Search alternatives:
many » may (Expand Search)
Showing 3,961 - 3,980 results of 4,135 for search 'many algorithm', query time: 0.12s Refine Results
  1. 3961

    Healthcare Professionals' Views on the Use of Passive Sensing and Machine Learning Approaches in Secondary Mental Healthcare: A Qualitative Study by Jessica Rogan, Joseph Firth, Sandra Bucci

    Published 2024-12-01
    “…ABSTRACT Introduction Globally, many people experience mental health difficulties, and the current workforce capacity is insufficient to meet this demand, with growth not keeping pace with need. …”
    Get full text
    Article
  2. 3962

    FedDrip: Federated Learning With Diffusion-Generated Synthetic Image by Karin Huangsuwan, Timothy Liu, Simon See, Aik Beng Ng, Peerapon Vateekul

    Published 2025-01-01
    “…Moreover, we demonstrate that this virtual-client strategy can be integrated into any federated learning framework, including foundational algorithms such as FedAvg and advanced algorithms such as FedDyn and FedProx. …”
    Get full text
    Article
  3. 3963

    RGB-to-Infrared Translation Using Ensemble Learning Applied to Driving Scenarios by Leonardo Ravaglia, Roberto Longo, Kaili Wang, David Van Hamme, Julie Moeyersoms, Ben Stoffelen, Tom De Schepper

    Published 2025-06-01
    “…However, the lack of IR data in many datasets and simulation tools limits the development and validation of sensor fusion algorithms that exploit this complementarity. …”
    Get full text
    Article
  4. 3964

    Quantum secured blockchain framework for enhancing post quantum data security by Nalavala Ramanjaneya Reddy, Supriya Suryadevara, K. Guru Raghavendra Reddy, Ramisetty Umamaheswari, Ramakrishna Guttula, Rajitha Kotoju

    Published 2025-08-01
    “…Popular schemes like RSA, ECDSA, and SHA-256 can be compromised by quantum algorithms (Shor’s and Grover’s), raising questions about the security and trustworthiness of blockchain-based applications in finance, healthcare, and supply chains. …”
    Get full text
    Article
  5. 3965

    Multi-Temporal Remote Sensing Satellite Data Analysis for the 2023 Devastating Flood in Derna, Northern Libya by Roman Shults, Ashraf Farahat, Muhammad Usman, Md Masudur Rahman

    Published 2025-02-01
    “…Floods are considered to be among the most dangerous and destructive geohazards, leading to human victims and severe economic outcomes. Yearly, many regions around the world suffer from devasting floods. …”
    Get full text
    Article
  6. 3966
  7. 3967

    A data science pipeline applied to Australia's 2022 COVID-19 Omicron waves by James M. Trauer, Angus E. Hughes, David S. Shipman, Michael T. Meehan, Alec S. Henderson, Emma S. McBryde, Romain Ragonnet

    Published 2025-03-01
    “…The field of software engineering is advancing at astonishing speed, with packages now available to support many stages of data science pipelines. These packages can support infectious disease modelling to be more robust, efficient and transparent, which has been particularly important during the COVID-19 pandemic. …”
    Get full text
    Article
  8. 3968

    AI-powered literature search: some observations and concerns by Farooq Azam Rathore, Fareeha Farooq

    Published 2024-12-01
    “…They should clearly outline their article selection criteria and summarization algorithms. This should be clearly displayed at the appropriate place at the website…”
    Get full text
    Article
  9. 3969
  10. 3970

    Data Confidentiality in Artificial Intelligence-Assisted Medicine: The Main Ethical Issue by Raluca DUMACHE, Camelia MURESAN, Marina Adriana MERCIONI, Alin IONESCU, Nina IVANOVIC, Alexandra ENACHE

    Published 2025-05-01
    “…Materials and Methods: The study entails gathering patient data from electronic health records (EHRs), anonymizing it, creating AI algorithms for recommending treatments and diagnosing diseases, putting strong security measures in place, abiding by ethical standards, identifying and reducing biases in AI algorithms, and making sure that laws like GDPR and HIPAA are followed. …”
    Get full text
    Article
  11. 3971

    Self-Stabilization of Grid-Connected Inverters by Means of an Impedance-Based Adaptive Controller by Joel Filipe Guerreiro, Tiago Davi Curi Busarello, Hildo Guillardi, Igor Alves Maronni, Jose De A. Olimpio Filho, Helmo K. Morales Paredes, Jose A. Pomilio

    Published 2025-01-01
    “…The technique enables the self-stabilization of the inverter even when an instability is already triggered and without the need for impedance measurements or processor-intensive algorithms. A frequency sweep verification is performed to measure the converter’s impedance and validate it against the theoretical one. …”
    Get full text
    Article
  12. 3972

    Combining Local Electromagnetic Scattering and Global Structure Features for SAR Open Set Recognition by Qinjie Lin, Hao Sun, Yanjie Xu, Junyu Wang, Kefeng Ji, Gangyao Kuang

    Published 2025-01-01
    “…However, existing SAR ATR primarily rely on algorithms from the field of computer vision, many methods have not adequately considered the imaging sensitivity of SAR images. …”
    Get full text
    Article
  13. 3973

    Method for Knowledge Transfer via Multi-Task Semi-Supervised Self-Paced by Yao Zhao, Hongying Liu, Huaxian Pan, Zhen Song, Chunting Liu, Anni Wei, Baoshuang Zhang, Wei Lu

    Published 2025-01-01
    “…Adequate labeled data is essential for learning a reliable and generalizable model in many machine learning tasks. However, labeled data is becoming scarce and costly to obtain, which has spurred consistent interest in knowledge transfer techniques. …”
    Get full text
    Article
  14. 3974
  15. 3975
  16. 3976

    Expose flexible conformations for intrinsically disordered protein by Jiaan Yang, Wenxin Ji, Wen Xiang Cheng, Gang Wu, Si Tong Sheng, Peng Zhang, Jun Lin, Xiaojia Chen, Qiong Shi

    Published 2025-12-01
    “…To overcome the barrier, the protein structure fingerprint technology has been developed, which includes PFSC (Protein Folding Shape Code) (Yang, 2008) and PFVM (Protein Folding Variation Matrix) (Yang et al., 2022) algorithms as well as FiveFold (Yang et al., 2025) approach for protein structure prediction, which are able explicitly to expose the possible conformational structures for intrinsically disordered protein. …”
    Get full text
    Article
  17. 3977

    Segmentation of CAD models using hybrid representation by Claude Uwimana, Shengdi Zhou, Limei Yang, Zhuqing Li, Norbelt Mutagisha, Edouard Niyongabo, Bin Zhou

    Published 2025-04-01
    “…The first component of our hybrid system involves advanced mesh-labeling algorithms that harness the digitization of CAD properties to mesh models. …”
    Get full text
    Article
  18. 3978

    Developing a Novel Adaptive Double Deep Q-Learning-Based Routing Strategy for IoT-Based Wireless Sensor Network with Federated Learning by Nalini Manogaran, Mercy Theresa Michael Raphael, Rajalakshmi Raja, Aarav Kannan Jayakumar, Malarvizhi Nandagopal, Balamurugan Balusamy, George Ghinea

    Published 2025-05-01
    “…Among these fundamentals, wireless sensor networks (WSNs) are important for maintaining a countenance with their many distributed Sensor Nodes (SNs), which can sense and transmit environmental data wirelessly. …”
    Get full text
    Article
  19. 3979

    The application of blockchain with a comparative approach and its impact on risk, flexibility and internal control evaluation by mohammadsadegh aminipoor, HamidReza GholamniaRoshan, azadeh kiapour, Iman Dadashi

    Published 2024-09-01
    “…The application of blockchain has been expanded in many industries and fields such as banking, logistics, supply chain, real estate, health and... …”
    Get full text
    Article
  20. 3980

    SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges by Nehad Hameed Hussein, Johnny Siaw Paw Koh, Chong Tak Yaw, Sieh Kiong Tiong, Foo Benedict, Talal Yusaf, Kumaran Kadirgama, Tan Chung Hong

    Published 2025-01-01
    “…Vehicular data routing faces many challenges caused by vehicle dynamicity, intermittent connectivity, and diverse application requirements. …”
    Get full text
    Article