Suggested Topics within your search.
Suggested Topics within your search.
-
3801
A Real-Time Semi-Supervised Log Anomaly Detection Framework for ALICE O<sup>2</sup> Facilities
Published 2025-05-01“…Within ALICE, the application logs of the online computing systems are consolidated through a logging system known as Infologger, which integrates data from various sources. …”
Get full text
Article -
3802
Minimization of Resource Consumption with URLLC Constraints for Relay-Assisted IIoT
Published 2025-08-01“…Compared with three baseline algorithms, the proposed algorithm achieves average resource savings of 21.40%, 14.03%, and 17.18%, respectively.…”
Get full text
Article -
3803
Differences between the European and Eurasian Good Pharmacovigilance Practices
Published 2021-07-01“…Moreover, supplements and annexes to the EU GVP contain figures, templates, examples, algorithms, and tables, which are missing in the EAEU GVP. …”
Get full text
Article -
3804
KEDM: Knowledge-Embedded Diffusion Model for Infrared Image Destriping
Published 2025-01-01“…Infrared imaging systems are widely used across industries. However, their output images often exhibit striped noise due to the nonuniform response of the detection system, which significantly affects image quality and visual fidelity. …”
Get full text
Article -
3805
Enhanced Laplace integral transform based image encryption technique and its analysis
Published 2025-08-01“…The proposed system uniquely combines chaos theory, Laplace transforms, and series expansions to create a highly secure and advanced framework for image encryption. …”
Get full text
Article -
3806
Adaptive resource allocation and routing for integrated sensing and communications for wireless technologies
Published 2025-05-01“…Optimizing resource utilization, mitigating interference, and enhancing dependability in ISC systems are achieved using ARAR-IS, which leverages cognitive routing algorithms and software program-defined networking ideas. …”
Get full text
Article -
3807
Biosynthesis, applications, and mathematical modeling dynamics of lactic acid bacteria exopolysaccharides: A review
Published 2025-09-01“…White-box models, utilize comprehensive system knowledge, forecast performance, and optimize processes such as EPS biosynthesis while employing algorithms like fuzzy patterns, rule-based systems, and decision trees to increase productivity and identify bottlenecks. …”
Get full text
Article -
3808
GCV-SLAM: Ground Constrained Visual SLAM Through Local Ground Planes
Published 2025-01-01“…The KITTI odometry dataset was selected to validate the performance of our system, and the results demonstrated that our system could improve the accuracy and efficiency of ground vehicle localization in road environments.…”
Get full text
Article -
3809
Anomaly detection with grid sentinel framework for electric vehicle charging stations in a smart grid environment
Published 2025-05-01“…The testing findings reveal that the systems are automatically updated to neutralize threats quickly, utilizing dynamic methods to minimize downtime. …”
Get full text
Article -
3810
Phase-Locked Feed-Forward Stabilization for Dual-Comb Spectroscopy
Published 2025-01-01“…The phase-locked multiheterodyne system also enables phase spectrum measurements with a scatter down to 7 mrad. …”
Get full text
Article -
3811
Cybersecurity of smart grids: Comparison of machine learning approaches training for anomaly detection
Published 2024-12-01“…We consider several machine learning methods for identifying anomalies in power systems that simulate network behavior under conditions of cyberattacks and emergency modes. …”
Get full text
Article -
3812
Computational fluid dynamics and machine learning integration for evaluating solar thermal collector efficiency -Based parameter analysis
Published 2025-07-01“…The methodology addresses the fundamental challenge of balancing computational efficiency with prediction accuracy in thermal system design. A validated CFD model generated 935 numerical cases across diverse operational and design parameters, which were used to train and evaluate three machine learning algorithms: linear regression (LR), support vector regression (SVR), and artificial neural networks (ANN). …”
Get full text
Article -
3813
The impact of the formal rationalization of healthcare on physician clinical teaching in a United States academic medical center
Published 2025-07-01“…Results Four major categories of impact on physicians who teaching in the clinical setting were identified: (1) they hold the view that rationalizing processes will diminish positive features of practicing medicine for learners (2) the compensation plan emphasizes clinical productivity and efficiency at the expense of time to teach (3) the appropriate use of patient cares algorithms embedded in the electronic health care system is an emerging learning need that they are struggling to meet (4) this group of academic physicians is adapting in a number of ways to accommodate to these changes. …”
Get full text
Article -
3814
Design for Testability of Integrated Circuits and Project Protection Difficulties
Published 2019-08-01“…It was proposed, inter alia: 1) to analyze the libraries of standard elements used in the project with full disclosure of their specifications; 2) to create nodes with the physical non-cloning function in the projects on the basis of the libraries of standard elements in models and analysis programs; 3) to analyze IP modules used in the project with the maximum disclosure of structure, methods and algorithms for providing test coverings; 4) to provide for the development in projects of special test kits and methods of their generation at the design stage of functions in order to detect malicious nodes and programs both within SoC cores and at the level of system buses; 5) to develop at the design stage and to apply during tests a technique of special hardware measurements of parameters of the manufactured circuits and analysis of their results, inter alia, according to measurements of delays in distribution of signals and/or buses current consumption.…”
Get full text
Article -
3815
EMG-Controlled Soft Robotic Bicep Enhancement
Published 2025-05-01“…This type of continual loading on their arms throughout the workday can lead to muscle or tendon injuries. A non-intrusive system designed to assist a worker’s arms would help alleviate strain on their muscles, thereby preventing injury and minimizing productivity losses. …”
Get full text
Article -
3816
Automatic license-plate recognition
Published 2020-03-01“…The work objective was to develop an intelligent recognition system based on the application of deep learning algorithms, such as convolution neural networks that consider automotive standards for license plates in various countries and continents, and are tolerant to camera locations and quality of input images, as well as to changing lighting, weather conditions, and license plate deformations.Materials and Methods. …”
Get full text
Article -
3817
On the role of diagnosis of prostate diseases at the outpatient appointment of a therapist
Published 2022-01-01“…At the same time, according to experts, even exposure only to them will prevent at least 40% of cases of the development of malignant ovariances. A 3-tier system of medical care has been organized in Russia. …”
Get full text
Article -
3818
Innovative Digital Cognitive Behavioral Treatment for Insomnia Disorder in Adults (dCBT-i): Framework Development
Published 2025-05-01“…Future steps involve conducting clinical studies to further evaluate its effectiveness and optimize its implementation within health care systems.…”
Get full text
Article -
3819
Predicting the Acceptance of Informal Learning Technologies: A Case of the TikTok Application
Published 2025-03-01“…Moreover, previous literature focused on the use of structural equation modeling (SEM) to predict technology acceptance, whereas the application of data mining algorithms is rare in this direction of research. This study, therefore, aims to (1) propose an integrated framework based on the DeLone and McLean information system model, the diffusion theory, the interactivity theory, the intrinsic motivation theory, and the security perceptions, (2) predict the adoption of TikTok as a learning means in an informal educational space, and (3) compare the performance of data mining techniques and SEM in predicting users’ behavioral intention towards TikTok acceptance. …”
Get full text
Article -
3820
Hybrid CNN-LSTM With Attention Mechanism for Robust Credit Card Fraud Detection
Published 2025-01-01“…Traditional fraud detection methods, including rule-based systems and basic statistical analyses, struggle to keep pace with the evolving strategies employed by fraudsters. …”
Get full text
Article