Search alternatives:
many » may (Expand Search)
Showing 3,261 - 3,280 results of 4,135 for search 'many algorithm', query time: 0.12s Refine Results
  1. 3261

    The AI Betrayal of Social Emotions by Pedro C. Marijuán, Plamen Simeonov, Jorge Navarro

    Published 2023-08-01
    “…We examine the growing trend in contemporary societies of appealing to sentiments and emotions in so many areas of social life, particularly under the command of AI tools and algorithms. …”
    Get full text
    Article
  2. 3262

    Simulation of Minefield Installation in a Video Game Engine by Maksym Maksymov, Oleksii Neizhpapa, Oleksandr Toshev, Maksym Kiriakidi

    Published 2025-07-01
    “…The first objective of this research is to improve damage prediction algorithms, enabling the simulation to more accurately estimate the consequences of ships passing through a minefield. …”
    Get full text
    Article
  3. 3263

    Cardiovascular Imaging and Intervention Through the Lens of Artificial Intelligence by Karthik Seetharam, Sirish Shrestha, Partho P Sengupta

    Published 2021-10-01
    “…AI and ML are rapidly gaining prominence in healthcare as data become increasingly complex. These algorithms can enhance the role of cardiovascular imaging by automating many tasks or calculations, find new patterns or phenotypes in data and provide alternative diagnoses. …”
    Get full text
    Article
  4. 3264

    A comprehensive review of post-quantum cryptography: Challenges and advances by Seyed M. Hosseini, Hossein Pilaram

    Published 2025-01-01
    “…In the last decade, with the advances in quantum computing technology and the realization of quantum computers, which have higher computational power compared to conventional computers and can execute special kinds of algorithms (i.e., quantum algorithms), the security of many existing cryptographic algorithms has been questioned. …”
    Get full text
    Article
  5. 3265

    Survey of artificial intelligence data security and privacy protection by Kui REN, Quanrun MENG, Shoukun YAN, Zhan QIN

    Published 2021-02-01
    “…Artificial intelligence and deep learning algorithms are developing rapidly.These emerging techniques have been widely used in audio and video recognition, natural language processing and other fields.However, in recent years, researchers have found that there are many security risks in the current mainstream artificial intelligence model, and these problems will limit the development of AI.Therefore, the data security and privacy protection was studied in AI.For data and privacy leakage, the model output based and model update based problem of data leakage were studied.In the model output based problem of data leakage, the principles and research status of model extraction attack, model inversion attack and membership inference attack were discussed.In the model update based problem of data leakage, how attackers steal private data in the process of distributed training was discussed.For data and privacy protection, three kinds of defense methods, namely model structure defense, information confusion defense and query control defense were studied.In summarize, the theoretical foundations, classic algorithms of data inference attack techniques were introduced.A few research efforts on the defense techniques were described in order to provoke further research efforts in this critical area.…”
    Get full text
    Article
  6. 3266

    Leveraging transformers and explainable AI for Alzheimer's disease interpretability. by Humaira Anzum, Nabil Sadd Sammo, Shamim Akhter

    Published 2025-01-01
    “…To detect Alzheimer's disease, brain scans such as computed tomography (CT), magnetic resonance imaging (MRI), or positron emission tomography (PET) can be performed. Many researches have been undertaken to use computer vision on MRI images, and their accuracy ranges from 80-90%, new computer vision algorithms and cutting-edge transformers have the potential to improve this performance.We utilize advanced transformers and computer vision algorithms to enhance diagnostic accuracy, achieving an impressive 99% accuracy in categorizing Alzheimer's disease stages through translating RNA text data and brain MRI images in near-real-time. …”
    Get full text
    Article
  7. 3267

    Effective Approach to Calculate Analysis Window in Infinite Discrete Gabor Transform by Rui Li, Yong Huang, Jia-Bao Liu

    Published 2018-01-01
    “…The computational complexity of the proposed approach is analyzed and compared with that of the existing canonical algorithms. The numerical results indicate that the proposed approach is efficient and fast for computing Gabor analysis window in both the critical sampling case and the oversampling case in comparison to existing algorithms.…”
    Get full text
    Article
  8. 3268

    Afropolitan Influence: Gender, Comedy, and Social Media in Global Africa by Robin K. Crigler

    Published 2024-12-01
    “…In addition, I argue for greater critical attention to what I call “algorithmic mystery”—the influence of opaque social media algorithms in promoting, maintaining, and severing digital connections.…”
    Get full text
    Article
  9. 3269

    Water-Based Metaheuristics: How Water Dynamics Can Help Us to Solve NP-Hard Problems by Fernando Rubio, Ismael Rodríguez

    Published 2019-01-01
    “…Many water-based optimization metaheuristics have been introduced during the last decade, both for combinatorial and for continuous optimization. …”
    Get full text
    Article
  10. 3270

    Different faces of the stethoscope: history, usefulness, evolution, contamination, and disinfection practices by Dorota Ochońska, Monika Brzychczy-Włoch, Katarzyna Talaga-Ćwiertnia

    Published 2024-11-01
    “…A stethoscope in medical practice, which comes into contact with many patients, poses a high risk of infection transmission and thus may increase the incidence of infection in healthcare facilities. …”
    Get full text
    Article
  11. 3271

    Risks of Relying on Artificial Intelligence in Learning Arabic Language Sciences Through the Meta Application by عبد الله علي حسن الغُبَسي

    Published 2025-02-01
    “…Additionally, Arabic’s inherent ambiguity contrasts with AI’s structured algorithmic approach, which relies on precision and clarity. …”
    Get full text
    Article
  12. 3272

    Sample Weighting Methods for Compensating Class Imbalance in Elephant Flow Classification by Piotr Jurkiewicz, Robert Wojcik, Jerzy Domzal

    Published 2024-01-01
    “…Accurately identifying and classifying elephant flows is crucial in many network traffic management applications. However, the inherent class imbalance between elephant and mouse flows presents a challenge for machine learning models, often leading to poor classification accuracy. …”
    Get full text
    Article
  13. 3273

    Complete Sets of Radiating and Nonradiating Parts of a Source and Their Fields with Applications in Inverse Scattering Limited-Angle Problems by E. Wallacher, A. K. Louis

    Published 2006-01-01
    “…Many algorithms applied in inverse scattering problems use source-field systems instead of the direct computation of the unknown scatterer. …”
    Get full text
    Article
  14. 3274

    Exposing Face Manipulation Based on Generative Adversarial Network–Transformer and Fake Frequency Noise Traces by Qiaoyue Man, Young-Im Cho

    Published 2025-02-01
    “…In recent years, with the application of GANs and diffusion generative network algorithms, many highly realistic synthetic images are emerging, greatly increasing the potential for misuse, and deepfakes have become a serious social concern. …”
    Get full text
    Article
  15. 3275

    About designing a planned education system in an existing corporate infrastructure by D. T. Gedenidze, A. V. Sinitsyn

    Published 2024-10-01
    “…The need to develop our own system for planned corporate training of system integrator employees was substantiated, functional requirements were formed, the architecture of the software complex was designed, intersystem interaction was designed, algorithms for calculating user recommendations were proposed.Conclusions. …”
    Get full text
    Article
  16. 3276

    Big data for imaging assessment in glaucoma by Douglas R. da Costa, Felipe A. Medeiros

    Published 2024-09-01
    “…Abstract: Glaucoma is the leading cause of irreversible blindness worldwide, with many individuals unaware of their condition until advanced stages, resulting in significant visual field impairment. …”
    Get full text
    Article
  17. 3277

    The Effects of Motion on Distributed Detection in Mobile Ad Hoc Sensor Networks by Xusheng Sun, Edward J. Coyle

    Published 2012-03-01
    “…These results allow rapid characterization of the time-dependence of distributed detection algorithms that are executed in mobile sensor networks.…”
    Get full text
    Article
  18. 3278

    Supporting Efficient Family Joins for Big Data Tables via Multiple Freedom Family Index by Qiang Zhu, Chao Zhu

    Published 2025-01-01
    “…Detailed definitions, practical applications, and processing strategies and algorithms for family joins are provided. Experimental results demonstrate that the index-based join method is quite promising in efficiently processing family joins.…”
    Get full text
    Article
  19. 3279

    Overview of Modern Technologies for Acquiring and Analysing Acoustic Information Based on AI and IoT by Sabina Szymoniak, Łukasz Kuczyński

    Published 2025-06-01
    “…The article presents an overview of modern methods of acquiring and analysing sound data, from MEMS sensors and microphones, signal processing, and feature extraction to machine learning algorithms. The analysis of many works shows how diverse the approach to acoustic analysis can be, depending on the purpose, context, and environmental constraints. …”
    Get full text
    Article
  20. 3280

    Sparse Probabilistic Synthesis of Quantum Operations by Bálint Koczor

    Published 2024-12-01
    “…Successful implementations of quantum technologies require protocols and algorithms that use as few quantum resources as possible. …”
    Get full text
    Article