-
13321
Liquid metal phase change materials for thermal management of electronics
Published 2024-12-01“…In addition, the mathematical models and related numerical algorithms for interpreting the phase change heat transfer mechanisms of LM are illustrated. …”
Get full text
Article -
13322
Evaluation of the performance of ERA5, ERA5-Land and MERRA-2 reanalysis to estimate snow depth over a mountainous semi-arid region in Iran
Published 2025-04-01“…The superior performance of ERA5-Land in this study can be attributed to its fine horizontal resolution, advanced data assimilation techniques and improved physical modeling, which enhance its ability to capture snow dynamics accurately. …”
Get full text
Article -
13323
Enhancing Energy Efficiency of Sensors and Communication Devices in Opportunistic Networks Through Human Mobility Interaction Prediction
Published 2025-02-01“…Routing algorithms designed for such opportunistic networks aim to increase the probability of successful message transmission by leveraging area information derived from historical data to forecast potential encounters. …”
Get full text
Article -
13324
Understanding the Influence of Image Enhancement on Underwater Object Detection: A Quantitative and Qualitative Study
Published 2025-01-01“…Finally, we perform an overlap analysis between the generated enhanced sets to identify cases where the enhanced images of different enhancement algorithms unanimously outperform, equally perform, or underperform the original images. …”
Get full text
Article -
13325
A Hybrid Artificial Intelligence Approach for Down Syndrome Risk Prediction in First Trimester Screening
Published 2025-06-01“…The final features are classified using machine learning algorithms, including Bagged Trees and Naive Bayes. …”
Get full text
Article -
13326
Outpatient diagnosis of endogenous intoxication in surgery
Published 2022-05-01“…Mathematical modeling was carried out at the Department of “Computer Technologies” of the Penza State University.Results. …”
Get full text
Article -
13327
Disease and economic burden increase with systemic lupus erythematosus severity 1 year before and after diagnosis: a real-world cohort study, United States, 2004–2015
Published 2021-04-01“…Earlier diagnosis and treatment may improve health outcomes and reduce HCRU and costs.…”
Get full text
Article -
13328
Biomarker-driven drug repurposing for NAFLD-associated hepatocellular carcinoma using machine learning integrated ensemble feature selection
Published 2025-04-01“…Seven machine learning algorithms were assessed for disease stage classification. …”
Get full text
Article -
13329
Octagram Propagation Matching for Multi-Scale View Stereopsis (OPM-MVS)
Published 2025-01-01“…Multiple view stereopsis (MVS) algorithms have achieved substantial advancements in 3D reconstruction accuracy and completeness. …”
Get full text
Article -
13330
Satellite Fault Diagnosis Using Support Vector Machines Based on a Hybrid Voting Mechanism
Published 2014-01-01“…To most of the classification algorithms, it will degrade the performance of model. …”
Get full text
Article -
13331
Efficient and practical Hamiltonian simulation from time-dependent product formulas
Published 2025-03-01“…We illustrate this via extensive numerical simulations for several models. For instance, in the strong-field regime of the 1D transverse-field Ising model, our algorithms achieve an improvement of one order of magnitude in both the system size and evolution time that can be simulated with a fixed budget of 1000 arbitrary 2-qubit gates, compared with standard Trotter formulas.…”
Get full text
Article -
13332
Object Detection using YOLOv8 : A Systematic Review
Published 2025-05-01“…This study evaluates the performance of YOLOv8 based on precision, recall, F1-score, and mean average precision (mAP) metrics, and compares its advantages and limitations with previous YOLO versions and other object detection algorithms. Improvements in the YOLOv8 architecture, including attention mechanisms, improved feature extraction, and hyperparameter optimization, enable significant improvements in accuracy and computational efficiency, especially for small objects and low-light conditions. …”
Get full text
Article -
13333
Bootstrapping the 3d Ising stress tensor
Published 2025-03-01“…We also describe several improvements made along the way to algorithms and software tools for the numerical bootstrap.…”
Get full text
Article -
13334
Economic burden of the novel coronavirus infection: a systematic review
Published 2022-10-01“…Predominantly, the estimates involve the calculation of quality-adjusted life years lost (QALY) (66.3%), 37.6% of the studies are based on the results of constructing scenario models, 28.8% consume algorithms of epidemiological SIR (susceptible, infected, or recovered) models, and 66.3% provide for cost assessment. …”
Get full text
Article -
13335
Schizophrenia Detection and Classification: A Systematic Review of the Last Decade
Published 2024-11-01“…It highlights state-of-the-art AI techniques and synthesizes insights into their potential to improve diagnostic outcomes. Additionally, the analysis underscores common challenges, including dataset limitations, variability in preprocessing approaches, and the need for more interpretable models. …”
Get full text
Article -
13336
Research on Trajectory Planning of Fermented Grains Grasping Mechanical Arms
Published 2022-09-01“…Aiming at the requirement of attitude controllability during operation, an attitude adjustment model is established and the controllability of the end posture of the manipulator in joint space based motion planning is improved.…”
Get full text
Article -
13337
Secure and efficient batch authentication scheme based on dynamic revocation mechanism in space information network
Published 2022-04-01“…A secure and efficient batch authentication scheme based on dynamic revocation mechanism was proposed for the problem of cross-domain authentication of a large number of mobile users in space information networks.Early key negotiation was achieved by predicting the satellite trajectory and updating the session key in real time.Algorithms were designed for a single as well as a large number of mobile terminals to perform signing and verification, which effectively reduce the computational burden of satellites.Cuckoo filters were adopted by the new scheme to achieve dynamic revocation and malicious access control of mobile terminals.Finally, under the Diffie-Hellman assumption, the proposed scheme was proved to be resistant to replay and man-in-the-middle attacks based on a random oracle model and automated validation of internet security protocols and applications.Security goals such as traceability and revocability were achieved by the scheme, thus improving the efficiency of transmission and computation by more than 80% and 20%, respectively, compared with the existing optimal scheme.…”
Get full text
Article -
13338
Dual-Stage Gated Segmented Multimodal Emotion Recognition Method—***<sup>1</sup> , ***<sup>1</sup> , ***<sup>2 </sup>, ***<sup>1</sup>
Published 2025-01-01“…The interaction stage leverages the OAGL fusion strategy to model global-local cross-modal interactions, improving the efficiency of feature fusion. …”
Get full text
Article -
13339
Mapping Data to Concepts: Enhancing Quantum Neural Network Transparency with Concept-Driven Quantum Neural Networks
Published 2024-10-01“…The algorithmic design of CD-QNN is comprehensively analyzed, detailing the roles of the concept generator, feature extractor, and feature integrator in improving and balancing model expressivity and interpretability. …”
Get full text
Article -
13340
Business process mining based insider threat detection system
Published 2016-10-01“…Current intrusion detection systems are mostly for detecting external attacks,but sometimes the internal staff may bring greater harm to organizations in information security.Traditional insider threat detection methods of-ten do not combine the behavior of people with business activities,making the threat detection rate to be improved.An insider threat detection system based on business process mining from two aspects was proposed,the implementation of insider threats and the impact of threats on system services.Firstly,the normal control flow model of business ac-tivities and the normal behavior profile of each operator were established by mining the training log.Then,the actual behavior of the operators was compared with the pre-established normal behavior contours during the operation of the system,which was supplemented by control flow anomaly detection and performance anomaly detection of business processes,in order to discover insider threats.A variety of anomalies were defined and the corresponding detection algorithms were given.Experiments were performed on the ProM platform.The results show the designed system is effective.…”
Get full text
Article