-
11661
Evaluating Machine Learning and Deep Learning models for predicting Wind Turbine power output from environmental factors.
Published 2025-01-01“…This study's novelty lies in directly comparing a diverse range of ML and DL algorithms while highlighting the potential of advanced computational approaches for renewable energy optimization.…”
Get full text
Article -
11662
Atmospheric Modeling for Wildfire Prediction
Published 2025-04-01“…Forested regions in California and Western Australia are increasingly facing intense wildfires, while other parts of the world face various climate-related challenges. …”
Get full text
Article -
11663
Signal Mining and Analysis of Drug-Induced Myelosuppression: A Real-World Study From FAERS
Published 2025-05-01“…Introduction Drug-induced myelosuppression (DIM) is a serious side effect of several medications, particularly chemotherapy, immunosuppressants, and targeted therapies, which can lead to infections, anemia, and bleeding. While these drugs are effective, their adverse effects can disrupt treatment plans and reduce quality of life. …”
Get full text
Article -
11664
Decoding Subjective Understanding: Using Biometric Signals to Classify Phases of Understanding
Published 2025-01-01“…To investigate these phases, 103 participants remotely worked on 15 riddles while their facial expressions were video recorded. …”
Get full text
Article -
11665
VBI-Accelerated FPGA Implementation of Autonomous Image Dehazing: Leveraging the Vertical Blanking Interval for Haze-Aware Local Image Blending
Published 2025-03-01“…By restoring contrast and fidelity as images are captured, real-time dehazing enhances image quality on the fly. Existing dehazing algorithms often prioritize visual quality and color restoration but rely on computationally intensive methods, making them unsuitable for real-time processing. …”
Get full text
Article -
11666
Interpretability-Oriented Adjustment of K-Means: A Multiple-Objective Particle Swarm Optimization Framework
Published 2025-01-01“…However, traditional clustering methods only provide a set of results without any explanations. While numerous methods in the literature attempt to explain clustering results, the explanation rules provided by these models are fixed and sacrificing clustering quality for the sake of making the rules easier to understand. …”
Get full text
Article -
11667
Leveraging artificial intelligence in disaster management: A comprehensive bibliometric review
Published 2025-04-01“…The analysis reveals that China was the most productive country, while the United States was the most cited. Six research clusters were identified through keyword network mapping: (1) disaster monitoring and prediction using IoT networks, (2) AI-based geospatial technology for risk management, (3) decision support systems for disaster emergency management, (4) social media analysis for emergency response, (5) machine learning algorithms for disaster risk reduction, and (6) big data and deep learning for disaster management. …”
Get full text
Article -
11668
Exploring fatty acid metabolism in Alzheimer’s disease: the key role of CPT1A
Published 2024-12-01“…After identifying differentially expressed genes, multiple machine learning algorithms, carnitine palmitoyltransferase 1 A (CPT1A) was identified as the key gene for fatty acid metabolism in AD. …”
Get full text
Article -
11669
Graph-based machine learning model for weight prediction in protein–protein networks
Published 2024-11-01“…An edge between two proteins indicates a known interaction, while the absence of an edge means the interaction is not known or missed. …”
Get full text
Article -
11670
Intelligent gear decision method for vehicle automatic transmission system based on data mining
Published 2024-12-01“…Subsequently, dynamic programming algorithms are employed to optimize intelligent gear decisions. …”
Get full text
Article -
11671
Single-element ultrasound system for high-resolution jugular venous pulse contour detection
Published 2025-04-01“…The reference standard, central venous line catheterization, while precise, is restricted to critical care units owing to the necessity for surgical procedures and specialized operator skills. …”
Get full text
Article -
11672
State-Space Analysis and Complexity Assessment of Puzzle Games Using Colored Petri Nets
Published 2024-09-01“…By synthesizing model-checking techniques with ML-based algorithmic implementations, we develop an optimized search strategy for traversing the state space graph, enabling the derivation of quantitative complexity metrics. …”
Get full text
Article -
11673
A comprehensive analysis of deep learning and transfer learning techniques for skin cancer classification
Published 2025-02-01“…Experimental performance is measured on the ISIC 2018 dataset which contains 3300 images of skin disease including benign and malignant type cancer images. 80% of the images from the ISIC 2018 dataset are allocated for training, while the remaining 20% are designated for testing. …”
Get full text
Article -
11674
Integrating Mobile Devices and Wearable Technology for Optimal Sleep Conditions
Published 2023-09-01“…This project uses cloud storage technology and cloud software algorithms to enable data sharing and real-time feedback. …”
Get full text
Article -
11675
High-throughput image-based monitoring of cell aggregation and microspheroid formation.
Published 2018-01-01“…Microwell patterned inserts were used for spheroid formation while an automated microscope with 4x bright-field objective captured the morphological changes during this process. …”
Get full text
Article -
11676
An automated approach to identify sarcasm in low-resource language.
Published 2024-01-01“…Sarcasm detection has emerged due to its applicability in natural language processing (NLP) but lacks substantial exploration in low-resource languages like Urdu, Arabic, Pashto, and Roman-Urdu. While fewer studies identifying sarcasm have focused on low-resource languages, most of the work is in English. …”
Get full text
Article -
11677
Real-Time Transformer Detection of Underwater Objects Based on Lightweight Gated Convolutional Network
Published 2025-04-01“…To address the challenges in underwater object detection algorithms, including difficult image feature processing, redundant model architectures, and excessive parameter numbers, this paper proposed a real-time Transformer detection method for underwater objects based on a lightweight gated convolutional network. …”
Get full text
Article -
11678
COMMUNICATION STRATEGIES AND TACTICS IN CRISIS SITUATIONS
Published 2025-06-01“…Their optimal mix depends on crisis dynamics, while maximum effectiveness requires transparent sourcing, coordination with official bodies, and algorithmic content monitoring. …”
Get full text
Article -
11679
Hybrid feature selection framework for enhanced credit card fraud detection using machine learning models.
Published 2025-01-01“…Pearson Correlation eliminates redundancy by removing highly correlated features, while IG and RFI evaluate the relevance of the remaining features. …”
Get full text
Article -
11680
GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA
Published 2025-03-01“… Key lengths in symmetric cryptography are determined with respect to the brute force attacks with current technology. While nowadays at least 128-bit keys are recommended, there are many standards and real-world applications that use shorter keys. …”
Get full text
Article