Showing 3,801 - 3,820 results of 5,619 for search '(systemic OR systematic) algorithms', query time: 0.14s Refine Results
  1. 3801

    A Real-Time Semi-Supervised Log Anomaly Detection Framework for ALICE O<sup>2</sup> Facilities by Arnatchai Techaviseschai, Sansiri Tarnpradab, Vasco Chibante Barroso, Phond Phunchongharn

    Published 2025-05-01
    “…Within ALICE, the application logs of the online computing systems are consolidated through a logging system known as Infologger, which integrates data from various sources. …”
    Get full text
    Article
  2. 3802

    Minimization of Resource Consumption with URLLC Constraints for Relay-Assisted IIoT by Yujie Zhao, Tao Peng, Yichen Guo, Yijing Niu, Wenbo Wang

    Published 2025-08-01
    “…Compared with three baseline algorithms, the proposed algorithm achieves average resource savings of 21.40%, 14.03%, and 17.18%, respectively.…”
    Get full text
    Article
  3. 3803

    Differences between the European and Eurasian Good Pharmacovigilance Practices by A. V. Matveev, A. E. Krasheninnikov, E. A. Matveeva, B. K. Romanov

    Published 2021-07-01
    “…Moreover, supplements and annexes to the EU GVP contain figures, templates, examples, algorithms, and tables, which are missing in the EAEU GVP. …”
    Get full text
    Article
  4. 3804

    KEDM: Knowledge-Embedded Diffusion Model for Infrared Image Destriping by Lingxiao Li, Xin Wang, Dan Huang, Yunan He, Zhuqiang Zhong, Qingling Xia

    Published 2025-01-01
    “…Infrared imaging systems are widely used across industries. However, their output images often exhibit striped noise due to the nonuniform response of the detection system, which significantly affects image quality and visual fidelity. …”
    Get full text
    Article
  5. 3805

    Enhanced Laplace integral transform based image encryption technique and its analysis by Shamsa Kanwal, Saba Inam, Amr Yousef, Zaffar Ahmed Shaikh, Fariha Nawaz

    Published 2025-08-01
    “…The proposed system uniquely combines chaos theory, Laplace transforms, and series expansions to create a highly secure and advanced framework for image encryption. …”
    Get full text
    Article
  6. 3806

    Adaptive resource allocation and routing for integrated sensing and communications for wireless technologies by Manochandar Subramaniyan, Thiruppathy Kesavan Venkatasamy, Nithya Thotakuruchi Mathiyalagan, Md. Jakir Hossen

    Published 2025-05-01
    “…Optimizing resource utilization, mitigating interference, and enhancing dependability in ISC systems are achieved using ARAR-IS, which leverages cognitive routing algorithms and software program-defined networking ideas. …”
    Get full text
    Article
  7. 3807

    Biosynthesis, applications, and mathematical modeling dynamics of lactic acid bacteria exopolysaccharides: A review by Ankit Barot, Kalyan Das, Yogesh Patel, et al.

    Published 2025-09-01
    “…White-box models, utilize comprehensive system knowledge, forecast performance, and optimize processes such as EPS biosynthesis while employing algorithms like fuzzy patterns, rule-based systems, and decision trees to increase productivity and identify bottlenecks. …”
    Get full text
    Article
  8. 3808

    GCV-SLAM: Ground Constrained Visual SLAM Through Local Ground Planes by Yu Fan, Peng Zhang, Zhi Wang, Chengbao Liu, Guang Zhang

    Published 2025-01-01
    “…The KITTI odometry dataset was selected to validate the performance of our system, and the results demonstrated that our system could improve the accuracy and efficiency of ground vehicle localization in road environments.…”
    Get full text
    Article
  9. 3809

    Anomaly detection with grid sentinel framework for electric vehicle charging stations in a smart grid environment by V. Thiruppathy Kesavan, Md. Jakir Hossen, R. Gopi, Emerson Raja Joseph

    Published 2025-05-01
    “…The testing findings reveal that the systems are automatically updated to neutralize threats quickly, utilizing dynamic methods to minimize downtime. …”
    Get full text
    Article
  10. 3810

    Phase-Locked Feed-Forward Stabilization for Dual-Comb Spectroscopy by Mithun Pal, Alexander Eber, Lukas Fürst, Emily Hruska, Marcus Ossiander, Birgitta Bernhardt

    Published 2025-01-01
    “…The phase-locked multiheterodyne system also enables phase spectrum measurements with a scatter down to 7 mrad. …”
    Get full text
    Article
  11. 3811

    Cybersecurity of smart grids: Comparison of machine learning approaches training for anomaly detection by S. V. Kochergin, S. V. Artemova, A. A. Bakaev, E. S. Mityakov, Zh. G. Vegera, E. A. Maksimova

    Published 2024-12-01
    “…We consider several machine learning methods for identifying anomalies in power systems that simulate network behavior under conditions of cyberattacks and emergency modes. …”
    Get full text
    Article
  12. 3812

    Computational fluid dynamics and machine learning integration for evaluating solar thermal collector efficiency -Based parameter analysis by Xiaoyu Hu, Lanting Guo, Jiyuan Wang, Yang Liu

    Published 2025-07-01
    “…The methodology addresses the fundamental challenge of balancing computational efficiency with prediction accuracy in thermal system design. A validated CFD model generated 935 numerical cases across diverse operational and design parameters, which were used to train and evaluate three machine learning algorithms: linear regression (LR), support vector regression (SVR), and artificial neural networks (ANN). …”
    Get full text
    Article
  13. 3813

    The impact of the formal rationalization of healthcare on physician clinical teaching in a United States academic medical center by David A. Rogers, Katherine A. Meese, Cindy L. Cain

    Published 2025-07-01
    “…Results Four major categories of impact on physicians who teaching in the clinical setting were identified: (1) they hold the view that rationalizing processes will diminish positive features of practicing medicine for learners (2) the compensation plan emphasizes clinical productivity and efficiency at the expense of time to teach (3) the appropriate use of patient cares algorithms embedded in the electronic health care system is an emerging learning need that they are struggling to meet (4) this group of academic physicians is adapting in a number of ways to accommodate to these changes. …”
    Get full text
    Article
  14. 3814

    Design for Testability of Integrated Circuits and Project Protection Difficulties by E. Ph. Pevtsov, T. A. Demenkova, A. A. Shnyakin

    Published 2019-08-01
    “…It was proposed, inter alia: 1) to analyze the libraries of standard elements used in the project with full disclosure of their specifications; 2) to create nodes with the physical non-cloning function in the projects on the basis of the libraries of standard elements in models and analysis programs; 3) to analyze IP modules used in the project with the maximum disclosure of structure, methods and algorithms for providing test coverings; 4) to provide for the development in projects of special test kits and methods of their generation at the design stage of functions in order to detect malicious nodes and programs both within SoC cores and at the level of system buses; 5) to develop at the design stage and to apply during tests a technique of special hardware measurements of parameters of the manufactured circuits and analysis of their results, inter alia, according to measurements of delays in distribution of signals and/or buses current consumption.…”
    Get full text
    Article
  15. 3815

    EMG-Controlled Soft Robotic Bicep Enhancement by Jiayue Zhang, Daniel Vanderbilt, Ethan Fitz, Janet Dong

    Published 2025-05-01
    “…This type of continual loading on their arms throughout the workday can lead to muscle or tendon injuries. A non-intrusive system designed to assist a worker’s arms would help alleviate strain on their muscles, thereby preventing injury and minimizing productivity losses. …”
    Get full text
    Article
  16. 3816

    Automatic license-plate recognition by A. V. Poltavskii, T. G. Yurushkina, M. V. Yurushkin

    Published 2020-03-01
    “…The work objective was to develop an intelligent recognition system based on the application of deep learning algorithms, such as convolution neural networks that consider automotive standards for license plates in various countries and continents, and are tolerant to camera locations and quality of input images, as well as to changing lighting, weather conditions, and license plate deformations.Materials and Methods. …”
    Get full text
    Article
  17. 3817

    On the role of diagnosis of prostate diseases at the outpatient appointment of a therapist by A. L. Kebina, A. S. Sycheva, A. L. Vertkin, G. Yu. Knorring

    Published 2022-01-01
    “…At the same time, according to experts, even exposure only to them will prevent at least 40% of cases of the development of malignant ovariances. A 3-tier system of medical care has been organized in Russia. …”
    Get full text
    Article
  18. 3818

    Innovative Digital Cognitive Behavioral Treatment for Insomnia Disorder in Adults (dCBT-i): Framework Development by Emilie Stern, Severine Brune, Stéphane Mouchabac, Anthony Dubroc, Charles de la Personne, Pierre Alexis Geoffroy

    Published 2025-05-01
    “…Future steps involve conducting clinical studies to further evaluate its effectiveness and optimize its implementation within health care systems.…”
    Get full text
    Article
  19. 3819

    Predicting the Acceptance of Informal Learning Technologies: A Case of the TikTok Application by Ahmed Al-Azawei, Ali Alowayr

    Published 2025-03-01
    “…Moreover, previous literature focused on the use of structural equation modeling (SEM) to predict technology acceptance, whereas the application of data mining algorithms is rare in this direction of research. This study, therefore, aims to (1) propose an integrated framework based on the DeLone and McLean information system model, the diffusion theory, the interactivity theory, the intrinsic motivation theory, and the security perceptions, (2) predict the adoption of TikTok as a learning means in an informal educational space, and (3) compare the performance of data mining techniques and SEM in predicting users’ behavioral intention towards TikTok acceptance. …”
    Get full text
    Article
  20. 3820

    Hybrid CNN-LSTM With Attention Mechanism for Robust Credit Card Fraud Detection by Iman Akour, Nour Mohamed, Said Salloum

    Published 2025-01-01
    “…Traditional fraud detection methods, including rule-based systems and basic statistical analyses, struggle to keep pace with the evolving strategies employed by fraudsters. …”
    Get full text
    Article