piles in Normal and in Misère Versions by Vladimir Gurvich, Vladislav Maximchuk, Georgy Miheenkov, Mariya Naumova

    Published 2024-11-01
    “…For <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>n</mi><mo>=</mo><mn>5</mn><mo>,</mo><mn>6</mn></mrow></semantics></math></inline-formula>, a polynomial algorithm computing P-positions was obtained for the normal version. …”
    Get full text
    Article
  3. 9743
  4. 9744

    Classical Benchmarks for Variational Quantum Eigensolver Simulations of the Hubbard Model by Antonios M. Alvertis, Abid Khan, Thomas Iadecola, Peter P. Orth, Norm Tubman

    Published 2025-05-01
    “…While these algorithms have been shown to reproduce the qualitative features of the Hubbard model, their quantitative accuracy in terms of producing true ground state energies and other properties, and the dependence of this accuracy on the system size and interaction strength, the choice of variational ansatz, and the degree of spatial inhomogeneity in the model, remains unknown. …”
    Get full text
    Article
  5. 9745

    Multi-Objective Performance Evaluation Framework for Integrated Fiber-Reinforced Shading Systems by Salman Oukati Sadegh, Emad Tabadkani, Mahmoud Oukati Sadegh

    Published 2025-03-01
    “…The proposed framework benefits from integrating Multi-objective Evolutionary Algorithms (MOEAs). Such algorithms have proven to address conflicting parameters effectively while providing a range of different solutions to problems. …”
    Get full text
    Article
  6. 9746

    Hybrid Filtering Technique for Accurate GNSS State Estimation by Jahnvi Verma, Nischal Bhattarai, Thejesh N. Bandi

    Published 2025-04-01
    “…For the real-world dynamic dataset, our method also provides a better fit to the measurements than the classical algorithms.…”
    Get full text
    Article
  7. 9747

    Can Knowledge Distillation Enable Seismic Interpolation, Super-Resolution, and Denoising Simultaneously? by Benwen Zhang, Linrong Wang

    Published 2025-01-01
    “…For comparison, we combine three interpolation algorithms with three super-resolution algorithms and select the one with the best performance. …”
    Get full text
    Article
  8. 9748

    Pharmacotherapeutic Options for Ophthalmic Conjunctivitis by A. D. van Eyk

    Published 2018-06-01
    “…Herpes simplex and Herpes zoster are the infective organisms also responsible for conjunctivitis while seasonal pollens are usually the cause for allergic conjunctivitis. …”
    Get full text
    Article
  9. 9749

    A network intrusion detection method designed for few-shot scenarios by Weichen HU, Congyuan XU, Yong ZHAN, Guanghui CHEN, Siqing LIU, Zhiqiang WANG, Xiaolin WANG

    Published 2023-10-01
    “…Existing intrusion detection techniques often require numerous malicious samples for model training.However, in real-world scenarios, only a small number of intrusion traffic samples can be obtained, which belong to few-shot scenarios.To address this challenge, a network intrusion detection method designed for few-shot scenarios was proposed.The method comprised two main parts: a packet sampling module and a meta-learning module.The packet sampling module was used for filtering, segmenting, and recombining raw network data, while the meta-learning module was used for feature extraction and result classification.Experimental results based on three few-shot datasets constructed from real network traffic data sources show that the method exhibits good applicability and fast convergence and effectively reduces the occurrence of outliers.In the case of 10 training samples, the maximum achievable detection rate is 99.29%, while the accuracy rate can reach a maximum of 97.93%.These findings demonstrate a noticeable improvement of 0.12% and 0.37% respectively, in comparison to existing algorithms.…”
    Get full text
    Article
  10. 9750

    An optimized elliptic curve digital signature strategy for resource-constrained devices by Nawras H. Sabbry, Alla Levina

    Published 2025-07-01
    “…Abstract Ensuring robust security in resource-constrained environments, such as microcontrollers used in Unmanned Vehicle systems (UVS), poses significant challenges due to the computational and memory demands of cryptographic algorithms. This research addresses these challenges by proposing an optimized ECC digital signature method designed for such environments. …”
    Get full text
    Article
  11. 9751

    From PGC to UGC to AIGC: Change of content paradigm by Gao Ao

    Published 2024-01-01
    “…The study also points out that the development of AIGC technology relies on the support of algorithms, meta-universes and blockchain technology, while also sparking discussions on intellectual property, copyright, ethics and other issues. …”
    Get full text
    Article
  12. 9752
  13. 9753

    Pharmacotherapeutic Options for Ophthalmic Conjunctivitis by A. D. van Eyk

    Published 2019-07-01
    “…Herpes simplex and Herpes zoster are the infective organisms also responsible for conjunctivitis while seasonal pollens are usually the cause for allergic conjunctivitis. …”
    Get full text
    Article
  14. 9754

    Research on the Application of Artificial Intelligence in Quantitative Investment: Implementation Scenarios, Practical Challenges, and Future Trends by Chen Boshan

    Published 2025-01-01
    “…First, the paper reviews the evolutionary trajectory of AI technologies, spanning from early expert systems to contemporary deep reinforcement learning, while analyzing breakthrough developments in specialized financial AI tools and core technical capabilities. …”
    Get full text
    Article
  15. 9755

    Navigating the Dilemma of AI Integration for Organisational Performance: Insights for Contemporary Business Strategists by Jeanette Owusu, Isaac Sardello Kodzo Agbesi

    Published 2025-05-01
    “…In this literature review, the author examines how businesses can effectively implement AI to improve decision-making, productivity, and customer experience while addressing data privacy, algorithmic bias, and ethical implications. …”
    Get full text
    Article
  16. 9756

    Ghost in the Machine: Daily Interaction with Ephemeral Computing by Sofia Pirandello

    Published 2025-07-01
    “…To realise this project of ubiquitous “spatial computing”, technology companies are converging on the development of wearable tools, mostly augmented reality (AR) glasses. While wearing them, users manipulate responsive but intangible objects that they “evoke” and that can appear ghostly from a distance. …”
    Get full text
    Article
  17. 9757

    A Comparative Analysis of Artificial Intelligence Regulatory Law in Asia, Europe, and America by Alfiani Francisca Romana Nanik, Santiago Faisal

    Published 2024-01-01
    “…While the regulatory approaches differ across these regions, they share a common goal: ensuring that AI benefits society while minimizing negative impacts.…”
    Get full text
    Article
  18. 9758

    Audit Program on Artificial Intelligence (AI)-driven Credit Risk Models by Valeria Anna De Palma, Alessandro Di Maria, Daniele Foschini, Vincenzo Frasca, Dario Girardi

    Published 2025-04-01
    “…From an Internal Audit perspective, the integration of Artificial Intelligence (AI) into credit risk modelling through Machine Learning (ML) algorithms presents significant challenges due to the complexity and multidimensional nature of these models. …”
    Get full text
    Article
  19. 9759

    Fast-converging decentralized alternating direction method of multipliers for consensus optimization by Jeannie He, Ming Xiao, Mikael Skoglund

    Published 2025-07-01
    “…Through theoretical analysis, we have shown that our algorithms inherit the well-established convergence properties of the classical centralized ADMM while keeping the computational and communication complexity for each node at $${\mathcal {O}}(1)$$ O ( 1 ) . …”
    Get full text
    Article
  20. 9760

    Increasing load factor in logistics and evaluating shipment performance with machine learning methods: A case from the automotive industry by Raziye Kılıç Sarıgül, Burak Erkayman, Bilal Usanmaz

    Published 2025-04-01
    “…To solve this problem, both supervised and unsupervised learning algorithms were applied. First, unsupervised clustering algorithms were used to group the shipment performance based on similarities. …”
    Get full text
    Article