Search alternatives:
many » may (Expand Search)
Showing 3,621 - 3,640 results of 4,135 for search 'many algorithm', query time: 0.11s Refine Results
  1. 3621

    Low Complexity CS/CB Techniques for Aerial Assisted Cellular Network With Imperfect CSI by Sheila N. Mugala, Jonathan Serugunda, Dorothy K. Okello

    Published 2025-01-01
    “…The beamforming algorithms are zero forcing beamforming (ZFBF), block diagonalization using singular value decomposition (BD SVD) and block diagonalization using Householder transformation (BD HH). …”
    Get full text
    Article
  2. 3622
  3. 3623

    Weirdnodes: centrality based anomaly detection on temporal networks for the anti-financial crime domain by Salvatore Vilella, Arthur Capozzi, Marco Fornasiero, Dario Moncalvo, Valeria Ricci, Silvia Ronchiadin, Giancarlo Ruffo

    Published 2025-04-01
    “…We address this problem with WeirdNodes, a centrality-based methodology for ranked anomaly detection in temporal networks. Unlike many existing approaches that rely on rule-based algorithms or general machine learning models, WeirdNodes harnesses the evolving structure and relationships within financial transaction networks. …”
    Get full text
    Article
  4. 3624

    Transformations in academic work and faculty perceptions of artificial intelligence in higher education by Jorge Buele, Leonel Llerena-Aguirre

    Published 2025-07-01
    “…Additionally, ethical debates are emerging around algorithmic transparency, data privacy, and institutional responsibility. …”
    Get full text
    Article
  5. 3625

    Prediction of Auditory Performance in Cochlear Implants Using Machine Learning Methods: A Systematic Review by Beyza Demirtaş Yılmaz

    Published 2025-05-01
    “…Study design, machine learning algorithms, and audiological measurements were evaluated in the data analysis. …”
    Get full text
    Article
  6. 3626

    A Review of Reinforcement Learning for Fixed-Wing Aircraft Control Tasks by David J. Richter, Ricardo A. Calix, Kyungbaek Kim

    Published 2024-01-01
    “…Reinforcement learning (RL) has seen an uptick in research interest in recent years, with many papers published in a plethora of different fields, topics and applications. …”
    Get full text
    Article
  7. 3627

    Modification of Adomian decomposition technique in multiplicative calculus and application for nonlinear equations by Farooq Ahmed Shah, Muhammad Waseem, Alexey Mikhaylov, Gabor Pinter

    Published 2024-12-01
    “…The purpose in constructing new algorithms is to show the implementation and effectiveness of multiplicative calculus.…”
    Get full text
    Article
  8. 3628

    Machine Learning Approaches to Predict Patient’s Length of Stay in Emergency Department by Mohammad A. Shbool, Omar S. Arabeyyat, Ammar Al-Bazi, Abeer Al-Hyari, Arwa Salem, Thana’ Abu-Hmaid, Malak Ali

    Published 2023-01-01
    “…This pandemic has impacted many sectors, including health in the Kingdom of Jordan. …”
    Get full text
    Article
  9. 3629

    Emergence of Technology Driven Promotional Strategies for Commercialised Indian Cinema by Singh Vikash, Dahiya Surbhi, Abraham Albert, Tausif Ahmad

    Published 2024-12-01
    “…Cinema is the most prominent medium for entertainment purposes as well as a means of living for many people which in turn leads to achieving overall economic growth, job creation for any developing country. …”
    Get full text
    Article
  10. 3630

    Diel and Annual Patterns of Vocal Activity of Three Neotropical Wetland Birds Revealed via BirdNET by Cristian Pérez-Granados, Karl-L. Schuchmann

    Published 2025-04-01
    “…The use of machine learning algorithms such as BirdNET may improve bird monitoring in tropical areas but also facilitate research that improves our knowledge of birds’ natural history, which remains unknown for many tropical species.…”
    Get full text
    Article
  11. 3631

    Implementation of a Data-Parallel Approach on a Lightweight Hash Function for IoT Devices by Abdullah Sevin

    Published 2025-02-01
    “…The Internet of Things is used in many application areas in our daily lives. Ensuring the security of valuable data transmitted over the Internet is a crucial challenge. …”
    Get full text
    Article
  12. 3632

    Network archaeology: uncovering ancient networks from present-day interactions. by Saket Navlakha, Carl Kingsford

    Published 2011-04-01
    “…To overcome this limitation, we propose several novel algorithms to reconstruct the growth history of a present-day network. …”
    Get full text
    Article
  13. 3633

    Efficient and Constant Time Modular Reduction With Generalized Mersenne Primes by Serdar S. Erdem, Sezer S. Erdem

    Published 2024-01-01
    “…Many cryptographic applications require a vast number of modular multiplications with a large prime modulus. …”
    Get full text
    Article
  14. 3634

    A multi-functional simulation platform for on-demand ride service operations by Siyuan Feng, Taijie Chen, Yuhao Zhang, Jintao Ke, Zhengfei Zheng, Hai Yang

    Published 2024-12-01
    “…While previous studies have established simulators for their tasks, they lack a fair and public platform for comparing the models/algorithms proposed by different researchers. In addition, the existing simulators still face many challenges, ranging from their closeness to real environments of ride-sourcing systems to the completeness of tasks they can implement. …”
    Get full text
    Article
  15. 3635

    Application of the Machine Learning Methods to Assess the Impact of physico-chemical characteristics of water on Feed Consumption in Fish Farms by Hava Şimşek, Mükerrem Oral, Mesut Yılmaz, Mustafa Çakır, Nedim Özdemir, Okan Oral

    Published 2025-01-01
    “…In the regression analysis carried out using ML techniques, the models developed with RF, GBM and XGBoost algorithms yielded better results.…”
    Get full text
    Article
  16. 3636

    Integrating Handcrafted Features with Machine Learning for Hate Speech Detection in Albanian Social Media by Fetahi Endrit, Hamiti Mentor, Susuri Arsim, Zenuni Xhemal, Ajdari Jaumin

    Published 2024-12-01
    “…We utilized several machine-learning algorithms, including Support Vector Machine (SVM), Naive Bayes (NB), Random Forest (RF), and Logistic Regression (LR), and extracted a considerable number of handcrafted features. …”
    Get full text
    Article
  17. 3637

    Potential impact of coronaviruses upon cardiovascular system under COVID-19 pandemic by L.O. Tkachenko, O.A. Yepanchintseva, B.M. Todurov

    Published 2020-06-01
    “…There are no clear algorithms and recommendations for the treatment of such patients in a pandemic and differ in different countries. …”
    Get full text
    Article
  18. 3638

    Multi-focus image fusion using adaptive patch rendering anisotropic diffusion filter by Sandhya Tatekalva, G. Tirumala Vasu, Samreen Fiza, Hanumantharao Bitra

    Published 2025-05-01
    “…The experimental results reveal that APRADF-based fusion outperforms state-of-the-art algorithms in subjective and objective analysis.…”
    Get full text
    Article
  19. 3639

    Guided-Aloha for Secondary Access With Spectrum Prediction by Sithamparanathan Kandeepan, Madhulika Tripathi, Ke Wang, Don Gossink, Tharaka Samarasinghe, Chamath Divarathne

    Published 2025-01-01
    “…Despite the benefits of intelligent DSA protocols, many algorithms are complex, and thus prohibitively difficult to implement in a real-time system. …”
    Get full text
    Article
  20. 3640

    BLE phase-based ranging: accuracy and capability under strong Wi-Fi interference by Igor Kravets, Nazarii Kotliar, Oleksandr Karpin, Andriy Luchechko

    Published 2025-07-01
    “…Indoor positioning and asset tracking have become popular and essential for different applications and use cases. Many systems use Bluetooth Low Energy (BLE) wireless personal area network technology for communication and ranging purposes. …”
    Get full text
    Article