Suggested Topics within your search.
Suggested Topics within your search.
-
4061
RON‐based cross‐chain routing optimization strategy in metaverse
Published 2024-12-01“…The experiments show that Cross‐Chain_RON outperforms the direct‐connect routing in terms of latency, rate of successful data transmission, and throughput in poor network environments, but at the expense of a certain amount of system overhead.…”
Get full text
Article -
4062
Identifikasi Emosi Pengguna Konferensi Video Menggunakan Convolutional Neural Network
Published 2022-10-01“…In the experiments, four classes of human emotion are examined, such as neutral, happy, angry, and sad. The system detects facial areas in video frames using the Viola-Jones algorithm and identifies the emotions on the detected faces using the Convolutional Neural Network (CNN) method with the VGG-16 architecture. …”
Get full text
Article -
4063
Addition of punishments
Published 2022-09-01“…The logical sequence of the presentation of regulatory requirements in these articles is flawed.The method and the basic algorithm for determining the final penalty when adding punishments. …”
Get full text
Article -
4064
Using deep learning for thyroid nodule risk stratification from ultrasound images
Published 2025-06-01“…This study proposes a computer-aided diagnosis system (CAD) for thyroid nodule risk classification and management recommendations based on the American College of Radiology (ACR) Thyroid Imaging Reporting and Data System (TIRADS), which uses a deep learning framework to increase diagnostic accuracy and reliability. …”
Get full text
Article -
4065
Performance evaluation of enhanced deep learning classifiers for person identification and gender classification
Published 2025-08-01“…Further, an adaptive coati optimization algorithm is used to adjust the hyperparameters of the classification models. …”
Get full text
Article -
4066
Encryption and Decryption of the Data by Using the Terms of the Lucas Series
Published 2021-05-01“…There are two types of encryption systems in cryptology. The first one is symmetric (secret key) encryption and the another one is asymmetric (public key) encryption. …”
Get full text
Article -
4067
A Technique for Retinal Detachment Detection Manipulating YOLOv8 Models
Published 2025-03-01“…To detect the classes of retinal detachment in various images, this paper introduces a novel method employing deep learning techniques involving the YOLOv8 algorithm. Notably, this marks the first use of the YOLOv8 model for retinal detachment detection. …”
Get full text
Article -
4068
The analysis of fraud detection in financial market under machine learning
Published 2025-08-01“…Abstract With the rapid development of the global financial market, the problem of financial fraud is becoming more and more serious, which brings huge economic losses to the market, consumers and investors and threatens the stability of the financial system. Traditional fraud detection methods based on rules and statistical analysis are difficult to deal with increasingly complex and evolving fraud methods, and there are problems such as poor adaptability and high false alarm rate. …”
Get full text
Article -
4069
Complex network security using community structure and dynamical analysis: spectral clustering and VEIP-WQU model
Published 2025-07-01“…Abstract The advancement of complex networks and systems offers a wide range of services, but security remains a significant challenge across different network types. …”
Get full text
Article -
4070
Detecting Fraudulent Transaction in Banking Sector Using Rule-Based Model and Machine Learning
Published 2025-05-01“…This research aims to develop an effective fraud detection model in banking transactions using the rule-based model (RBM) approach and the isolation forest (IF) machine learning algorithm. Based on data from the Ministry of Communication and Information Technology, there were more than 405,000 online fraud cases during the 2019–2022 period, indicating the need for a reliable fraud detection system to protect customers. …”
Get full text
Article -
4071
Method of continuous generation grinding tooth surface modification based on electronic gearbox superimposed high-order motion
Published 2025-08-01“…Using the normal deviation between the standard involute gear surface and the actual machined gear surface grid points as the evaluation criterion, the Levenberg-Marquardt algorithm was used to optimize the polynomial coefficients of the motion functions of each feed axis of the grinding wheel. …”
Get full text
Article -
4072
Application of Neural Networks to the Classification of Pancreatic Intraductal Proliferative Lesions
Published 2001-01-01“…The training of the network using the back‐propagation algorithm, and the final classification of data was carried out with a neural network simulator SNNS v. 4.1. …”
Get full text
Article -
4073
Nonlinear dynamics of the media addiction model using the fractal-fractional derivative technique
Published 2022-01-01“…Our examined visualizations and simulation studies using MATLAB for the numerical modelling of the aforementioned system showed that the novel developed Atangana-Baleanu FF differential operators produce remarkable results when compared to the classical frame.…”
Get full text
Article -
4074
In Silico identification and modelling of FDA-approved drugs targeting T-type calcium channels.
Published 2025-01-01“…We used the automated docking suite GOLD v5.5 with the genetic algorithm to simulate molecular docking and predict the protein-ligand binding modes, and the ChemPLP empirical scoring function to estimate the binding affinities of 2,115 FDA-approved drugs to the human Cav3.1 channel. …”
Get full text
Article -
4075
-
4076
Optimization of a Heavy-Duty Hydrogen-Fueled Internal Combustion Engine Injector for Optimum Performance and Emission Level
Published 2025-07-01“…Hydrogen is a promising zero-carbon fuel for internal combustion engines; however, the geometric optimization of injectors for low-pressure direct-injection (LPDI) systems under lean-burn conditions remains underexplored. …”
Get full text
Article -
4077
Intelligent anti-jamming communication technology with electromagnetic spectrum feature cognition.
Published 2025-01-01“…This study proposes an intelligent anti-interference algorithm that combines deep neural networks and game theory, and constructs a model based on near-end strategy optimization. …”
Get full text
Article -
4078
Smart Data Placement Strategy in Heterogeneous Hadoop
Published 2025-03-01“…The default data placement strategy adopted by the Hadoop Distributed File System (HDFS), initially designed for a homogeneous cluster where all machines are considered identical, relies on distributing data to nodes based only on their disk space availability. …”
Get full text
Article -
4079
Engineering of educational programs through the application of intelligent technologies
Published 2017-02-01“…One of the key tasks of the present stage of the education system development in Russia is to improve the practical orientation of specialists’ training for the modern labor market. …”
Get full text
Article -
4080
Res-SE-ConvNet: A Deep Neural Network for Hypoxemia Severity Prediction for Hospital In-Patients Using Photoplethysmograph Signal
Published 2022-01-01“…This method has the potential to aid the patients in receiving the benefit of an automatic and faster clinical decision support system, thus handling the severity of hypoxemia.…”
Get full text
Article