Showing 8,921 - 8,940 results of 10,865 for search '(may OR main) algorithm', query time: 0.18s Refine Results
  1. 8921

    Characterization of defective coffee beans and blends differentiation based on 1H qNMR technique by Gui-Lin Hu, Chen-Xi Quan, Hao-Peng Dai, Ming-Hua Qiu

    Published 2024-01-01
    “…Defective coffee beans (DCB) are one of the main reasons for poor coffee quality. In the current research, chemical difference of three common DCB including sour beans (SCB), black beans (BCB), and mold beans (MCB) were clarified using 1H qNMR method and compared with that of non-defective beans (NDCB). …”
    Get full text
    Article
  2. 8922

    Fault Tolerance and Fallback Strategies in Connected and Automated Vehicles: A Review by Mario Rodriguez-Arozamena, Jose Matute, Javier Araluce, Joshue Perez Rastelli, Asier Zubizarreta

    Published 2025-01-01
    “…However, their reliance on sophisticated sensors and complex algorithms poses challenges, especially in scenarios with uncertainties, constraints, or failures. …”
    Get full text
    Article
  3. 8923

    Beyond personas. Machine Learning to personalise the project by Niccolò Casiddu, Francesco Burlando, Isabella Nevoso, Claudia Porfirione, Annapaola Vacanti

    Published 2022-12-01
    “… The paper deals with some problems linked to Human-Centred Design (HCD) methods, namely Personas, that may mislead the designers to create distorted and stereotypical representations of users. …”
    Get full text
    Article
  4. 8924

    Differential diagnosis of pericarditis. Part I: Anatomical and physiological characteristics of the pericardium, chest pain syndrome, and pericardial effusion by V. Yu. Myachikova, O. M. Moiseeva

    Published 2025-03-01
    “…Anatomical and physiological characteristics of the pericardium, mechanisms of effusion development and tamponade are described. Diagnostic algorithms for chest pain syndrome typical for pericarditis and asymptomatic effusion are provided. …”
    Get full text
    Article
  5. 8925

    Stochastic Parameter Identification Method for Driving Trajectory Simulation Processes Based on Mobile Edge Computing and Self-Organizing Feature Mapping by Jingfeng Yang, Zhiyong Luo, Nanfeng Zhang, Jinchao Xiao, Honggang Wang, Shengpei Zhou, Xiaosong Liu, Ming Li

    Published 2021-01-01
    “…With the rapid development of sensor technology for automated driving applications, the fusion, analysis, and application of multimodal data have become the main focus of different scenarios, especially in the development of mobile edge computing technology that provides more efficient algorithms for realizing the various application scenarios. …”
    Get full text
    Article
  6. 8926

    X-ray modalities in the era of artificial intelligence: overview of self-supervised learning approach by Ivan Martinović, Shitong Mao, Mehdy Dousty, Wuqi Li, Milena Đukanović, Errol Colak, Ervin Sejdić

    Published 2025-01-01
    “…Self-supervised learning enables the creation of algorithms that outperform supervised pre-training methods in numerous computer vision tasks. …”
    Get full text
    Article
  7. 8927

    Commentaries on the updated American College of Rheumatology guidelines for the management of gout. Urate-lowering drugs (Part 1) by M. S. Eliseev

    Published 2020-09-01
    “…The emergence of updated American College of Rheumatology (ACR) guidelines for the management of gout may serve as a prerequisite for revising the draft Russian Federal Clinical Guidelines (FCGs). …”
    Get full text
    Article
  8. 8928

    Calibration and Validation of NOAA-21 Ozone Mapping and Profiler Suite (OMPS) Nadir Mapper Sensor Data Record Data by Banghua Yan, Trevor Beck, Junye Chen, Steven Buckner, Xin Jin, Ding Liang, Sirish Uprety, Jingfeng Huang, Lawrence E. Flynn, Likun Wang, Quanhua Liu, Warren D. Porter

    Published 2024-11-01
    “…The NOAA-21 OMPS SDR calibration derives updates of several previous OMPS algorithms, including the dark current correction algorithm, one-time wavelength registration from ground to on-orbit, daily intra-orbit wavelength shift correction, and stray light correction. …”
    Get full text
    Article
  9. 8929

    Towards Prosthesis Control: Identification of Locomotion Activities through EEG-Based Measurements by Saqib Zafar, Hafiz Farhan Maqbool, Muhammad Imran Ashraf, Danial Javaid Malik, Zain ul Abdeen, Wahab Ali, Juri Taborri, Stefano Rossi

    Published 2024-09-01
    “…The integration of advanced control systems in prostheses necessitates the accurate identification of human locomotion activities, a task that can significantly benefit from EEG-based measurements combined with machine learning techniques. The main contribution of this study is the development of a novel framework for the recognition and classification of locomotion activities using electroencephalography (EEG) data by comparing the performance of different machine learning algorithms. …”
    Get full text
    Article
  10. 8930

    A hash-neighborhood-search-network-coding based opportunistic relay retransmission approach by Pengfei SHAO, Yanwei ZHAO, Zhaoxi FANG

    Published 2016-04-01
    “…In wireless multicast networks,it is rarely concerned that there may be certain receiving nodes which have better quality links both to the source node and to the other receiving nodes. …”
    Get full text
    Article
  11. 8931

    Dependable identity recognition and authorization based on visual information by Chunlei PENG, Xinbo GAO, Nannan WANG, Jie LI

    Published 2020-11-01
    “…Recently,deep learning has been widely applied to video and image based identity recognition and authorization tasks,including face recognition and person identification.However,machine learning models,especially deep learning models,can be easily fooled by adversarial attacks,which may cause the identity recognition systems to make a wrong decision.Therefore,dependable identity recognition and authorization has become one of the hot topics currently.Recent advances on dependable identity recognition and authorization from both information space and physical space were presented,where the development of the attack models on face detection,face recognition,person re-identification,and face anti-spoofing as well as printable adversarial patches were introduced.The algorithms of visual identity anonymization and privacy protection were further discussed.Finally,the datasets,experimental protocols and performance of dependable identity recognition methods were summarized,and the possible directions in the future research were presented.…”
    Get full text
    Article
  12. 8932

    Conceptualizing an AI-based Police Robot for Preventing Online Child Sexual Exploitation and Abuse: by Nina Sunde, Inger Marie Sunde

    Published 2021-01-01
    “…Given the advancements in machine learning algorithms, PrevBOT may provide predictions concerning age and gender behind online aliases engaged in sexualized speech with children and assist the police in identifying former CSEA offenders who resume the criminal activity online. …”
    Get full text
    Article
  13. 8933

    Applying Extensions of Evidence Theory to Detect Frauds in Financial Infrastructures by Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano

    Published 2015-10-01
    “…The Dempster-Shafer (DS) theory of evidence has significant weaknesses when dealing with conflicting information sources, as demonstrated by preeminent mathematicians. This problem may invalidate its effectiveness when it is used to implement decision-making tools that monitor a great number of parameters and metrics. …”
    Get full text
    Article
  14. 8934

    Energy Consumption Optimization for an Electric Delivery Vehicle by Andrzej Łebkowski

    Published 2024-11-01
    “…This work presents the structure of the optimizer system and the developed control algorithms. Additionally, electric motor excitation control was used, which may have contributed to reducing the power and weight of the electric drive motor. …”
    Get full text
    Article
  15. 8935

    Solving the RNA design problem with reinforcement learning. by Peter Eastman, Jade Shi, Bharath Ramsundar, Vijay S Pande

    Published 2018-06-01
    “…This suggests the possibility that future improvements to the training protocol may yield further gains in performance.…”
    Get full text
    Article
  16. 8936

    Receding Horizon Unbiased FIR Filters and Their Application to Sea Target Tracking by Boris Skorohod

    Published 2018-01-01
    “…Finite impulse response (FIR) state estimation algorithms have been much discussed in literature lately. …”
    Get full text
    Article
  17. 8937

    Les machines y voient-elles quelque chose ? by Denis Bonnay

    Published 2021-12-01
    “…We argue that these properties may be used as further constraints on representational devices in general, helping to solve some of the classical issues faced by teleosemantic theories of representation such as that expounded by Dretske.…”
    Get full text
    Article
  18. 8938

    Real-Time Multichannel Imaging Framework for Endoscopy, Catheters, and Fixed Geometry Intraoperative Systems by Rahul A. Sheth, Rabi Upadhyay, Ralph Weissleder, Umar Mahmood

    Published 2007-05-01
    “…The capabilities include acquisition and visualization algorithms that perform registration, segmentation, and histogram-based autoexposure of two imaging channels (full-spectrum white light and near-infrared fluorescence), all in real time. …”
    Get full text
    Article
  19. 8939

    Preventing market collapse in auctions for perishable Internet of Things resources by Maria B Safianowska, Robert Gdowski, ChingYao Huang

    Published 2017-11-01
    “…We describe two bidding strategies which may lead to market collapse or very low revenue: opportunistic and periodic bidding. …”
    Get full text
    Article
  20. 8940

    Design of a microservices-based architecture for residential energy efficiency monitoring by Ivonne Nuñez, Carlos Rovetto, Edmanuel Cruz, Andrzej Smolarz, Dimas Concepcion, Elia Esther Cano

    Published 2024-11-01
    “…To address these challenges, this study proposes a distributed architecture based on microservices, with the main objective of improving the performance and stability of these systems. …”
    Get full text
    Article