Showing 581 - 600 results of 19,511 for search '"algorithms"', query time: 0.10s Refine Results
  1. 581

    Investigations of MWISP Filaments. I. Filament Identification and Analysis Algorithms, and Source Catalog by Yu Jiang, Xuepeng Chen, Sheng Zheng, Zhibo Jiang, Zhiwei Chen, Yao Huang, Yang Su, Li Sun, Jian-Cheng Feng, Haoran Feng, Ji Yang

    Published 2025-01-01
    “…To facilitate the identification and analysis of filaments, we introduce Directional and Positional Consistency between Clumps and Filaments (DPConCFil), a suite of algorithms comprising one identification method and two analysis methods. …”
    Get full text
    Article
  2. 582

    Auto forensic detecting algorithms of malicious code fragment based on TensorFlow by Binglong LI, Jinlong TONG, Yu ZHANG, Yifeng SUN, Qingxian WANG, Chaowen CHANG

    Published 2021-08-01
    “…In order to auto detect the underlying malicious code fragments in complex,heterogeneous and massive evidence data about digital forensic investigation, a framework for malicious code fragment detecting algorithm based on TensorFlow was proposed by analyzing TensorFlow model and its characteristics.Back-propagation training algorithm was designed through the training progress of deep learning.The underlying binary feature pre-processing algorithm of malicious code fragment was discussed and proposed to address the problem about different devices and heterogeneous evidence sources from storage media and such as AFF forensic containers.An algorithm which used to generate data set about code fragments was designed and implemented.The experimental results show that the comprehensive evaluation index F<sub>1</sub>of the method can reach 0.922, and compared with CloudStrike, Comodo, FireEye antivirus engines, the algorithm has obvious advantage in dealing with the underlying code fragment data from heterogeneous storage media.…”
    Get full text
    Article
  3. 583

    Optimization of Analytical Reconstruction Algorithms for Arbitrary CBCT Trajectory Using Deep Learning by Yuzhong Zhou, Linda-Sophie Schneider, Yipeng Sun, Andreas K. Maier

    Published 2025-02-01
    “…The second approach improves upon the Backprojection then Filtering (BPF) algorithm by first reconstructing and then applying a deep learning-trained filter. …”
    Get full text
    Article
  4. 584
  5. 585
  6. 586
  7. 587
  8. 588
  9. 589
  10. 590

    Majoritarianism and Monoculture (M&M) by Mansoor “Manny” Ahmed, Dann R. Toliver, Hazem Danny Nakib

    Published 2025-01-01
    Subjects: “…consensus algorithms…”
    Get full text
    Article
  11. 591
  12. 592
  13. 593
  14. 594
  15. 595
  16. 596
  17. 597
  18. 598
  19. 599
  20. 600