-
17421
Transverse cracking in glass fibre-reinforced composites monitored with synchrotron X-ray multi-projection imaging
Published 2025-02-01“…An extensive data set was gathered to make a 3D reconstruction of the crack evolution over time using XMPI and machine learning-based reconstruction algorithms. …”
Get full text
Article -
17422
Flexible-Robotic Reflector for Aerospace Applications
Published 2015-01-01“…We have implemented a set of searching algorithms allowing the hyper redundant robotic subreflector to adapt its surface to the morphologic distortions in the main reflector. …”
Get full text
Article -
17423
Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model
Published 2024-01-01“…Artificial intelligence algorithms and big data analysis methods are commonly employed in network intrusion detection systems. …”
Get full text
Article -
17424
Study of Magnetohydrodynamic Pulsatile Blood Flow through an Inclined Porous Cylindrical Tube with Generalized Time-Nonlocal Shear Stress
Published 2021-01-01“…For the semianalytical solution, the inverse Laplace transform is found by means of Stehfest’s and Tzou’s algorithms. The numerical calculations were performed by using Mathcad software. …”
Get full text
Article -
17425
Hunting the Pertinency of Bloom Filter in Computer Networking and Beyond: A Survey
Published 2019-01-01“…Bloom filter poses (i) high adaptability, (ii) low memory space overhead as compared to hashing algorithms, (iii) high scalability, and (iv) high performance. …”
Get full text
Article -
17426
A Low Noise, Low Power Phase-Locked Loop, Using Optimization Methods
Published 2016-01-01“…A novel bulk driven Wilson charge pump circuit, whose performance is enhanced by some optimization algorithms, is also introduced to get high output swing and high current matching. …”
Get full text
Article -
17427
Cryptomite: A versatile and user-friendly library of randomness extractors
Published 2025-01-01“…Contrary to alternatives using the fast Fourier transform, we implement convolutions efficiently using the number-theoretic transform to avoid rounding errors, making them well suited to cryptography. The algorithms and parameter calculation are described in detail, including illustrative code examples and performance benchmarking.…”
Get full text
Article -
17428
Modeling Meteorological Effects on Cosmic Ray Muons Utilizing Multivariate Analysis
Published 2021-08-01“…Several multivariate algorithms implemented in Toolkit for Multivariate Data Analysis with ROOT framework are trained and then applied to correct muon count rate for barometric and temperature effects. …”
Get full text
Article -
17429
Energy-Efficiency Maximization in Backscatter Communication-Based Non-Orthogonal Multiple Access System: Dinkelbach and Successive Convex Approximation Approaches
Published 2024-01-01“…The goal is to maximize energy efficiency (EE) through the optimization of the beamforming matrix and the reflection coefficient of the BackCom devices. Two algorithms, Dinkelbach based on penalty semidefinite relaxation (SDR) and successive convex approximation (SCA), are proposed as high-performance and low-complexity solutions, respectively. …”
Get full text
Article -
17430
Control over biopower in cognitive and surveillance capitalism
Published 2023-01-01“…Digital networks do not only collect data on users, but they "cluster" these users with the help of algorithms and encourage specific desired behaviors. …”
Get full text
Article -
17431
Advancements, Trends and Future Prospects of Lower Limb Prosthesis
Published 2021-01-01“…This review presents for lower limb prosthesis; the study of lower limb amputation, design & development, control strategies & machine learning algorithms, the psycho-social impact of prosthetic users, and design trends in patents. …”
Get full text
Article -
17432
Cardiovascular health in breast cancer patients: insight on BRCA1/2 mutations impact
Published 2025-01-01Get full text
Article -
17433
Analysis and Recommendation of Outdoor Activities for Smart City Users Based on Real-Time Contextual Data
Published 2024-01-01“…This data are processed and interpreted using machine learning algorithms, which find correlations, trends, and patterns that affect outdoor activities. …”
Get full text
Article -
17434
Preparing healthcare leaders of the digital age with an integrative artificial intelligence curriculum: a pilot study
Published 2024-12-01“…This study examined the effectiveness of a pilot Digital Health Scholars (DHS) non-credit enrichment elective that paralleled the Dartmouth Geisel School of Medicine’s first-year preclinical curriculum with a focus on introducing AI algorithms and their applications in the concurrently occurring systems-blocks. …”
Get full text
Article -
17435
Dynamic traffic balancing scheme for LB-BvN to guarantee in-order packet delivering
Published 2011-01-01“…Due to its outstanding extensibility performance,the LB-BvN switch had attracted much attention recently in the switching technology academia.However,the problem that it might disturb the sequences of packets made it not so applicable in practice.To overcome this,the principles for guaranteeing packets in order switching were first discussed.Then,based on these principles,it focused on research on the transmission characteristics in network traffic and came up with DFA and DFS algorithms.DFA assigned the switching paths to each flow based on their transport layer parameters to make sure that each packet in the flow were in order.DFS was more sophisticated than DFA in that it first divided flows into flowlets.In this way,the flowlets in the flows were in order.Both DFA and DFS could achieve in order packets switching with limited flow states maintained in the line-cards.Simulation results show that both DFA and DFS can achieve good performance.…”
Get full text
Article -
17436
Enhancing stock index prediction: A hybrid LSTM-PSO model for improved forecasting accuracy.
Published 2025-01-01“…Comparative analysis with seven other machine learning algorithms confirms the superior performance of PSO-LSTM. …”
Get full text
Article -
17437
Radiology in gastroenterology (According to data of the 16th Russian gastroenterological week, Moscow, October 11–13, 2010)
Published 2011-02-01“…Features of application of ultrasound investigation, roentgenologic procedures, magnetic-resonance tomography as stand alone methods and at complex investigation are underlined. Algorithms of diagnostics of various diseases, noninvasive medical procedures are proposed. …”
Get full text
Article -
17438
Status Data and Communication Aspects in Dynamically Clustered Network-on-Chip Monitoring
Published 2012-01-01“…The analysis shows that the monitoring system should be carefully designed in terms of data diffusion and routing and monitoring algorithms to obtain the potential performance improvement.…”
Get full text
Article -
17439
Dependable identity recognition and authorization based on visual information
Published 2020-11-01“…Recently,deep learning has been widely applied to video and image based identity recognition and authorization tasks,including face recognition and person identification.However,machine learning models,especially deep learning models,can be easily fooled by adversarial attacks,which may cause the identity recognition systems to make a wrong decision.Therefore,dependable identity recognition and authorization has become one of the hot topics currently.Recent advances on dependable identity recognition and authorization from both information space and physical space were presented,where the development of the attack models on face detection,face recognition,person re-identification,and face anti-spoofing as well as printable adversarial patches were introduced.The algorithms of visual identity anonymization and privacy protection were further discussed.Finally,the datasets,experimental protocols and performance of dependable identity recognition methods were summarized,and the possible directions in the future research were presented.…”
Get full text
Article -
17440
Se former aux humanités numériques par les données ouvertes : les chaînes infométriques de Patent2Net (P2N)
Published 2022-06-01“…New memories, new types of writing, the growing importance of algorithms: these evolutions constantly modify how we design editorial modes, process corpora, make maps, or access conceptual and semantic networks, as well as reading and writing practices, and hermeneutic capabilities. …”
Get full text
Article