-
161
Development of a Conceptual Scheme for Controlling Tool Wear During Cutting, Based on the Interaction of Virtual Models of a Digital Twin and a Vibration Monitoring System
Published 2024-11-01“…This article discusses the issue of the joint use of neural network algorithms for data processing and deterministic mathematical models. …”
Get full text
Article -
162
Adaptive Anomaly Detection Framework Model Objects in Cyberspace
Published 2020-01-01“…Taking into consideration the fact that e-banking, e-commerce, and business data will be shared on the computer network, these data may face a threat from intrusion. …”
Get full text
Article -
163
MapReduce based big data framework using associative Kruskal poly Kernel classifier for diabetic disease prediction
Published 2025-06-01“…The proposed AKW-MRPK framework achieves up to 92 % accuracy, reduces computational time to as low as 0.875 ms for 25 patients, and demonstrates superior speedup efficiency with a value of 1.9 ms using two computational nodes, consistently outperforming supervised machine learning algorithms and Hadoop-based clusters across these critical metrics. • The AKW-MRPK method selects attributes and accelerates computations for predictions. • Parallelizing polynomial kernels improves accuracy and speed in healthcare data analysis.…”
Get full text
Article -
164
Real-Time Speech Extraction Based on Rank-Constrained Spatial Covariance Matrix Estimation and Spatially Regularized Independent Low-Rank Matrix Analysis With Fast Demixing Matrix...
Published 2025-01-01“…In experiments, we first confirm the effectiveness of the proposed VCD algorithm in terms of both computational time and numerical stability. …”
Get full text
Article -
165
Iterative Assessment of Edge Criticality: Efficiency Enhancement or Hidden Insufficiency Detection
Published 2025-01-01“…Second, the analysis reveals hidden inner insufficiency in edge ranking for some algorithms, as evidenced by the fact that algorithm iterations can reduce decomposition efficiency. …”
Get full text
Article -
166
Impact of Image Filters and Observations Parameters in CBCT for Identification of Mandibular Osteolytic Lesions
Published 2012-01-01“…The aim of this study was to analyze the influence of filters (algorithms) to improve the image of Cone Beam Computed Tomography (CBCT) in diagnosis of osteolytic lesions of the mandible, in order to establish the protocols for viewing images more suitable for CBCT diagnostics. 15 dry mandibles in which perforations were performed, simulating lesions, were submitted to CBCT examination. …”
Get full text
Article -
167
A Lightweight Method for Detecting Bearing Surface Defects Based on Deep Learning and Ontological Reasoning
Published 2025-01-01“…Aiming at the different sizes and textures of the defect types on the surface of the outer ring of the bearing, and the fact that most of the target detection algorithms relying on deep learning show low speed and low precision in the detection of defects on the surface of the bearing, this paper presents a lightweight method for detecting the defects on the surface of the bearing based on deep learning and ontological reasoning. …”
Get full text
Article -
168
Certificateless generalized signcryption scheme in the standard model
Published 2017-04-01“…In 2010,Liu,et al.proposed a certificateless signcryption scheme in the standard model,but many analyses revealed that Liu's scheme was insecure in fact.To overcome the disadvantages,the scheme was improved and a certificateless generalized signcryption scheme was constructed.In addition,a formal security model for the proposed scheme against the malicious-but-passive KGC attacks was introduced.Furthermore,the proposed scheme was proven to be secure under the decisional bilinear Diffie-Hellman and the computational Diffie-Hellman intractability assumptions in the standard model.Numerical results illustrate that the proposed algorithm is efficient.…”
Get full text
Article -
169
Human and Machine: A View through Kant's Use of Regulative Reason
Published 2024-12-01“…We justify this claim through the problem of “narrowing the brute search space” in computational complexity, which is a significant issue in computer science. …”
Get full text
Article -
170
-
171
Modified Method of Chain Substitutions as an Alternative to the Integral Method of Economic Analysis
Published 2024-04-01“…Conclusions: the proposed modified method of chain substitutions, due to its mathematical simplicity and proven accuracy of the results obtained, can be widely used in real practical calculations using methods of economic analysis, especially taking into account the computer implementation of algorithms developed in this technique.…”
Get full text
Article -
172
Universal Method for Detecting Violations in the Integrity of a Digital Image Based on Analysis of Blocks of its Matrix
Published 2023-11-01“…Thus, the aim of the work is to increase the efficiency of identifying the fact of violation of image integrity by developing a universal expert method with low computational complexity. …”
Get full text
Article -
173
Bayesian adaptation in Poisson cognitive systems
Published 2019-09-01“…An adaptive Bayesian estimation algorithm, also known as the empirical Bayesian approach, is used to overcome this problem. …”
Get full text
Article -
174
Separate Analysis of Informational Signs in Multi-Parametric Combined Patterns Recognition Systems
Published 2019-06-01“…Well known solutions to this problem: data processing algorithms complication, boosting algorithms using and install more productive computing systems. …”
Get full text
Article -
175
-
176
On Graph-Transversal Designs and Graph-Authentication Codes Based on Mutually Orthogonal Graph Squares
Published 2022-01-01“…Combinatorial designs have many interesting and genuine wide applications in areas including analysis and design of algorithms, cryptography, analysis and design of experiments, storage system design, tournament scheduling, optical communications, and computer networks to mention just a few areas. …”
Get full text
Article -
177
Last-Train Timetabling under Transfer Demand Uncertainty: Mean-Variance Model and Heuristic Solution
Published 2017-01-01“…Traditional models of timetable generation for last trains do not account for the fact that decision-maker (DM) often incorporates transfer demand variability within his/her decision-making process. …”
Get full text
Article -
178
On Training Spiking Neural Networks by Means of a Novel Quantum Inspired Machine Learning Method
Published 2025-04-01“…It has already shown interesting advantages, among which is the fact that no gradient is required to be computed. …”
Get full text
Article -
179
New Metaphorical Models in Modern Sports Discourse
Published 2022-06-01“…The novelty of the study lies in revealing the fact that more and more new conceptual areas are involved in presenting sporting events and building communication with reader: various terms of IT technologies, the world of TV series and computer games, while new stable systems of comparison begin to form: “sport” — “virtual computer world”, “sport” — “series”. …”
Get full text
Article -
180
Architecture of the discrete sosine transformation processor for image compression systems on the losless-to-lossy circuit
Published 2021-08-01“…Therefore, with the advent of DSP, the limitation on the number of multiplications in algorithms was removed. On the other hand, when implementing a block on an FPGA, we can limit not ourselves to the bitness of the data (within reasonable limits), we have the ability to parallelize all incoming data and implement specialized computing cores for various tasks. …”
Get full text
Article