-
3601
Artificial Intelligence and Internet of Things Integration in Pharmaceutical Manufacturing: A Smart Synergy
Published 2025-02-01“…<b>Background:</b> The integration of artificial intelligence (AI) with the internet of things (IoTs) represents a significant advancement in pharmaceutical manufacturing and effectively bridges the gap between digital and physical worlds. With AI algorithms integrated into IoTs sensors, there is an improvement in the production process and quality control for better overall efficiency. …”
Get full text
Article -
3602
A Signal Subspace Speech Enhancement Approach Based on Joint Low-Rank and Sparse Matrix Decomposition
Published 2016-01-01“…However, these decomposition algorithms are highly sensitive to the presence of large corruptions, resulting in a large amount of residual noise within enhanced speech in low signal-to-noise ratio (SNR) situations. …”
Get full text
Article -
3603
Approaches to Translation in the Context of Theory of Speech Activity
Published 2018-10-01“…However, it is important to bear in mind that many of the ideas in the cognitive literature are mainly rooted in the psycholinguistic approaches to translation. …”
Get full text
Article -
3604
Filtering Techniques To Reduce Speckle Noise And Image Quality Enhancement Methods On Porous Silicon Images Layers
Published 2022-12-01“…Recently, many studies have examined filters for reducing or removing speckle noise, which is inherent to different images types such as Porous Silicon (PS) images, in order to ameliorate the metrological evaluation of their applications. …”
Get full text
Article -
3605
Introduction to the Special Thematic Issue "Virtual Reality and Eye Tracking"
Published 2024-06-01“… Technological advancements have made it possible to integrate eye tracking in virtual reality (VR) and augmented reality (AR). Many new VR/AR headsets already include eye tracking as a standard feature. …”
Get full text
Article -
3606
Unconditional advantage of noisy qudit quantum circuits over biased threshold circuits in constant depth
Published 2025-04-01“…Furthermore, steady advances in classical algorithms and machine learning make the issue of provable, practically demonstrable quantum advantage a moving target. …”
Get full text
Article -
3607
SMART HYBRID MODELS FOR IMPROVED BREAST CANCER DETECTION
Published 2024-12-01“…Mitigating this threat focuses on early detection and prevention by adopting novel techniques. Many researchers have turned to Machine Learning algorithms to develop prognosis systems. …”
Get full text
Article -
3608
Charting the path forward: CT image quality assessment - an in-depth review
Published 2025-07-01“…It helps improve the accuracy of CT scanning equipment and the performance of CT system reconstruction algorithms, and provides a new idea for CT image processing algorithms. …”
Get full text
Article -
3609
Detection of Mycotoxins in Cereal Grains and Nuts Using Machine Learning Integrated Hyperspectral Imaging: A Review
Published 2025-04-01“…This review explores hyperspectral imaging (HSI) integrated with machine learning (ML) algorithms as a promising approach for detecting and quantifying mycotoxins in cereal grains and nuts. …”
Get full text
Article -
3610
Error Data Analytics on RSS Range-Based Localization
Published 2020-09-01“…The significance of our discovery has two folds: First, we present a general expression for localization error data analytics, which can explain and predict the accuracy of range-based localization algorithms; second, the further study on the general analytics expression and its minimum can be used to optimize current localization algorithms.…”
Get full text
Article -
3611
SkinSage XAI: An explainable deep learning solution for skin lesion diagnosis
Published 2024-12-01“…While deep learning algorithms have greatly enhanced the categorization of skin lesions, the black‐box nature of many models limits interpretability, posing challenges for dermatologists. …”
Get full text
Article -
3612
Suppressing the Endogenous Negative Influence Through Node Intervention in Social Networks
Published 2025-01-01“…We prove that this problem is NP-hard and propose approximation algorithms to identify optimal intervention nodes that minimize the negative influence. …”
Get full text
Article -
3613
An Effective Ensemble Approach for Preventing and Detecting Phishing Attacks in Textual Form
Published 2024-11-01“…Phishing email assaults have been a prevalent cybercriminal tactic for many decades. Various detectors have been suggested over time that rely on textual information. …”
Get full text
Article -
3614
Labelling Training Samples Using Crowdsourcing Annotation for Recommendation
Published 2020-01-01“…Among the ground truth inference algorithms, both HILED and HILI improve the performance of baselines; meanwhile, HILED performs better than HILI.…”
Get full text
Article -
3615
Energy-Efficient model for integrated berth allocation and quay crane management
Published 2025-05-01“…Several numerical experiments in different dimensions are defined and implemented with both algorithms. The results analysis gives an overall perspective, while both algorithms show their value and strong points and weaknesses in meeting demanding requirements of modern container terminal logistics. …”
Get full text
Article -
3616
An Efficient and Fast Model Reduced Kernel KNN for Human Activity Recognition
Published 2021-01-01“…With accumulation of data and development of artificial intelligence, human activity recognition attracts lots of attention from researchers. Many classic machine learning algorithms, such as artificial neural network, feed forward neural network, K-nearest neighbors, and support vector machine, achieve good performance for detecting human activity. …”
Get full text
Article -
3617
Architecture of the discrete sosine transformation processor for image compression systems on the losless-to-lossy circuit
Published 2021-08-01“…It is the inequality of the addition and multiplication operations when they are implemented on FPGAs that caused the search for DCT algorithms with the smallest number of factors. However, even this is not enough, since the structure of the multiplier is many times more complex than the structure of the adder, which made it necessary to look for ways to transform without using multiplications at all. …”
Get full text
Article -
3618
Secret Key Generation Protocol for Optical OFDM Systems in Indoor VLC Networks
Published 2017-01-01“…Nevertheless, the common keys generation algorithms can be very complex and costly in many setups. …”
Get full text
Article -
3619
Epileptic Seizure Detection in EEG Signals Using Machine Learning and Deep Learning Techniques
Published 2024-01-01“…Machine Learning (ML) and Deep learning (DL) algorithms have emerged as powerful feature extraction and classification tools in EEG signal analysis. …”
Get full text
Article -
3620
Registered report protocol: A scoping review to identify potential predictors as features for developing automated estimation of the probability of being frail in secondary care.
Published 2022-01-01“…Frailty is associated with adverse health outcomes and increased healthcare costs. Many validated instruments to detect frailty have been developed. …”
Get full text
Article