Search alternatives:
many » may (Expand Search)
Showing 3,581 - 3,600 results of 4,135 for search 'many algorithm', query time: 0.11s Refine Results
  1. 3581

    BFS: A blockchain-based financing scheme for logistics company in supply chain finance by Jia Fu, Bangcan Cao, Xiaoliang Wang, Pengjie Zeng, Wei Liang, Yuzhen Liu

    Published 2022-12-01
    “…At the same time, the transparency feature of blockchain is used to solve the financing dilemma of many industries in supply chain finance. On this basis, we propose a blockchain-based financing scheme (BFS) for logistics company. …”
    Get full text
    Article
  2. 3582

    A Backdoor Attack Against LSTM-Based Text Classification Systems by Jiazhu Dai, Chuanshuai Chen, Yufeng Li

    Published 2019-01-01
    “…With the widespread use of deep learning system in many applications, the adversary has strong incentive to explore vulnerabilities of deep neural networks and manipulate them. …”
    Get full text
    Article
  3. 3583

    Unlocking autism’s complexity: the Move Initiative’s path to comprehensive motor function analysis by Ashley Priscilla Good, Elizabeth Horn

    Published 2025-01-01
    “…Despite advances in sensors, wearables, algorithms, machine learning, and agentic AI, autism research remains siloed, with many tools inaccessible to affected families and care teams. …”
    Get full text
    Article
  4. 3584

    Hybrid neural network method for damage localization in structural health monitoring by Fatahlla Moreh, Yusuf Hasan, Zarghaam Haider Rizvi, Sven Tomforde, Frank Wuttke

    Published 2025-03-01
    “…Abstract The detection of cracks in large structures is of critical importance, as such damage can result not only in significant financial costs but also pose serious risks to public safety. Many existing methods for crack detection rely on deep learning algorithms or traditional approaches that typically use image data. …”
    Get full text
    Article
  5. 3585

    From patterned response dependency to structured covariate dependency: Entropy based categorical-pattern-matching. by Hsieh Fushing, Shan-Yu Liu, Yin-Chen Hsieh, Brenda McCowan

    Published 2018-01-01
    “…Data generated from a system of interest typically consists of measurements on many covariate features and possibly multiple response features across all subjects in a designated ensemble. …”
    Get full text
    Article
  6. 3586

    Prediction of Corona-Virus Using Deep Learning by Laith Al-Ali

    Published 2022-12-01
    “…Artificial intelligence provides many tools for data analysis, statistical analysis, and intelligent research. …”
    Get full text
    Article
  7. 3587

    Computational inference of co-regulatory modules from transcription factors, MicroRNAs, and their targets using CanMod2 by Ziynet Nesibe Kesimoglu, Jubair Ibn Malik Rifat, Serdar Bozdag

    Published 2025-04-01
    “…In this work, we have introduced several algorithmic enhancements to the earlier version of CanMod2. …”
    Get full text
    Article
  8. 3588

    Data analysis methods in astronomic objects classification (Sloan Digital Sky Survey DR14) by V. A. Golov, D. A. Petrusevich

    Published 2021-06-01
    “…The large quantity of statistical information leads to the demand for analytical algorithms and systems capable of making classification. …”
    Get full text
    Article
  9. 3589

    Using mathematical modelling to highlight challenges in understanding trap counts obtained by a baited trap by Omar Mazen Alqubori, Daniel Bearup, Sergei Petrovskii

    Published 2025-03-01
    “…Abstract Baited traps are routinely used in many ecological and agricultural applications, in particular when information about pest insects is required. …”
    Get full text
    Article
  10. 3590

    Optimization of non-smooth functions via differentiable surrogates. by Shikun Chen, Zebin Huang, Wenlong Zheng

    Published 2025-01-01
    “…Mathematical optimization is fundamental across many scientific and engineering applications. While data-driven models like gradient boosting and random forests excel at prediction tasks, they often lack mathematical regularity, being non-differentiable or even discontinuous. …”
    Get full text
    Article
  11. 3591

    Graph-based two-level indicator system construction method for smart city information security risk assessment by Li Yang, Kai Zou, Yuxuan Zou

    Published 2024-08-01
    “…The rapid development of urban informatization has led to a deep integration of advanced information technology into urban life. Many decision-makers are starting to alleviate the adverse effects of this informatization process through risk assessment. …”
    Get full text
    Article
  12. 3592

    Application of the Endurance Time Method in the Seismic Assessment of Moment-Resisting Reinforced Concrete Frames with Setbacks by Mehdi Izadpanah

    Published 2024-12-01
    “…Nowadays, many buildings around the world exhibit height irregularities. …”
    Get full text
    Article
  13. 3593

    Modeling LTE-advanced cell capacity estimation using packet bundling and carrier aggregation by Rajiv Senapati

    Published 2025-05-01
    “…The increasing demand for mobile usage raises many challenges for service providers. Satisfying subscribers by providing a better quality of service (QoS) is one of the major concerns of an operator. …”
    Get full text
    Article
  14. 3594

    Computational toolkit for predicting thickness of 2D materials using machine learning and autogenerated dataset by large language model by Chinedu E. Ekuma

    Published 2025-03-01
    “…This Python-based computational framework harnesses an autogenerated thickness database, developed using large language models, and advanced ML algorithms to facilitate the rapid and scalable estimation of material thickness, relying solely on crystallographic data. …”
    Get full text
    Article
  15. 3595

    A willingness-aware user recruitment strategy based on the task attributes in mobile crowdsensing by Yang Liu, Yong Li, Wei Cheng, Weiguang Wang, Junhua Yang

    Published 2022-09-01
    “…Mobile crowdsensing has become a versatile platform for many Internet of things applications in urban scenarios. …”
    Get full text
    Article
  16. 3596

    Application of Machine Learning for Real-Time Phishing Attack Detection by Akshay Shankar Agrawal, Sanketi Raut, Andrina Dsouza, Jimit Mehta, Prajwal Naik

    Published 2025-06-01
    “…The system uses machine learning algorithms to distinguish legitimate websites from phishing websites and generate a prediction to be used for the platform. …”
    Get full text
    Article
  17. 3597

    Real Time Application for Automatic Object and 3D Position Detection and Sorting with Robotic Manipulator by Tichaona Jonathan Makomo, Barış Boru, Kenan Erin

    Published 2020-08-01
    “…For this work, a common industrial task in many factories of pick and place is implemented. …”
    Get full text
    Article
  18. 3598

    Profitability Indicators: Critical Analysis and Applicability in Modern Conditions by S. A. Bondarenko, S. V. Pupentsova

    Published 2024-10-01
    “…Theoretical significance of the obtained results consists in the development of the methodology of value-oriented management in order to actualize and adapt the algorithms for calculating profitability indicators to domestic conditions, taking into account the interests of the participants of the organization. …”
    Get full text
    Article
  19. 3599

    Explainable Anomaly Detection Based on Operational Sequences in Industrial Control Systems by Ka-Kyung Kim, Joon-Seok Kim, Ieck-Chae Euom

    Published 2025-01-01
    “…Anomaly detection systems, initially implemented for detecting device faults or failures, have increasingly become the focus of research aimed at identifying attack patterns as cyberattack techniques become more sophisticated and intelligent. Many anomaly detection algorithms based on deep learning models have good performance but often involve complex neural network structures, creating a black-box issue where users cannot interpret the decisions made by the models. …”
    Get full text
    Article
  20. 3600

    OWNC: Open-World Node Classification on Graphs with a Dual-Embedding Interaction Framework by Yuli Chen, Chun Wang

    Published 2025-04-01
    “…Additionally, when there are too many or too few nodes from unseen classes, classification performance typically declines. …”
    Get full text
    Article