Showing 11,621 - 11,640 results of 14,091 for search '"algorithm"', query time: 0.11s Refine Results
  1. 11621
  2. 11622

    Discovering Large-scale Structure at 2 < z < 5 in the C3VO Survey by Denise Hung, Brian C. Lemaux, Olga Cucciati, Ben Forrest, Ekta A. Shah, Roy R. Gal, Finn Giddings, Derek Sikorski, Emmet Golden-Marx, Lori M. Lubin, Nimish Hathi, Giovanni Zamorani, Lu Shen, Sandro Bardelli, Letizia P. Cassarà, Gabriella De Lucia, Fabio Fontanot, Bianca Garilli, Lucia Guaita, Michaela Monika Hirschmann, Kyoung-Soo Lee, Andrew B. Newman, Vandana Ramakrishnan, Daniela Vergani, Lizhi Xie, Elena Zucca

    Published 2025-01-01
    “…We also apply the same technique to mock observations of simulated galaxies with properties derived from the GAlaxy Evolution and Assembly semianalytic model in order to judge the effectiveness of our search algorithm as a function of redshift, total mass, and fraction of spectroscopic redshifts. …”
    Get full text
    Article
  3. 11623
  4. 11624

    Presenting the fintech market development model with an emphasis on existing challenges and strategies by Seyed Mani Sadraee, Farideh Haghshenaskashani, Mehdi Karimizand

    Published 2024-06-01
    “…Fintech companies can advertise their products or services with an optimized website or a standard page according to the Instagram algorithm. The cost of such advertisements is much lower and the efficiency of advertisements is high. …”
    Get full text
    Article
  5. 11625

    Development and validation of an explainable machine learning model for mortality prediction among patients with infected pancreatic necrosisResearch in context by Caihong Ning, Hui Ouyang, Jie Xiao, Di Wu, Zefang Sun, Baiqi Liu, Dingcheng Shen, Xiaoyue Hong, Chiayan Lin, Jiarong Li, Lu Chen, Shuai Zhu, Xinying Li, Fada Xia, Gengwen Huang

    Published 2025-02-01
    “…Multiple organ failure, Acute Physiology and Chronic Health Examination II (APACHE II) score ≥20, duration of organ failure ≥21 days, bloodstream infection, time from onset to first intervention <30 days, Bedside Index of Severity in Acute Pancreatitis score ≥3, critical acute pancreatitis, age ≥ 50 years, and hemorrhage were 9 most important features associated with mortality. Furthermore, SHAP algorithm revealed insightful nonlinear interactive associations between important predictors and mortality, identifying 9 features pairs with high interaction SHAP value and clinical significance. …”
    Get full text
    Article
  6. 11626

    Efficient Solutions of Multidimensional Sixth-Order Boundary Value Problems Using Symmetric Generalized Jacobi-Galerkin Method by E. H. Doha, W. M. Abd-Elhameed

    Published 2012-01-01
    “…The proposed algorithms are extended to solve the two-dimensional sixth-order differential equations. …”
    Get full text
    Article
  7. 11627

    Reframing the filter bubble through diverse scale effects in online music consumption by Dougal Shakespeare, Victor Chareyron, Camille Roth

    Published 2025-02-01
    “…Abstract The impact of platforms’ algorithmic curation devices on users’ consumption diversity has long since been the subject of debate in popular culture and academia alike. …”
    Get full text
    Article
  8. 11628

    DRAV: Detection and repair of data availability violations in Internet of Things by Jinlin Wang, Haining Yu, Xing Wang, Hongli Zhang, Binxing Fang, Yuchen Yang, Xiaozhou Zhu

    Published 2019-11-01
    “…In this work, the detection and repair of data availability violations (DRAV) framework is proposed to detect and repair data violations in Internet of Things with a distributed parallel computing environment. DRAV uses algorithms in the MapReduce programming framework, and these include detection and repair algorithms based on enhanced conditional function dependency for data consistency violation, MapJoin, and ReduceJoin algorithms based on master data for k -nearest neighbor–based integrity violation detection, and repair algorithms. …”
    Get full text
    Article
  9. 11629

    Online Coregularization for Multiview Semisupervised Learning by Boliang Sun, Guohui Li, Li Jia, Kuihua Huang

    Published 2013-01-01
    “…Experiments show that our derived online coregularization algorithms achieve risk and accuracy comparable to offline algorithms while consuming less time and memory. …”
    Get full text
    Article
  10. 11630

    Online Parameter Estimation in Digital Twins for Real-Time Condition Monitoring by Agus Hasan

    Published 2025-01-01
    “…This paper introduces innovative online parameter estimation algorithms that employ both deterministic and stochastic methodologies in digital twins for real-time condition monitoring. …”
    Get full text
    Article
  11. 11631

    Summary of Large-Scale Grapb Partitioning Algoritbms by Jinfeng Xu, Yihong Dong, Shiyi Wang, Xianmang He, Huahui Chen

    Published 2014-07-01
    “…Firstly the large-scale static graph partitioning algorithms and the dynamic graph partitioning algorithms were discussed. …”
    Get full text
    Article
  12. 11632

    Comparative evaluation of SNVs, indels, and structural variations detected with short- and long-read sequencing data by Shunichi Kosugi, Chikashi Terao

    Published 2024-04-01
    “…The recall of SV detection with short-read-based algorithms was significantly lower in repetitive regions, especially for small- to intermediate-sized SVs, than that detected with long-read-based algorithms. …”
    Get full text
    Article
  13. 11633

    Joint User Detection and Channel Estimation in Grant-Free Random Access for Massive MIMO Systems by Yang Yang, Guanghua Song, Hui Liu

    Published 2023-01-01
    “…As a result, these algorithms generate highly precise estimations of user channels. …”
    Get full text
    Article
  14. 11634

    A Survey of Efficient Lightweight Cryptography for Power-Constrained Microcontrollers by Jesús Soto-Cruz, Erica Ruiz-Ibarra, Javier Vázquez-Castillo, Adolfo Espinoza-Ruiz, Alejandro Castillo-Atoche, Joaquin Mass-Sanchez

    Published 2024-12-01
    “…Therefore, lightweight and efficient security algorithms are essential. This review paper assesses the implementation of lightweight cryptographic algorithms for power-constrained microcontrollers in IoT systems using symmetric cryptography. …”
    Get full text
    Article
  15. 11635

    Pedestrian navigation: how can inertial measurment units assist smartphones? by I. A. Chistyakov, I. V. Grishov, A. A. Nikulin, M. V. Pikhletsky, I. B. Gartseev

    Published 2021-04-01
    “…This paper is devoted to construction of reference walking trajectories for developing pedestrian navigation algorithms for smartphones. Such trajectories can be used both for verification of classical algorithms of navigation or for application of machine learning technics. …”
    Get full text
    Article
  16. 11636

    Autonomous Planning of Multigravity-Assist Trajectories with Deep Space Maneuvers Using a Differential Evolution Approach by Ossama Abdelkhalik

    Published 2013-01-01
    “…The biologically inspired concept of hidden genes has been recently introduced in genetic algorithms to solve optimization problems where the number of design variables is variable. …”
    Get full text
    Article
  17. 11637

    Heterogeneous Breast Phantom Development for Microwave Imaging Using Regression Models by Camerin Hahn, Sima Noghanian

    Published 2012-01-01
    “…As new algorithms for microwave imaging emerge, it is important to have standard accurate benchmarking tests. …”
    Get full text
    Article
  18. 11638

    Copy-Move Forgery Verification in Images Using Local Feature Extractors and Optimized Classifiers by S. B. G. Tilak Babu, Ch Srinivasa Rao

    Published 2023-09-01
    “…CoMoFoD, CASIA, and MICC datasets and a combination of CoMoFoD and CASIA datasets images are used to quantify the performance of the proposed algorithms. The proposed algorithms are more efficient than state-of-the-art algorithms even though the suspected image is post-processed.…”
    Get full text
    Article
  19. 11639

    Discrete resource allocation problems and military applications by Vytautas Tiešis

    Published 2002-12-01
    “…The non-linear models of multiple target prioritisation are presented in the case of multiple different weapons. The fast greedy algorithms are presented and investigated. In the case of homogeneous resources (weapons) the algorithms give optimal solutions. …”
    Get full text
    Article
  20. 11640

    An survey on application of artificial intelligence in 5G system by Jianwu ZHANG, Luxin WANG, Lingfen SUN, Qianye ZHANG, Hangguan SHAN

    Published 2021-05-01
    “…With the continuous development of 5G, the era of the internet of everything is coming.Problems such as massive device connections, massive application requests, ultra-high network load and complex dynamic network environment pose great challenges to the optimization of 5G systems in the context of the internet of everything.Facing these challenges, artificial intelligence (AI) shows its unique advantages.Firstly, the advantages of deep learning driven AI algorithms in 5G system compared with conventional algorithms were briefly introduced.Then, the application of AI algorithms in multi-access edge computing (MEC) and mmWave massive multiple-input multiple-output (MIMO) system were described in detail, with advantages and disadvantages of each method being compared and analyzed.Finally, according to the existing research, the shortcomings of AI algorithms in 5G application scenarios were summarized and the future research directions were forecasted.…”
    Get full text
    Article