Search alternatives:
fact » face (Expand Search)
Showing 161 - 180 results of 271 for search 'fact computational algorithms', query time: 0.12s Refine Results
  1. 161

    Development of a Conceptual Scheme for Controlling Tool Wear During Cutting, Based on the Interaction of Virtual Models of a Digital Twin and a Vibration Monitoring System by Lapshin Viktor, Turkin Ilya, Gvindzhiliya Valeriya, Dudinov Ilya, Gamaleev Denis

    Published 2024-11-01
    “…This article discusses the issue of the joint use of neural network algorithms for data processing and deterministic mathematical models. …”
    Get full text
    Article
  2. 162

    Adaptive Anomaly Detection Framework Model Objects in Cyberspace by Hasan Alkahtani, Theyazn H. H. Aldhyani, Mohammed Al-Yaari

    Published 2020-01-01
    “…Taking into consideration the fact that e-banking, e-commerce, and business data will be shared on the computer network, these data may face a threat from intrusion. …”
    Get full text
    Article
  3. 163

    MapReduce based big data framework using associative Kruskal poly Kernel classifier for diabetic disease prediction by R. Ramani, S. Edwin Raja, D. Dhinakaran, S. Jagan, G. Prabaharan

    Published 2025-06-01
    “…The proposed AKW-MRPK framework achieves up to 92 % accuracy, reduces computational time to as low as 0.875 ms for 25 patients, and demonstrates superior speedup efficiency with a value of 1.9 ms using two computational nodes, consistently outperforming supervised machine learning algorithms and Hadoop-based clusters across these critical metrics. • The AKW-MRPK method selects attributes and accelerates computations for predictions. • Parallelizing polynomial kernels improves accuracy and speed in healthcare data analysis.…”
    Get full text
    Article
  4. 164
  5. 165

    Iterative Assessment of Edge Criticality: Efficiency Enhancement or Hidden Insufficiency Detection by Vasily Lubashevskiy, Hamza Ejjbiri, Ihor Lubashevsky

    Published 2025-01-01
    “…Second, the analysis reveals hidden inner insufficiency in edge ranking for some algorithms, as evidenced by the fact that algorithm iterations can reduce decomposition efficiency. …”
    Get full text
    Article
  6. 166

    Impact of Image Filters and Observations Parameters in CBCT for Identification of Mandibular Osteolytic Lesions by Bruna Moraes Monteiro, Denys Silveira Nobrega Filho, Patrícia de Medeiros Loureiro Lopes, Marcelo Augusto Oliveira de Sales

    Published 2012-01-01
    “…The aim of this study was to analyze the influence of filters (algorithms) to improve the image of Cone Beam Computed Tomography (CBCT) in diagnosis of osteolytic lesions of the mandible, in order to establish the protocols for viewing images more suitable for CBCT diagnostics. 15 dry mandibles in which perforations were performed, simulating lesions, were submitted to CBCT examination. …”
    Get full text
    Article
  7. 167

    A Lightweight Method for Detecting Bearing Surface Defects Based on Deep Learning and Ontological Reasoning by Xiaolin Shi, Haisong Xu, Han Zhang, Yi Li, Xinshuo Li, Fan Yang

    Published 2025-01-01
    “…Aiming at the different sizes and textures of the defect types on the surface of the outer ring of the bearing, and the fact that most of the target detection algorithms relying on deep learning show low speed and low precision in the detection of defects on the surface of the bearing, this paper presents a lightweight method for detecting the defects on the surface of the bearing based on deep learning and ontological reasoning. …”
    Get full text
    Article
  8. 168

    Certificateless generalized signcryption scheme in the standard model by Shu-fen NIU, Ling NIU, Cai-fen WANG, Ya-hong LI

    Published 2017-04-01
    “…In 2010,Liu,et al.proposed a certificateless signcryption scheme in the standard model,but many analyses revealed that Liu's scheme was insecure in fact.To overcome the disadvantages,the scheme was improved and a certificateless generalized signcryption scheme was constructed.In addition,a formal security model for the proposed scheme against the malicious-but-passive KGC attacks was introduced.Furthermore,the proposed scheme was proven to be secure under the decisional bilinear Diffie-Hellman and the computational Diffie-Hellman intractability assumptions in the standard model.Numerical results illustrate that the proposed algorithm is efficient.…”
    Get full text
    Article
  9. 169

    Human and Machine: A View through Kant's Use of Regulative Reason by Ümit Taştan

    Published 2024-12-01
    “…We justify this claim through the problem of “narrowing the brute search space” in computational complexity, which is a significant issue in computer science. …”
    Get full text
    Article
  10. 170
  11. 171

    Modified Method of Chain Substitutions as an Alternative to the Integral Method of Economic Analysis by Yu. V. Kirillov

    Published 2024-04-01
    “…Conclusions: the proposed modified method of chain substitutions, due to its mathematical simplicity and proven accuracy of the results obtained, can be widely used in real practical calculations using methods of economic analysis, especially taking into account the computer implementation of algorithms developed in this technique.…”
    Get full text
    Article
  12. 172

    Universal Method for Detecting Violations in the Integrity of a Digital Image Based on Analysis of Blocks of its Matrix by Bobok I., Kobozeva A.

    Published 2023-11-01
    “…Thus, the aim of the work is to increase the efficiency of identifying the fact of violation of image integrity by developing a universal expert method with low computational complexity. …”
    Get full text
    Article
  13. 173

    Bayesian adaptation in Poisson cognitive systems by Aleksander A. Solodov

    Published 2019-09-01
    “…An adaptive Bayesian estimation algorithm, also known as the empirical Bayesian approach, is used to overcome this problem. …”
    Get full text
    Article
  14. 174

    Separate Analysis of Informational Signs in Multi-Parametric Combined Patterns Recognition Systems by Zakhozhay O.I., Menyaylenko A.S., Lyfar V.A.

    Published 2019-06-01
    “…Well known solutions to this problem: data processing algorithms complication, boosting algorithms using and install more productive computing systems. …”
    Get full text
    Article
  15. 175
  16. 176

    On Graph-Transversal Designs and Graph-Authentication Codes Based on Mutually Orthogonal Graph Squares by A. El-Mesady, Omar Bazighifan, H. M. Shabana

    Published 2022-01-01
    “…Combinatorial designs have many interesting and genuine wide applications in areas including analysis and design of algorithms, cryptography, analysis and design of experiments, storage system design, tournament scheduling, optical communications, and computer networks to mention just a few areas. …”
    Get full text
    Article
  17. 177

    Last-Train Timetabling under Transfer Demand Uncertainty: Mean-Variance Model and Heuristic Solution by Shuo Yang, Kai Yang, Ziyou Gao, Lixing Yang, Jungang Shi

    Published 2017-01-01
    “…Traditional models of timetable generation for last trains do not account for the fact that decision-maker (DM) often incorporates transfer demand variability within his/her decision-making process. …”
    Get full text
    Article
  18. 178

    On Training Spiking Neural Networks by Means of a Novel Quantum Inspired Machine Learning Method by Jean Michel Sellier, Alexandre Martini

    Published 2025-04-01
    “…It has already shown interesting advantages, among which is the fact that no gradient is required to be computed. …”
    Get full text
    Article
  19. 179

    New Metaphorical Models in Modern Sports Discourse by A. N. Gritsenko, P. V. Moroslin

    Published 2022-06-01
    “…The novelty of the study lies in revealing the fact that more and more new conceptual areas are involved in presenting sporting events and building communication with reader: various terms of IT technologies, the world of TV series and computer games, while new stable systems of comparison begin to form: “sport” — “virtual computer world”, “sport” — “series”. …”
    Get full text
    Article
  20. 180

    Architecture of the discrete sosine transformation processor for image compression systems on the losless-to-lossy circuit by V. V. Kliuchenia

    Published 2021-08-01
    “…Therefore, with the advent of DSP, the limitation on the number of multiplications in algorithms was removed. On the other hand, when implementing a block on an FPGA, we can limit not ourselves to the bitness of the data (within reasonable limits), we have the ability to parallelize all incoming data and implement specialized computing cores for various tasks. …”
    Get full text
    Article