Showing 5,321 - 5,340 results of 6,037 for search 'main algorithm', query time: 0.11s Refine Results
  1. 5321

    Secure K-Means Clustering Scheme for Confidential Data Based on Paillier Cryptosystem by Zhengqi Zhang, Zixin Xiong, Jun Ye

    Published 2025-06-01
    “…The protocol consists of three main components: secure computation distance (SCD) protocol, secure cluster assignment (SCA) protocol and secure cluster center update (SUCC) protocol. …”
    Get full text
    Article
  2. 5322

    Development and testing of an open source mobile application for audiometry test result analysis and diagnosis support by Michał Kassjański, Marcin Kulawiak, Tomasz Przewoźny, Dmitry Tretiakow, Andrzej Molisz

    Published 2025-04-01
    “…The application workflow is divided into three main stages: scanning, digitalization and classification of the audiogram. …”
    Get full text
    Article
  3. 5323

    Simulation of the image rejection phase method by R. R. Vishnyakov

    Published 2020-06-01
    “…The paper considers the algorithmic possibility of the image rejection method. …”
    Get full text
    Article
  4. 5324

    Modern Trends, Examples and Methods for Assessing Physical Activity of City Residents by D. A. Andreev, N. N. Kamynina

    Published 2024-11-01
    “…This paper describes global trends in modern PA studies, presents the examples of Russian and foreign papers on PA of city population, as well as summarizes the main features of PA assessment tools. Notably, PA can be assessed using subjective and objective methods. …”
    Get full text
    Article
  5. 5325

    determination of dust using remote sensing techniques and numerical simulation by Razieh Pilehvaran, Zahra Rastgu, Sara Karami, Behrooz Moradpour

    Published 2022-12-01
    “…At the first step, in order to detect and observe the intensity of the dust concentration over the study area, the MODIS AOD product from the Deep blue and Dark target algorithms has been analyzed using the ENVI software, and the generated images have been displayed in the ArcGIS software. …”
    Get full text
    Article
  6. 5326

    Integrating Mobile Devices and Wearable Technology for Optimal Sleep Conditions by You-Kwang Wang, Chien-Yu Chen

    Published 2023-09-01
    “…This project uses cloud storage technology and cloud software algorithms to enable data sharing and real-time feedback. …”
    Get full text
    Article
  7. 5327

    GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA by Cihangir Tezcan, Gregor Leander

    Published 2025-03-01
    “…In this work we provide optimized implementations of several widely used algorithms on GPUs, leading to interesting insights on the cost of brute force attacks on several real-word applications. …”
    Get full text
    Article
  8. 5328

    Structure of associative heterarchical memory by R. V. Dushkin, V. A. Lelekova, V. Y. Stepankov, S. Fadeeva

    Published 2022-10-01
    “…Natural language recognition algorithms were used in conjunction with various artificial intelligence methods.Results. …”
    Get full text
    Article
  9. 5329

    Artificial Intelligence in Digital Marketing: Towards an Analytical Framework for Revealing and Mitigating Bias by Catherine Reed, Martin Wynn, Robin Bown

    Published 2025-02-01
    “…In the marketing function of today’s leading businesses, two main types of AI can be discerned. Traditional AI centres on supervised learning algorithms to support and enable the application of data rules, predictive functionality and other AI-based features. …”
    Get full text
    Article
  10. 5330

    Simultaneous Classification of Objects with Unknown Rejection (SCOUR) Using Infra-Red Sensor Imagery by Adam Cuellar, Daniel Brignac, Abhijit Mahalanobis, Wasfy Mikhael

    Published 2025-01-01
    “…Specifically, we do not alter the training strategy of the main classifier so that its performance on known classes remains unchanged. …”
    Get full text
    Article
  11. 5331

    Supervised Sentiment Analysis of Indirect Qualitative Student Feedback for Unbiased Opinion Mining by Smitha Bidadi Anjan Prasad, Raja Praveen Kumar Nakka

    Published 2023-12-01
    “…As a result, numerous instruments and strategies for obtaining student input and assessing faculty performance, as well as other facets of education, have been developed. There are two main methods to collect feedback from students, as follows: the direct and indirect methods. …”
    Get full text
    Article
  12. 5332

    Development of Political Statistics: Conceptual Foundations for the Formation of a System of Indexes by L. Yu. Arkhangelskaya, V. N. Salin

    Published 2025-03-01
    “…The conceptual basis for structuring sections of the PS, identifying a specific subject, method and research objectives, defining a system of indexes within each section of the PS and the relationships between these modules are presented in the form of an information and logical diagram of subsystems of indexes with the definition of algorithms for their calculation and data sources for their construction.   …”
    Get full text
    Article
  13. 5333

    COMPARISON OF CONSERVATIVE METHODS OF PREVENTION OF PATHOLOGICAL SCARING OF THE HEAD AND NECK by Ya. P. Nahirniy

    Published 2022-12-01
    “…There are many conservative methods of prevention of the pathological scars formation in the area of head and neck, one of the main links is occupied by ointments with different components. …”
    Get full text
    Article
  14. 5334

    Threat of technological disruption and turnover intention in Egypt: A moderated mediation model by Mohamed Hossameldin Khalifa, Gamal M. Shehata

    Published 2025-06-01
    “…Orientation: Employee perceived threat of technological disruption (PTTD) is an unavoidable consequence of the increasing prevalence of Smart Technology, Artificial Intelligence, Robotics and Algorithms. Research purpose: This study examined the relationship between PTTD and turnover intention (TI), the mediating role of job insecurity (JI) in this relationship and the moderating effect of age on JI’s mediating role in the Egyptian private sector. …”
    Get full text
    Article
  15. 5335

    Network Congestion Tracking and Detection in Banking Industry Using Machine Learning Models by Kingsley Ifeanyi Chibueze, Nwamaka Georgenia Ezeji, Nnenna Harmony Nwobodo-Nzeribe

    Published 2024-09-01
    “…This research evaluates various ML algorithms, including Support Vector Machines, Decision Trees, and Random Forests, to identify the most effective approach for congestion detection. …”
    Get full text
    Article
  16. 5336

    Evaluation of a Polarimetric Contrast Enhancement Technique as Preprocessing Step for Vessel Detection in SAR Images: Comparison of Frequency Bands and Polarimetric Modes by Alejandro Mestre-Quereda, Juan M. Lopez-Sanchez

    Published 2025-03-01
    “…Over the years, numerous automatic ship detection algorithms have been developed, utilizing either single-polarimetric data (i.e., intensity) or leveraging additional information provided by polarimetric sensors. …”
    Get full text
    Article
  17. 5337

    Opportunities of Digitalization of Economic Subjects in Educational Process by L. N. Babkina, O. V. Skotarenko

    Published 2018-11-01
    “…The main objectives of training in other disciplines, and especially management and economic complex is the application, consolidation and increase of knowledge, skills of digital technologies in the preparation of course work, final qualifying work, during research work as students in bachelor’s and master’s degree, and in graduate school. …”
    Get full text
    Article
  18. 5338

    Unveiling the art of video enhancement: a comprehensive examination of content selection and sequencing for optimal quality in conventional and AR/VR environments by Mehrunnisa, Mikolaj Leszczuk, Dawid Juszka

    Published 2025-07-01
    “…Integrating machine learning algorithms into data sets alongside scenario-based criteria can be an essential solution to such problems. …”
    Get full text
    Article
  19. 5339

    Insights into the relationship between usability and willingness to use a robot in the future workplaces: Studying the mediating role of trust and the moderating roles of age and S... by Mohammad Babamiri, Rashid Heidarimoghadam, Fakhradin Ghasemi, Leili Tapak, Alireza Mortezapour

    Published 2022-01-01
    “…After examining the questionnaires' validity and reliability, the main variables were determined to be willingness to use robots and robot usability. …”
    Get full text
    Article
  20. 5340

    Use of satellite data for detecting icebergs and evaluating the iceberg threats by I. A. Bychkova, V. G. Smirnov

    Published 2018-12-01
    “…Te methods of satellite monitoring of dangerous ice formations, namely icebergs in the Arctic seas, representing a threat to the safety of navigation and economic activity on the Arctic shelf are considered. Te main objective of the research is to develop methods for detecting icebergs using satellite radar data and high space resolution images in the visible spectral range. …”
    Get full text
    Article