Search alternatives:
improve model » improved model (Expand Search)
Showing 13,441 - 13,460 results of 14,154 for search 'improve model algorithm', query time: 0.23s Refine Results
  1. 13441

    Optimal 5G Network Sub-Slicing Orchestration in a Fully Virtualised Smart Company Using Machine Learning by Abimbola Efunogbon, Enjie Liu, Renxie Qiu, Taiwo Efunogbon

    Published 2025-02-01
    “…The framework leverages the LazyPredict module to automatically select optimal supervised learning algorithms based on real-time network conditions and historical data. …”
    Get full text
    Article
  2. 13442

    Digital transformation of modern corporation management tools: the current state and development paths by V. A. Laptev, S. Yu. Chucha, D. R. Feyzrakhmanova

    Published 2022-03-01
    “…The authors distinguish three types of digital corporate governance: remote management (exercised by human individuals), smart management (based on algorithms designed by human engineers), and artificial intelligence (AI) management (that does not require human involvement). …”
    Get full text
    Article
  3. 13443

    Energy-Accuracy Trade-Offs for Resistive In-Memory Computing Architectures by Saion K. Roy, Naresh R. Shanbhag

    Published 2024-01-01
    “…This result clearly implies the need for other approaches, e.g., algorithmic- and learning-based methods, to improve the inference accuracy of resistive IMC architectures.…”
    Get full text
    Article
  4. 13444

    Precision Weed Control Using Unmanned Aerial Vehicles and Robots: Assessing Feasibility, Bottlenecks, and Recommendations for Scaling by Shanmugam Vijayakumar, Palanisamy Shanmugapriya, Pasoubady Saravanane, Thanakkan Ramesh, Varunseelan Murugaiyan, Selvaraj Ilakkiya

    Published 2025-05-01
    “…Scaling requires advancements in weed detection and energy efficiency, development of affordable robots with shared service models, enhanced farmer training, improved rural connectivity, and precise engineering solutions. …”
    Get full text
    Article
  5. 13445

    AI in dermatology: a comprehensive review into skin cancer detection by Kavita Behara, Ernest Bhero, John Terhile Agee

    Published 2024-12-01
    “…We analyzed and categorized the articles based on four key dimensions: advantages, difficulties, methodologies, and functionalities. Results AI-based models exhibit remarkable performance in skin cancer detection by leveraging advanced deep learning algorithms, image processing techniques, and feature extraction methods. …”
    Get full text
    Article
  6. 13446

    Aberrant gene expression prediction across human tissues by Florian R. Hölzlwimmer, Jonas Lindner, Georgios Tsitsiridis, Nils Wagner, Francesco Paolo Casale, Vicente A. Yépez, Julien Gagneur

    Published 2025-03-01
    “…Abstract Despite the frequent implication of aberrant gene expression in diseases, algorithms predicting aberrantly expressed genes of an individual are lacking. …”
    Get full text
    Article
  7. 13447

    Reward shaping-based deep reinforcement learning for look-ahead dispatch with rolling-horizon by Hongsheng Xu, Yungui Xu, Ke Wang, Yaping Li, Abdullah Al Ahad

    Published 2025-07-01
    “…Case studies on the SG 126-bus and IEEE 118-bus systems demonstrate the effectiveness of the proposed improved measures, as well as the superiority and adaptability of the proposed improved DRL algorithms in training and testing performance.© 2017 Elsevier Inc. …”
    Get full text
    Article
  8. 13448

    Application of blade element momentum theory with guaranteed convergence to analyze a straight-blade horizontal axis wind turbine by Dang Huy Le, The Bao Nguyen, Van Minh Ngo

    Published 2025-06-01
    “…Straight-blade turbines with relatively large Re changes in blade spanwise direction often cause difficulties in the convergence of BEM algorithms. This article presents the ability to apply improved BEM theory to straight-blade wind turbines in the wind speed range from 5 to 7 m/s and tip speed ratio from 4 to 7 through analytical calculations. …”
    Get full text
    Article
  9. 13449

    The role of artificial intelligence in promoting health and developing preventive strategies for diabetes by Ameneh Marzban

    Published 2025-03-01
    “…For instance, machine learning models can evaluate patient records, lifestyle factors, and genetic information to deliver precise risk assessments and personalized recommendations. …”
    Get full text
    Article
  10. 13450
  11. 13451

    Application of machine deep learning technology in tight sandstones reservoir prediction: A case study of Xujiahe Formation in Xinchang, western Sichuan Depression by QIAN Yugui

    Published 2023-10-01
    “…Pre-stack inversion techniques were combined with machine deep learning algorithms to construct an interpretation model. This innovative method ultimately achieved quantitative predictions of sandstone thickness and reservoir properties. …”
    Get full text
    Article
  12. 13452

    Industrial-scale prediction of cement clinker phases using machine learning by Sheikh Junaid Fayaz, Néstor Montiel-Bohórquez, Shashank Bishnoi, Matteo Romano, Manuele Gatti, N. M. Anoop Krishnan

    Published 2025-05-01
    “…Abstract Cement production exceeds 4.1 billion tonnes annually, emitting 2.4 billion tonnes of CO2 annually, necessitating improved process control. Traditional models, limited to steady-state conditions, lack predictive accuracy for clinker mineralogical phases. …”
    Get full text
    Article
  13. 13453

    Collaborative altitude-adaptive reinforcement learning for active search with unmanned aerial vehicle swarms by XIAO Zijian, Chen-Chun Hsia, XU Yanggang, REN Jiyuan, CHEN Xinlei

    Published 2024-09-01
    “…To address these challenges, collaborative altitude-adaptive reinforcement learning (CARL) was proposed which incorporated an altitude-aware sensor model, a confidence-informed assessment module, and an altitude-adaptive planner based on proximal policy optimization (PPO) algorithms. …”
    Get full text
    Article
  14. 13454

    Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism by Kuan LIU, Jianting NING, Wei WU, Shengmin XU, Chao LIN

    Published 2023-12-01
    “…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
    Get full text
    Article
  15. 13455

    A mechanism for value-sensitive decision-making. by Darren Pais, Patrick M Hogan, Thomas Schlegel, Nigel R Franks, Naomi E Leonard, James A R Marshall

    Published 2013-01-01
    “…Finally, cross-inhibition tunes the speed-accuracy trade-off realised when differences in the values of the alternatives are sufficiently large to matter. We propose that the model, and the significant role of the values of the alternatives, may describe other decision-making systems, including intracellular regulatory circuits, and simple neural circuits, and may provide guidance in the design of decision-making algorithms for artificial systems, particularly those functioning without centralised control.…”
    Get full text
    Article
  16. 13456

    Hardware-software complex for experimental research of electric drives of asynchronous motors with squirrel-cage rotor with traditional winding and motors with combined winding by A. N. Tsvetkov, Doan Ngok Shi

    Published 2022-04-01
    “…The structure of the HSC included the developed frequency converter with the possibility of adjusting the algorithms for controlling the electric motor and the mathematical model of the electric motor itself. …”
    Get full text
    Article
  17. 13457

    Travel Time Variability and Spatio-Temporal Analysis of Urban Streets Using Global Positioning System: A Review by Zainab Ahmed Alkaissi, Ruba Yousif Hussain

    Published 2025-01-01
    “…Different prediction models were developed to capture the main parameters related to travel time. …”
    Get full text
    Article
  18. 13458

    The Discriminants of Long and Short Duration Failures in Fulfillment Sortation Equipment: A Machine Learning Approach by Abed Mutemi, Fernando Bacao

    Published 2023-01-01
    “…The gradient boosting classifier (GBC) produces state-of-the-art results in this setting, with precision of 0.76, recall of 0.82, and false positive rate (FPR) of 0.002. This model has since been applied successfully to automate the detection of long- and short-term defects, which has improved equipment maintenance schedules and personnel allocation towards fulfillment operations. …”
    Get full text
    Article
  19. 13459

    An investigation into the zoning of ecosystem sensitivity control areas in Mentougou District (Beijing, China). by Xiaodan Li, Haoyu Tao, Jing Li, Zhen Liu, Zhiping Liu

    Published 2024-01-01
    “…These values are processed through mathematical overlay algorithms, which generate composite results with different sensitivity levels. …”
    Get full text
    Article
  20. 13460

    Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism by Kuan LIU, Jianting NING, Wei WU, Shengmin XU, Chao LIN

    Published 2023-12-01
    “…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
    Get full text
    Article