-
5321
Secure K-Means Clustering Scheme for Confidential Data Based on Paillier Cryptosystem
Published 2025-06-01“…The protocol consists of three main components: secure computation distance (SCD) protocol, secure cluster assignment (SCA) protocol and secure cluster center update (SUCC) protocol. …”
Get full text
Article -
5322
Development and testing of an open source mobile application for audiometry test result analysis and diagnosis support
Published 2025-04-01“…The application workflow is divided into three main stages: scanning, digitalization and classification of the audiogram. …”
Get full text
Article -
5323
Simulation of the image rejection phase method
Published 2020-06-01“…The paper considers the algorithmic possibility of the image rejection method. …”
Get full text
Article -
5324
Modern Trends, Examples and Methods for Assessing Physical Activity of City Residents
Published 2024-11-01“…This paper describes global trends in modern PA studies, presents the examples of Russian and foreign papers on PA of city population, as well as summarizes the main features of PA assessment tools. Notably, PA can be assessed using subjective and objective methods. …”
Get full text
Article -
5325
determination of dust using remote sensing techniques and numerical simulation
Published 2022-12-01“…At the first step, in order to detect and observe the intensity of the dust concentration over the study area, the MODIS AOD product from the Deep blue and Dark target algorithms has been analyzed using the ENVI software, and the generated images have been displayed in the ArcGIS software. …”
Get full text
Article -
5326
Integrating Mobile Devices and Wearable Technology for Optimal Sleep Conditions
Published 2023-09-01“…This project uses cloud storage technology and cloud software algorithms to enable data sharing and real-time feedback. …”
Get full text
Article -
5327
GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA
Published 2025-03-01“…In this work we provide optimized implementations of several widely used algorithms on GPUs, leading to interesting insights on the cost of brute force attacks on several real-word applications. …”
Get full text
Article -
5328
Structure of associative heterarchical memory
Published 2022-10-01“…Natural language recognition algorithms were used in conjunction with various artificial intelligence methods.Results. …”
Get full text
Article -
5329
Artificial Intelligence in Digital Marketing: Towards an Analytical Framework for Revealing and Mitigating Bias
Published 2025-02-01“…In the marketing function of today’s leading businesses, two main types of AI can be discerned. Traditional AI centres on supervised learning algorithms to support and enable the application of data rules, predictive functionality and other AI-based features. …”
Get full text
Article -
5330
Simultaneous Classification of Objects with Unknown Rejection (SCOUR) Using Infra-Red Sensor Imagery
Published 2025-01-01“…Specifically, we do not alter the training strategy of the main classifier so that its performance on known classes remains unchanged. …”
Get full text
Article -
5331
Supervised Sentiment Analysis of Indirect Qualitative Student Feedback for Unbiased Opinion Mining
Published 2023-12-01“…As a result, numerous instruments and strategies for obtaining student input and assessing faculty performance, as well as other facets of education, have been developed. There are two main methods to collect feedback from students, as follows: the direct and indirect methods. …”
Get full text
Article -
5332
Development of Political Statistics: Conceptual Foundations for the Formation of a System of Indexes
Published 2025-03-01“…The conceptual basis for structuring sections of the PS, identifying a specific subject, method and research objectives, defining a system of indexes within each section of the PS and the relationships between these modules are presented in the form of an information and logical diagram of subsystems of indexes with the definition of algorithms for their calculation and data sources for their construction. …”
Get full text
Article -
5333
COMPARISON OF CONSERVATIVE METHODS OF PREVENTION OF PATHOLOGICAL SCARING OF THE HEAD AND NECK
Published 2022-12-01“…There are many conservative methods of prevention of the pathological scars formation in the area of head and neck, one of the main links is occupied by ointments with different components. …”
Get full text
Article -
5334
Threat of technological disruption and turnover intention in Egypt: A moderated mediation model
Published 2025-06-01“…Orientation: Employee perceived threat of technological disruption (PTTD) is an unavoidable consequence of the increasing prevalence of Smart Technology, Artificial Intelligence, Robotics and Algorithms. Research purpose: This study examined the relationship between PTTD and turnover intention (TI), the mediating role of job insecurity (JI) in this relationship and the moderating effect of age on JI’s mediating role in the Egyptian private sector. …”
Get full text
Article -
5335
Network Congestion Tracking and Detection in Banking Industry Using Machine Learning Models
Published 2024-09-01“…This research evaluates various ML algorithms, including Support Vector Machines, Decision Trees, and Random Forests, to identify the most effective approach for congestion detection. …”
Get full text
Article -
5336
Evaluation of a Polarimetric Contrast Enhancement Technique as Preprocessing Step for Vessel Detection in SAR Images: Comparison of Frequency Bands and Polarimetric Modes
Published 2025-03-01“…Over the years, numerous automatic ship detection algorithms have been developed, utilizing either single-polarimetric data (i.e., intensity) or leveraging additional information provided by polarimetric sensors. …”
Get full text
Article -
5337
Opportunities of Digitalization of Economic Subjects in Educational Process
Published 2018-11-01“…The main objectives of training in other disciplines, and especially management and economic complex is the application, consolidation and increase of knowledge, skills of digital technologies in the preparation of course work, final qualifying work, during research work as students in bachelor’s and master’s degree, and in graduate school. …”
Get full text
Article -
5338
Unveiling the art of video enhancement: a comprehensive examination of content selection and sequencing for optimal quality in conventional and AR/VR environments
Published 2025-07-01“…Integrating machine learning algorithms into data sets alongside scenario-based criteria can be an essential solution to such problems. …”
Get full text
Article -
5339
Insights into the relationship between usability and willingness to use a robot in the future workplaces: Studying the mediating role of trust and the moderating roles of age and S...
Published 2022-01-01“…After examining the questionnaires' validity and reliability, the main variables were determined to be willingness to use robots and robot usability. …”
Get full text
Article -
5340
Use of satellite data for detecting icebergs and evaluating the iceberg threats
Published 2018-12-01“…Te methods of satellite monitoring of dangerous ice formations, namely icebergs in the Arctic seas, representing a threat to the safety of navigation and economic activity on the Arctic shelf are considered. Te main objective of the research is to develop methods for detecting icebergs using satellite radar data and high space resolution images in the visible spectral range. …”
Get full text
Article