Showing 9,021 - 9,040 results of 10,865 for search '(may OR main) algorithm', query time: 0.20s Refine Results
  1. 9021

    GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA by Cihangir Tezcan, Gregor Leander

    Published 2025-03-01
    “…In this work we provide optimized implementations of several widely used algorithms on GPUs, leading to interesting insights on the cost of brute force attacks on several real-word applications. …”
    Get full text
    Article
  2. 9022

    Structure of associative heterarchical memory by R. V. Dushkin, V. A. Lelekova, V. Y. Stepankov, S. Fadeeva

    Published 2022-10-01
    “…Natural language recognition algorithms were used in conjunction with various artificial intelligence methods.Results. …”
    Get full text
    Article
  3. 9023

    Simultaneous Classification of Objects with Unknown Rejection (SCOUR) Using Infra-Red Sensor Imagery by Adam Cuellar, Daniel Brignac, Abhijit Mahalanobis, Wasfy Mikhael

    Published 2025-01-01
    “…Specifically, we do not alter the training strategy of the main classifier so that its performance on known classes remains unchanged. …”
    Get full text
    Article
  4. 9024

    Supervised Sentiment Analysis of Indirect Qualitative Student Feedback for Unbiased Opinion Mining by Smitha Bidadi Anjan Prasad, Raja Praveen Kumar Nakka

    Published 2023-12-01
    “…As a result, numerous instruments and strategies for obtaining student input and assessing faculty performance, as well as other facets of education, have been developed. There are two main methods to collect feedback from students, as follows: the direct and indirect methods. …”
    Get full text
    Article
  5. 9025

    Development of Political Statistics: Conceptual Foundations for the Formation of a System of Indexes by L. Yu. Arkhangelskaya, V. N. Salin

    Published 2025-03-01
    “…The conceptual basis for structuring sections of the PS, identifying a specific subject, method and research objectives, defining a system of indexes within each section of the PS and the relationships between these modules are presented in the form of an information and logical diagram of subsystems of indexes with the definition of algorithms for their calculation and data sources for their construction.   …”
    Get full text
    Article
  6. 9026

    COMPARISON OF CONSERVATIVE METHODS OF PREVENTION OF PATHOLOGICAL SCARING OF THE HEAD AND NECK by Ya. P. Nahirniy

    Published 2022-12-01
    “…There are many conservative methods of prevention of the pathological scars formation in the area of head and neck, one of the main links is occupied by ointments with different components. …”
    Get full text
    Article
  7. 9027

    Threat of technological disruption and turnover intention in Egypt: A moderated mediation model by Mohamed Hossameldin Khalifa, Gamal M. Shehata

    Published 2025-06-01
    “…Orientation: Employee perceived threat of technological disruption (PTTD) is an unavoidable consequence of the increasing prevalence of Smart Technology, Artificial Intelligence, Robotics and Algorithms. Research purpose: This study examined the relationship between PTTD and turnover intention (TI), the mediating role of job insecurity (JI) in this relationship and the moderating effect of age on JI’s mediating role in the Egyptian private sector. …”
    Get full text
    Article
  8. 9028

    Network Congestion Tracking and Detection in Banking Industry Using Machine Learning Models by Kingsley Ifeanyi Chibueze, Nwamaka Georgenia Ezeji, Nnenna Harmony Nwobodo-Nzeribe

    Published 2024-09-01
    “…This research evaluates various ML algorithms, including Support Vector Machines, Decision Trees, and Random Forests, to identify the most effective approach for congestion detection. …”
    Get full text
    Article
  9. 9029

    Evaluation of a Polarimetric Contrast Enhancement Technique as Preprocessing Step for Vessel Detection in SAR Images: Comparison of Frequency Bands and Polarimetric Modes by Alejandro Mestre-Quereda, Juan M. Lopez-Sanchez

    Published 2025-03-01
    “…Over the years, numerous automatic ship detection algorithms have been developed, utilizing either single-polarimetric data (i.e., intensity) or leveraging additional information provided by polarimetric sensors. …”
    Get full text
    Article
  10. 9030

    Opportunities of Digitalization of Economic Subjects in Educational Process by L. N. Babkina, O. V. Skotarenko

    Published 2018-11-01
    “…The main objectives of training in other disciplines, and especially management and economic complex is the application, consolidation and increase of knowledge, skills of digital technologies in the preparation of course work, final qualifying work, during research work as students in bachelor’s and master’s degree, and in graduate school. …”
    Get full text
    Article
  11. 9031

    Unveiling the art of video enhancement: a comprehensive examination of content selection and sequencing for optimal quality in conventional and AR/VR environments by Mehrunnisa, Mikolaj Leszczuk, Dawid Juszka

    Published 2025-07-01
    “…Integrating machine learning algorithms into data sets alongside scenario-based criteria can be an essential solution to such problems. …”
    Get full text
    Article
  12. 9032

    Insights into the relationship between usability and willingness to use a robot in the future workplaces: Studying the mediating role of trust and the moderating roles of age and S... by Mohammad Babamiri, Rashid Heidarimoghadam, Fakhradin Ghasemi, Leili Tapak, Alireza Mortezapour

    Published 2022-01-01
    “…After examining the questionnaires' validity and reliability, the main variables were determined to be willingness to use robots and robot usability. …”
    Get full text
    Article
  13. 9033

    Use of satellite data for detecting icebergs and evaluating the iceberg threats by I. A. Bychkova, V. G. Smirnov

    Published 2018-12-01
    “…Te methods of satellite monitoring of dangerous ice formations, namely icebergs in the Arctic seas, representing a threat to the safety of navigation and economic activity on the Arctic shelf are considered. Te main objective of the research is to develop methods for detecting icebergs using satellite radar data and high space resolution images in the visible spectral range. …”
    Get full text
    Article
  14. 9034

    Research Progress on Sequence Recommendation Based on Deep Learning and Large Language Model by XU Fengru, LI Bohan, XU Shuai

    Published 2025-02-01
    “…Firstly, the research problem of sequential recommendation is defined, and the core objectives and challenges of recommendation sequences are clarified. Next, the main techniques in sequential recommendation are summarized in detail, including: traditional methods based on Markov chains, which model user behavior sequences by relying on state transition probabilities; deep learning-driven methods, which utilize neural network models to capture long-term dependencies and complex patterns; hybrid models, which combine multiple algorithms to enhance the accuracy and robustness of recommendation systems; and emerging methods based on large language models, which improve the understanding of user behavior and recommendation content through the integration of pre-trained large language models. …”
    Get full text
    Article
  15. 9035

    Intelligent Recognition and Automated Production of Chili Peppers: A Review Addressing Varietal Diversity and Technological Requirements by Sheng Tai, Zhong Tang, Bin Li, Shiguo Wang, Xiaohu Guo

    Published 2025-05-01
    “…The main current research challenges are listed including the environmental adaptability/robustness, efficiency/real-time performance, multi-cultivar adaptability/flexibility, system integration, and cost-effectiveness. …”
    Get full text
    Article
  16. 9036

    High-speed threat detection in 5G SDN with particle swarm optimizer integrated GRU-driven generative adversarial network by R. Shameli, Sujatha Rajkumar

    Published 2025-03-01
    “…The attack detection in 5G SDN involves Machine learning (ML) and Deep learning (DL) algorithms to analyze large volumes of network data and identify patterns indicative of attacks. …”
    Get full text
    Article
  17. 9037

    On the Prediction and Forecasting of PMs and Air Pollution: An Application of Deep Hybrid AI-Based Models by Youness El Mghouchi, Mihaela Tinca Udristioiu

    Published 2025-07-01
    “…The methodology consists of three main phases: (i) data preprocessing, including anomaly detection and missing value handling; (ii) exploratory analysis to identify trends and correlations between PM concentrations (PMs) and predictor variables; and (iii) model development using 23 machine learning and deep learning algorithms, enhanced by 50 feature selection techniques. …”
    Get full text
    Article
  18. 9038

    Transcriptome Classification Reveals Molecular Subgroups in Idiopathic Pulmonary Fibrosis by Yuxia Liu, Chang Xu, Wenxin Gao, Huaqiong Liu, Chenglong Li, Mingwei Chen

    Published 2022-01-01
    “…Using WGCNA, five subgroup-specific modules were identified. M4 was mainly enriched by MAPK signaling, which was mainly expressed in C2; M1, M2, and M3 were mainly enriched by metabolic pathways and Chemokine signaling, and the pathway of M5 was phagosome inflammation; M1, M2, M3, and M5 were mainly expressed in C1. …”
    Get full text
    Article
  19. 9039

    Experimental Study on Blockage Mechanism and Blockage Locations for Polymer-Flooded Reservoirs in the Henan Oilfield by Yu Li, Meilong Fu, Baofeng Hou, Zhiyuan Zhang, Ruiyi Sun

    Published 2021-01-01
    “…The “four properties” relationship of the formation reservoir in the Nanbaxian oil and gas field was studied in depth according to the conventional logging data and core analysis data. The neural network algorithm was used to reconstruct the resistivity curve of the water layer to eliminate the influence of lithology, shale content, and pore structure on the resistivity. …”
    Get full text
    Article
  20. 9040

    Multi-level high utility-itemset hiding. by Loan T T Nguyen, Hoa Duong, An Mai, Bay Vo

    Published 2025-01-01
    “…Organizations and corporations who publicly share their data always have a major concern that their sensitive information may be leaked or extracted by rivals or attackers using data miners. …”
    Get full text
    Article