Showing 9,081 - 9,100 results of 10,865 for search '(may OR main) algorithm', query time: 0.21s Refine Results
  1. 9081

    Object-Specific Multiview Classification Through View-Compatible Feature Fusion by Javier Perez Soler, Jose-Luis Guardiola, Nicolás García Sastre, Pau Garrigues Carbó, Miguel Sanchis Hernández, Juan-Carlos Perez-Cortes

    Published 2025-07-01
    “…In these scenarios, relying on a single image may not provide sufficient information to effectively identify the scrutinized object, as different perspectives may reveal distinct characteristics that are essential for accurate classification. …”
    Get full text
    Article
  2. 9082

    Factors influencing the response to periodontal therapy in patients with diabetes: post hoc analysis of a randomized clinical trial using machine learning by Nidia CASTRO DOS SANTOS, Arthur MANGUSSI, Tiago RIBEIRO, Rafael Nascimento de Brito SILVA, Mauro Pedrine SANTAMARIA, Magda FERES, Thomas VAN DYKE, Ana Carolina LORENA

    Published 2025-07-01
    “…We tested seven different algorithms: K-Nearest Neighbors, Decision Tree, Support Vector Machine, Random Forest, Extreme Gradient Boosting, and Logistic Regression. …”
    Get full text
    Article
  3. 9083
  4. 9084

    School-Based Online Surveillance of Youth: Systematic Search and Content Analysis of Surveillance Company Websites by Alison O'Daffer, Wendy Liu, Cinnamon S Bloss

    Published 2025-07-01
    “…Findings suggest that students who only have school-provided devices are more heavily surveilled and that historically marginalized students may be at a higher risk of being flagged due to algorithmic bias. …”
    Get full text
    Article
  5. 9085

    Tympanosclerosis Presenting as Mass: Workup and Differential by Jonnae Y. Barry, Saranya Reghunathan, Abraham Jacob

    Published 2016-01-01
    “…Various ear pathologies, with different treatment algorithms, may present as clinically similar to one another. …”
    Get full text
    Article
  6. 9086

    Automatic recognition of adrenal incidentalomas using a two-stage cascade network: a multicenter study by Xiao Xie, Sheng-Xiao Ma, Xiang-De Luo, De-Ying Liao, Dong Han, Zhi-Peng Huang, Zhi-Hua Chen, Xian-Ping Li, Bo Li, Shi-Di Hu, Yan-Jun Chen, Peng-Fei Liu, De-Zhong Zheng, Hui Xia, Cun-Dong Liu, Shan-Chao Zhao, Ming-Kun Chen

    Published 2025-12-01
    “…The segmentation network was mainly evaluated by the Dice similarity coefficient (DSC), and the classifier was evaluated by the area under the receiver operator characteristic curve (AUC), accuracy, sensitivity, and specificity. …”
    Get full text
    Article
  7. 9087

    Higher-Order Accurate and Conservative Hybrid Numerical Scheme for Relativistic Time-Fractional Vlasov-Maxwell System by Tamour Zubair, Muhammad Usman, Ilyas Khan, Nawaf N. Hamadneh, Tiao Lu, Mulugeta Andualem

    Published 2022-01-01
    “…Still, on the other hand, a significant fact or drawback of most algorithms is that they do not preserve conservation philosophies. …”
    Get full text
    Article
  8. 9088

    Real-world evidence market: key players and key segments by A. R. Kasimova, A. S. Kolbin

    Published 2022-01-01
    “…Real-world data (RWD) and real-world evidence (RWE) are a valuable resource in the healthcare system. They may be necessary for administrators (to create and improve algorithms for treating patients with various nosologies), physicians (to make a better clinical decision in favor of the patient) and directly to patients and their relatives (to better understand the treatment process). …”
    Get full text
    Article
  9. 9089

    A Comparison of CALPUFF and LAPMOD Against the Project Sagebrush Datasets by Roberto Bellasio, Roberto Bianconi, Paolo Zannetti

    Published 2025-06-01
    “…However, in four simulations carried out under low wind and very stable conditions, the model performances are poor. This may be due to the inability of CALMET to reproduce the vertical wind direction variations in a shallow layer close to the ground, but also to inappropriate turbulence dispersion algorithms in the dispersion models. …”
    Get full text
    Article
  10. 9090
  11. 9091

    Toward quantum advantage with photonic state injection by Léo Monbroussou, Eliott Z. Mamon, Hugo Thomas, Verena Yacoub, Ulysse Chabaud, Elham Kashefi

    Published 2025-07-01
    “…Finally, we study a computational subroutine of learning algorithms named probability estimation, and we show that the state injection scheme we propose may offer a potential quantum advantage in a regime that can be more easily achieved than state-of-the-art adaptive techniques. …”
    Get full text
    Article
  12. 9092

    Critical questions for Facebook’s virtual reality: data, power and the metaverse by Ben Egliston, Marcus Carter

    Published 2021-12-01
    “…Through this case, we argue that VR as a data-intensive device is not one of unalloyed benefit, but one fraught with power inequity—one that has the potential to exacerbate wealth inequity, institute algorithmic bias, and bring about new forms of digital exclusion. …”
    Get full text
    Article
  13. 9093

    Analysis of Dynamic Transaction Fee Blockchain Using Queueing Theory by Koki Inami, Tuan Phung-Duc

    Published 2025-03-01
    “…Although several consensus algorithms have been proposed to solve these problems, their performance has not been fully evaluated. …”
    Get full text
    Article
  14. 9094

    Efficient knowledge updating method for inconsistent decision tables by Changchun Li

    Published 2024-12-01
    “…However, inconsistent decision tables (IDTs) may update with new coming objects due to the information collection and update. …”
    Get full text
    Article
  15. 9095

    New insights into methods to measure biological age: a literature review by Aanchal Mathur, Sebastien Taurin, Sfoug Alshammary

    Published 2024-12-01
    “…We discussed some novel biomarkers and algorithms that can capture the dynamic and multidimensional aspects of aging at different levels. …”
    Get full text
    Article
  16. 9096

    Business process mining based insider threat detection system by Tai-ming ZHU, Yuan-bo GUO, An-kang JU, Jun MA

    Published 2016-10-01
    “…Current intrusion detection systems are mostly for detecting external attacks,but sometimes the internal staff may bring greater harm to organizations in information security.Traditional insider threat detection methods of-ten do not combine the behavior of people with business activities,making the threat detection rate to be improved.An insider threat detection system based on business process mining from two aspects was proposed,the implementation of insider threats and the impact of threats on system services.Firstly,the normal control flow model of business ac-tivities and the normal behavior profile of each operator were established by mining the training log.Then,the actual behavior of the operators was compared with the pre-established normal behavior contours during the operation of the system,which was supplemented by control flow anomaly detection and performance anomaly detection of business processes,in order to discover insider threats.A variety of anomalies were defined and the corresponding detection algorithms were given.Experiments were performed on the ProM platform.The results show the designed system is effective.…”
    Get full text
    Article
  17. 9097

    Summoning the digital investor: Fintech apps and the shaping of everyday financial subjectivities by Gordon Kuo Siong Tan

    “…However, users themselves may resist the financial subjectivities promoted by fintech investing, driven by skepticism towards gamified and other algorithmic app features. …”
    Get full text
    Article
  18. 9098

    Optimal Decisions for Prepositioning Emergency Supplies Problem with Type-2 Fuzzy Variables by Xuejie Bai

    Published 2016-01-01
    “…Since the inherent complexity of fuzzy prepositioning problem may be troublesome, the existing methods are no longer effective in dealing with the proposed model directly. …”
    Get full text
    Article
  19. 9099

    The influence of eye model parameter variations on simulated eye-tracking outcomes by Joshua Fischer, David van den Heever, Johan van der Merwe

    Published 2023-10-01
    “… The simulated data used in eye-tracking-related research has been largely generated using normative eye models with little consideration of how the variations in eye biometry found in the population may influence eye-tracking outcomes. This study investigated the influence that variations in eye model parameters have on the ability of simulated data to predict real-world eye-tracking outcomes. …”
    Get full text
    Article
  20. 9100

    An Uncertain Programming Model for Fixed Charge Transportation Problem with After-Sale Service by Kai Zhu, Yue Fan, Jiayu Shen, Yuyi Li, Mingfeng Yin

    Published 2022-01-01
    “…Meanwhile, some indeterministic factors may occur during the transportation process; probability theory is not the best option due to the lack of adequate historical data. …”
    Get full text
    Article