Showing 17,421 - 17,440 results of 19,511 for search '"algorithm"', query time: 0.08s Refine Results
  1. 17421

    Transverse cracking in glass fibre-reinforced composites monitored with synchrotron X-ray multi-projection imaging by Elise Van Vlierberghe, Jeroen Soete, Eleni Myrto Asimakopoulou, Zisheng Yao, Julia Rogalinski, Zhe Hu, Kannara Mom, Bratislav Lukić, Christian Breite, Pablo Villanueava Perez, Yentl Swolfs

    Published 2025-02-01
    “…An extensive data set was gathered to make a 3D reconstruction of the crack evolution over time using XMPI and machine learning-based reconstruction algorithms.  …”
    Get full text
    Article
  2. 17422

    Flexible-Robotic Reflector for Aerospace Applications by Nir Shvalb, Boaz Ben-Moshe, Oded Medina, Raz Itzhaki Tamir

    Published 2015-01-01
    “…We have implemented a set of searching algorithms allowing the hyper redundant robotic subreflector to adapt its surface to the morphologic distortions in the main reflector. …”
    Get full text
    Article
  3. 17423

    Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model by Ying-Ti Tsai, Chung-Ho Wang, Yung-Chia Chang, Lee-Ing Tong

    Published 2024-01-01
    “…Artificial intelligence algorithms and big data analysis methods are commonly employed in network intrusion detection systems. …”
    Get full text
    Article
  4. 17424

    Study of Magnetohydrodynamic Pulsatile Blood Flow through an Inclined Porous Cylindrical Tube with Generalized Time-Nonlocal Shear Stress by Nehad Ali Shah, A. Al-Zubaidi, S. Saleem

    Published 2021-01-01
    “…For the semianalytical solution, the inverse Laplace transform is found by means of Stehfest’s and Tzou’s algorithms. The numerical calculations were performed by using Mathcad software. …”
    Get full text
    Article
  5. 17425

    Hunting the Pertinency of Bloom Filter in Computer Networking and Beyond: A Survey by Ripon Patgiri, Sabuzima Nayak, Samir Kumar Borgohain

    Published 2019-01-01
    “…Bloom filter poses (i) high adaptability, (ii) low memory space overhead as compared to hashing algorithms, (iii) high scalability, and (iv) high performance. …”
    Get full text
    Article
  6. 17426

    A Low Noise, Low Power Phase-Locked Loop, Using Optimization Methods by Noushin Ghaderi, Hamid Reza Erfani-jazi, Mehdi Mohseni-Mirabadi

    Published 2016-01-01
    “…A novel bulk driven Wilson charge pump circuit, whose performance is enhanced by some optimization algorithms, is also introduced to get high output swing and high current matching. …”
    Get full text
    Article
  7. 17427

    Cryptomite: A versatile and user-friendly library of randomness extractors by Cameron Foreman, Richie Yeung, Alec Edgington, Florian J. Curchod

    Published 2025-01-01
    “…Contrary to alternatives using the fast Fourier transform, we implement convolutions efficiently using the number-theoretic transform to avoid rounding errors, making them well suited to cryptography. The algorithms and parameter calculation are described in detail, including illustrative code examples and performance benchmarking.…”
    Get full text
    Article
  8. 17428

    Modeling Meteorological Effects on Cosmic Ray Muons Utilizing Multivariate Analysis by M. Savić, D. Maletić, A. Dragić, N. Veselinović, D. Joković, R. Banjanac, V. Udovičić, D. Knežević

    Published 2021-08-01
    “…Several multivariate algorithms implemented in Toolkit for Multivariate Data Analysis with ROOT framework are trained and then applied to correct muon count rate for barometric and temperature effects. …”
    Get full text
    Article
  9. 17429

    Energy-Efficiency Maximization in Backscatter Communication-Based Non-Orthogonal Multiple Access System: Dinkelbach and Successive Convex Approximation Approaches by Dingjia Lin, Tianqi Wang, Kaidi Wang, Zhiguo Ding

    Published 2024-01-01
    “…The goal is to maximize energy efficiency (EE) through the optimization of the beamforming matrix and the reflection coefficient of the BackCom devices. Two algorithms, Dinkelbach based on penalty semidefinite relaxation (SDR) and successive convex approximation (SCA), are proposed as high-performance and low-complexity solutions, respectively. …”
    Get full text
    Article
  10. 17430

    Control over biopower in cognitive and surveillance capitalism by Stanković-Pejnović Vesna

    Published 2023-01-01
    “…Digital networks do not only collect data on users, but they "cluster" these users with the help of algorithms and encourage specific desired behaviors. …”
    Get full text
    Article
  11. 17431

    Advancements, Trends and Future Prospects of Lower Limb Prosthesis by Muhammad Asif, Mohsin Islam Tiwana, Umar Shahbaz Khan, Waqar Shahid Qureshi, Javaid Iqbal, Nasir Rashid, Noman Naseer

    Published 2021-01-01
    “…This review presents for lower limb prosthesis; the study of lower limb amputation, design & development, control strategies & machine learning algorithms, the psycho-social impact of prosthetic users, and design trends in patents. …”
    Get full text
    Article
  12. 17432
  13. 17433

    Analysis and Recommendation of Outdoor Activities for Smart City Users Based on Real-Time Contextual Data by S. R. Mani Sekhar, D. M. Mushtaq Ahmed, G. M. Siddesh

    Published 2024-01-01
    “…This data are processed and interpreted using machine learning algorithms, which find correlations, trends, and patterns that affect outdoor activities. …”
    Get full text
    Article
  14. 17434

    Preparing healthcare leaders of the digital age with an integrative artificial intelligence curriculum: a pilot study by Soo Hwan Park, Roshini Pinto-Powell, Thomas Thesen, Alexander Lindqwister, Joshua Levy, Rachael Chacko, Devina Gonzalez, Connor Bridges, Adam Schwendt, Travis Byrum, Justin Fong, Shahin Shahsavari, Saeed Hassanpour

    Published 2024-12-01
    “…This study examined the effectiveness of a pilot Digital Health Scholars (DHS) non-credit enrichment elective that paralleled the Dartmouth Geisel School of Medicine’s first-year preclinical curriculum with a focus on introducing AI algorithms and their applications in the concurrently occurring systems-blocks. …”
    Get full text
    Article
  15. 17435

    Dynamic traffic balancing scheme for LB-BvN to guarantee in-order packet delivering by HU Hong-chao, GUO Yun-fei, PANG lin, BU You-jun

    Published 2011-01-01
    “…Due to its outstanding extensibility performance,the LB-BvN switch had attracted much attention recently in the switching technology academia.However,the problem that it might disturb the sequences of packets made it not so applicable in practice.To overcome this,the principles for guaranteeing packets in order switching were first discussed.Then,based on these principles,it focused on research on the transmission characteristics in network traffic and came up with DFA and DFS algorithms.DFA assigned the switching paths to each flow based on their transport layer parameters to make sure that each packet in the flow were in order.DFS was more sophisticated than DFA in that it first divided flows into flowlets.In this way,the flowlets in the flows were in order.Both DFA and DFS could achieve in order packets switching with limited flow states maintained in the line-cards.Simulation results show that both DFA and DFS can achieve good performance.…”
    Get full text
    Article
  16. 17436

    Enhancing stock index prediction: A hybrid LSTM-PSO model for improved forecasting accuracy. by Xiaohua Zeng, Changzhou Liang, Qian Yang, Fei Wang, Jieping Cai

    Published 2025-01-01
    “…Comparative analysis with seven other machine learning algorithms confirms the superior performance of PSO-LSTM. …”
    Get full text
    Article
  17. 17437

    Radiology in gastroenterology (According to data of the 16th Russian gastroenterological week, Moscow, October 11–13, 2010) by Z. A. Lemeshko

    Published 2011-02-01
    “…Features of application of ultrasound investigation, roentgenologic procedures, magnetic-resonance tomography as stand alone methods and at complex investigation are underlined. Algorithms of diagnostics of various diseases, noninvasive medical procedures are proposed. …”
    Get full text
    Article
  18. 17438

    Status Data and Communication Aspects in Dynamically Clustered Network-on-Chip Monitoring by Ville Rantala, Pasi Liljeberg, Juha Plosila

    Published 2012-01-01
    “…The analysis shows that the monitoring system should be carefully designed in terms of data diffusion and routing and monitoring algorithms to obtain the potential performance improvement.…”
    Get full text
    Article
  19. 17439

    Dependable identity recognition and authorization based on visual information by Chunlei PENG, Xinbo GAO, Nannan WANG, Jie LI

    Published 2020-11-01
    “…Recently,deep learning has been widely applied to video and image based identity recognition and authorization tasks,including face recognition and person identification.However,machine learning models,especially deep learning models,can be easily fooled by adversarial attacks,which may cause the identity recognition systems to make a wrong decision.Therefore,dependable identity recognition and authorization has become one of the hot topics currently.Recent advances on dependable identity recognition and authorization from both information space and physical space were presented,where the development of the attack models on face detection,face recognition,person re-identification,and face anti-spoofing as well as printable adversarial patches were introduced.The algorithms of visual identity anonymization and privacy protection were further discussed.Finally,the datasets,experimental protocols and performance of dependable identity recognition methods were summarized,and the possible directions in the future research were presented.…”
    Get full text
    Article
  20. 17440

    Se former aux humanités numériques par les données ouvertes : les chaînes infométriques de Patent2Net (P2N) by David Reymond, Jean-Max Noyer

    Published 2022-06-01
    “…New memories, new types of writing, the growing importance of algorithms: these evolutions constantly modify how we design editorial modes, process corpora, make maps, or access conceptual and semantic networks, as well as reading and writing practices, and hermeneutic capabilities. …”
    Get full text
    Article