Showing 15,201 - 15,220 results of 19,511 for search '"algorithm"', query time: 0.11s Refine Results
  1. 15201

    Ensemble Deep Learning Object Detection Fusion for Cell Tracking, Mitosis, and Lineage by Imad Eddine Toubal, Noor Al-Shakarji, D. D. W. Cornelison, Kannappan Palaniappan

    Published 2024-01-01
    “…EDNet detections are used in our M2Track multiobject tracking algorithm for tracking cells, detecting cell mitosis (cell division) events, and cell lineage graphs. …”
    Get full text
    Article
  2. 15202

    Assessment of crack growth development in main pipeline on the basis of elastoplastic model by К. А. Vansovich, I. P. Aistov, А. А. Nakhlestkin, D. S. Beseliya

    Published 2019-11-01
    “…ANSYS developed an algorithm for modeling crack growth taking into account residual stresses. …”
    Get full text
    Article
  3. 15203

    Knowledge-driven semantic converting method of multimodal models toward a geospatial perspective by Jianbo Lai, Jun Zhu, Pei Dang, Jianlin Wu, Yukun Guo, Xinyu Yang, Na Li

    Published 2025-01-01
    “…Subsequently, a structural matching template based on knowledge reuse was established, and a knowledge-guided algorithm for multimodal model transformation was designed. …”
    Get full text
    Article
  4. 15204

    The technology acceptance model and adopter type analysis in the context of artificial intelligence by Fabio Ibrahim, Johann-Christoph Münscher, Monika Daseking, Nils-Torge Telle

    Published 2025-01-01
    “…Regression analysis was used to validate TAM, and a k-prototype clustering algorithm was applied to classify participants into adopter categories.ResultsThe psychometric analysis confirmed the validity of the extended TAM. …”
    Get full text
    Article
  5. 15205

    Comparison between Hyperspectral Imaging and Chemical Analysis of Polyphenol Oxidase Activity on Fresh-Cut Apple Slices by Luna Shrestha, Boris Kulig, Roberto Moscetti, Riccardo Massantini, Elke Pawelzik, Oliver Hensel, Barbara Sturm

    Published 2020-01-01
    “…Golden Delicious and Elstar) were used to build a robust detection algorithm, which is independent of cultivars and applied treatments. …”
    Get full text
    Article
  6. 15206

    Discovering the Graph-Based Flow Patterns of Car Tourists Using License Plate Data: A Case Study in Shenzhen, China by He Bing, Kong Bo, Yin Ling, Wu Qin, Hu Jinxing, Huang Dian, Ma Zhanwu

    Published 2020-01-01
    “…Finally, a frequent subgraph mining algorithm is used to extract the flow patterns of car tourists. …”
    Get full text
    Article
  7. 15207

    AlgaeClass_Net: Optimizing Few-Shot Marine Microalgae Classification With Multi-Scale Feature Enhancement Network by Dan Liu, Guihong Yuan, Huachao Tan, Yanbo Jiang, Hai Bi, Yuan Cheng

    Published 2025-01-01
    “…Existing few-shot learning classification algorithms that utilize meta-learning for metrics can be a good solution to this problem. …”
    Get full text
    Article
  8. 15208

    Multi-Disaster Hazard Analysis, The Case of Elazığ Province by Fethi Ahmet Canpolat

    Published 2024-07-01
    “…Various methods, such as the Analytic Hierarchy Process (AHP) and machine learning models, including the Random Forest algorithm, were employed to assess the severity and probability of exposure for each hazard type. …”
    Get full text
    Article
  9. 15209

    Access control relationship prediction method based on GNN dual source learning by Dibin SHAN, Xuehui DU, Wenjuan WANG, Aodi LIU, Na WANG

    Published 2022-10-01
    “…With the rapid development and wide application of big data technology, users’ unauthorized access to resources becomes one of the main problems that restrict the secure sharing and controlled access to big data resources.The ReBAC (Relationship-Based Access Control) model uses the relationship between entities to formulate access control rules, which enhances the logical expression of policies and realizes dynamic access control.However, It still faces the problems of missing entity relationship data and complex relationship paths of rules.To overcome these problems, a link prediction model LPMDLG based on GNN dual-source learning was proposed to transform the big data entity-relationship prediction problem into a link prediction problem with directed multiple graphs.A topology learning method based on directed enclosing subgraphs was designed in this modeled.And a directed dual-radius node labeling algorithm was proposed to learn the topological structure features of nodes and subgraphs from entity relationship graphs through three segments, including directed enclosing subgraph extraction, subgraph node labeling calculation and topological structure feature learning.A node embedding feature learning method based on directed neighbor subgraph was proposed, which incorporated elements such as attention coefficients and relationship types, and learned its node embedding features through the sessions of directed neighbor subgraph extraction and node embedding feature learning.A two-source fusion scoring network was designed to jointly calculate the edge scores by topology and node embedding to obtain the link prediction results of entity-relationship graphs.The experiment results of link prediction show that the proposed model obtains better prediction results under the evaluation metrics of AUC-PR, MRR and Hits@N compared with the baseline models such as R-GCN, SEAL, GraIL and TACT.The ablation experiment results illustrate that the model’s dual-source learning scheme outperforms the link prediction effect of a single scheme.The rule matching experiment results verify that the model achieves automatic authorization of some entities and compression of the relational path of rules.The model effectively improves the effect of link prediction and it can meet the demand of big data access control relationship prediction.…”
    Get full text
    Article
  10. 15210

    Multistage identification method for real-time abnormal events of streaming data by Hao Luo, Kexin Sun, Junlu Wang, Chengfeng Liu, Linlin Ding, Baoyan Song

    Published 2019-12-01
    “…The identification method proposed in this article first takes advantages of the dynamic time warping algorithm, which is widely applied in the field of audio recognition, to build an anti-aliasing model and identifies whether the perceived data are disaster signal based on the similarity fitting between them and the template waveform of historical disaster data, and second, since the real-time monitoring data are continuous streaming data, it is necessary to identify the start point of the disaster waveform before the identification of the disaster signal. …”
    Get full text
    Article
  11. 15211

    Heat shock protein-related diagnostic signature and molecular subtypes in ankylosing spondylitis: new pathogenesis insights by Geqiang Wang, Yongji Li, Jiaxing Liu, Qian Zhang, Weixin Cai, Xiaodong Li

    Published 2024-12-01
    “…To assess the immunological landscape, we employed the xCell algorithm. Through logistic regression analysis, the four core HRGs (CCT2, HSPA6, DNAJB14, and DNAJC5) were confirmed as potential biomarkers for AS. …”
    Get full text
    Article
  12. 15212

    Bilingual hate speech detection on social media: Amharic and Afaan Oromo by Teshome Mulugeta Ababu, Michael Melese Woldeyohannis, Emuye Bawoke Getaneh

    Published 2025-02-01
    “…According to the experiment, BiLSTM with FastText feature extraction is an outperforming the other algorithm by achieving a 78.05% accuracy for Bilingual Amharic Afaan Oromo hate speech detection. …”
    Get full text
    Article
  13. 15213

    Research on Feature Extracted Method for Flutter Test Based on EMD and CNN by Hua Zheng, Zhenglong Wu, Shiqiang Duan, Jiangtao Zhou

    Published 2021-01-01
    “…The measured signals from a wind tunnel test were manually labeled “flutter” and “no-flutter” as the foundational dataset for the deep learning algorithm. After the normalized preprocessing, the intrinsic mode functions (IMFs) of the flutter test signals are obtained by the EMD method. …”
    Get full text
    Article
  14. 15214

    Telecommand Rejection Probability in CCSDS-Compliant LDPC-Coded Space Transmissions With Tail Sequence by Rebecca Giuliani, Massimo Battaglioni, Marco Baldi, Franco Chiaraluce, Nicola Maturo

    Published 2025-01-01
    “…., length of the CLTU, decoding algorithm, maximum number of decoding iterations). …”
    Get full text
    Article
  15. 15215

    A Novel Authentication Management for the Data Security of Smart Grid by Imtiaz Parvez, Maryamossadat Aghili, Hugo Riggs, Aditya Sundararajan, Arif I. Sarwat, Anurag K. Srivastava

    Published 2024-01-01
    “…To implement this node-to-node authentication, One class support vector machine algorithm is proposed which takes advantages of the location information as well as the data transmission history (node identification, packet size, and data transmission frequency). …”
    Get full text
    Article
  16. 15216

    Enhancing Security With Hybrid Active- Passive RIS: A DRL Approach Against Eavesdropping and Jamming by Abdul Wahid, Syed Zain Ul Abideen, Nouman Imtiaz, Mian Muhammad Kamal, Abdullah Alharbi, Amr Tolba, M. A. Al-Khasawneh, Inam Ullah

    Published 2025-01-01
    “…To tackle this, we employ a Deep Reinforcement Learning (DRL) approach using the Deep Deterministic Policy Gradient (DDPG) algorithm, enabling efficient and dynamic optimization. …”
    Get full text
    Article
  17. 15217

    Interpretable machine learning model of effective mass in perovskite oxides with cross-scale features by Changjiao Li, Zhengtao Huang, Hua Hao, Zhonghui Shen, Guanghui Zhao, Ben Xu, Hanxing Liu

    Published 2025-01-01
    “…However, previous works were mainly devoted to algorithm improvement, while the essential multi-scale characteristics are not well addressed. …”
    Get full text
    Article
  18. 15218

    A Morphology Filter-Assisted Extreme-Point Symmetric Mode Decomposition (MF-ESMD) Denoising Method for Bridge Dynamic Deflection Based on Ground-Based Microwave Interferometry by Xianglei Liu, Mengzhuo Jiang, Ziqi Liu, Hui Wang

    Published 2020-01-01
    “…Second, the noise-dominant IMFs were removed according to Spearman’s rho algorithm, and the other decomposed IMFs were reconstructed as a new signal. …”
    Get full text
    Article
  19. 15219

    Modeling of CO2 solubility and partial pressure in blended diisopropanolamine and 2-amino-2-methylpropanol solutions via response surface methodology and artificial neural network by Zohreh Khoshraftar

    Published 2025-01-01
    “…The accuracy of the predictions was notably high, with coefficients of determination of 0.99581 for CO2 solubility and 0.99839 for CO2 partial pressure, achieved using the Levenberg-Marquardt algorithm. Upon further analysis, it was concluded that the MLP model exhibited the lowest error rates, with mean square errors of 0.00009085 for CO2 solubility and 0.00316632 for CO2 partial pressure. …”
    Get full text
    Article
  20. 15220

    Research on CSI feedback and precoding in FDD cell-free massive MIMO systems by ZHANG Dekun, BAI Baoming

    Published 2024-12-01
    “…During the downlink scheduling phase, real-time multi-user interference elimination precoding within clusters was designed on the basis of the signal-to-leakage-and-noise ratio (SLNR) algorithm. The two were cascaded to form the optimized downlink precoding weight values for each user. …”
    Get full text
    Article