Showing 4,081 - 4,100 results of 5,420 for search 'may algorithm', query time: 0.11s Refine Results
  1. 4081
  2. 4082

    School-Based Online Surveillance of Youth: Systematic Search and Content Analysis of Surveillance Company Websites by Alison O'Daffer, Wendy Liu, Cinnamon S Bloss

    Published 2025-07-01
    “…Findings suggest that students who only have school-provided devices are more heavily surveilled and that historically marginalized students may be at a higher risk of being flagged due to algorithmic bias. …”
    Get full text
    Article
  3. 4083

    Tympanosclerosis Presenting as Mass: Workup and Differential by Jonnae Y. Barry, Saranya Reghunathan, Abraham Jacob

    Published 2016-01-01
    “…Various ear pathologies, with different treatment algorithms, may present as clinically similar to one another. …”
    Get full text
    Article
  4. 4084

    Higher-Order Accurate and Conservative Hybrid Numerical Scheme for Relativistic Time-Fractional Vlasov-Maxwell System by Tamour Zubair, Muhammad Usman, Ilyas Khan, Nawaf N. Hamadneh, Tiao Lu, Mulugeta Andualem

    Published 2022-01-01
    “…Still, on the other hand, a significant fact or drawback of most algorithms is that they do not preserve conservation philosophies. …”
    Get full text
    Article
  5. 4085

    Different faces of the stethoscope: history, usefulness, evolution, contamination, and disinfection practices by Dorota Ochońska, Monika Brzychczy-Włoch, Katarzyna Talaga-Ćwiertnia

    Published 2024-11-01
    “…A stethoscope in medical practice, which comes into contact with many patients, poses a high risk of infection transmission and thus may increase the incidence of infection in healthcare facilities. …”
    Get full text
    Article
  6. 4086

    Real-world evidence market: key players and key segments by A. R. Kasimova, A. S. Kolbin

    Published 2022-01-01
    “…Real-world data (RWD) and real-world evidence (RWE) are a valuable resource in the healthcare system. They may be necessary for administrators (to create and improve algorithms for treating patients with various nosologies), physicians (to make a better clinical decision in favor of the patient) and directly to patients and their relatives (to better understand the treatment process). …”
    Get full text
    Article
  7. 4087

    A Comparison of CALPUFF and LAPMOD Against the Project Sagebrush Datasets by Roberto Bellasio, Roberto Bianconi, Paolo Zannetti

    Published 2025-06-01
    “…However, in four simulations carried out under low wind and very stable conditions, the model performances are poor. This may be due to the inability of CALMET to reproduce the vertical wind direction variations in a shallow layer close to the ground, but also to inappropriate turbulence dispersion algorithms in the dispersion models. …”
    Get full text
    Article
  8. 4088

    Toward quantum advantage with photonic state injection by Léo Monbroussou, Eliott Z. Mamon, Hugo Thomas, Verena Yacoub, Ulysse Chabaud, Elham Kashefi

    Published 2025-07-01
    “…Finally, we study a computational subroutine of learning algorithms named probability estimation, and we show that the state injection scheme we propose may offer a potential quantum advantage in a regime that can be more easily achieved than state-of-the-art adaptive techniques. …”
    Get full text
    Article
  9. 4089

    Critical questions for Facebook’s virtual reality: data, power and the metaverse by Ben Egliston, Marcus Carter

    Published 2021-12-01
    “…Through this case, we argue that VR as a data-intensive device is not one of unalloyed benefit, but one fraught with power inequity—one that has the potential to exacerbate wealth inequity, institute algorithmic bias, and bring about new forms of digital exclusion. …”
    Get full text
    Article
  10. 4090

    Analysis of Dynamic Transaction Fee Blockchain Using Queueing Theory by Koki Inami, Tuan Phung-Duc

    Published 2025-03-01
    “…Although several consensus algorithms have been proposed to solve these problems, their performance has not been fully evaluated. …”
    Get full text
    Article
  11. 4091

    Efficient knowledge updating method for inconsistent decision tables by Changchun Li

    Published 2024-12-01
    “…However, inconsistent decision tables (IDTs) may update with new coming objects due to the information collection and update. …”
    Get full text
    Article
  12. 4092

    New insights into methods to measure biological age: a literature review by Aanchal Mathur, Sebastien Taurin, Sfoug Alshammary

    Published 2024-12-01
    “…We discussed some novel biomarkers and algorithms that can capture the dynamic and multidimensional aspects of aging at different levels. …”
    Get full text
    Article
  13. 4093

    Business process mining based insider threat detection system by Tai-ming ZHU, Yuan-bo GUO, An-kang JU, Jun MA

    Published 2016-10-01
    “…Current intrusion detection systems are mostly for detecting external attacks,but sometimes the internal staff may bring greater harm to organizations in information security.Traditional insider threat detection methods of-ten do not combine the behavior of people with business activities,making the threat detection rate to be improved.An insider threat detection system based on business process mining from two aspects was proposed,the implementation of insider threats and the impact of threats on system services.Firstly,the normal control flow model of business ac-tivities and the normal behavior profile of each operator were established by mining the training log.Then,the actual behavior of the operators was compared with the pre-established normal behavior contours during the operation of the system,which was supplemented by control flow anomaly detection and performance anomaly detection of business processes,in order to discover insider threats.A variety of anomalies were defined and the corresponding detection algorithms were given.Experiments were performed on the ProM platform.The results show the designed system is effective.…”
    Get full text
    Article
  14. 4094

    Summoning the digital investor: Fintech apps and the shaping of everyday financial subjectivities by Gordon Kuo Siong Tan

    “…However, users themselves may resist the financial subjectivities promoted by fintech investing, driven by skepticism towards gamified and other algorithmic app features. …”
    Get full text
    Article
  15. 4095

    Optimal Decisions for Prepositioning Emergency Supplies Problem with Type-2 Fuzzy Variables by Xuejie Bai

    Published 2016-01-01
    “…Since the inherent complexity of fuzzy prepositioning problem may be troublesome, the existing methods are no longer effective in dealing with the proposed model directly. …”
    Get full text
    Article
  16. 4096

    The influence of eye model parameter variations on simulated eye-tracking outcomes by Joshua Fischer, David van den Heever, Johan van der Merwe

    Published 2023-10-01
    “… The simulated data used in eye-tracking-related research has been largely generated using normative eye models with little consideration of how the variations in eye biometry found in the population may influence eye-tracking outcomes. This study investigated the influence that variations in eye model parameters have on the ability of simulated data to predict real-world eye-tracking outcomes. …”
    Get full text
    Article
  17. 4097

    An Uncertain Programming Model for Fixed Charge Transportation Problem with After-Sale Service by Kai Zhu, Yue Fan, Jiayu Shen, Yuyi Li, Mingfeng Yin

    Published 2022-01-01
    “…Meanwhile, some indeterministic factors may occur during the transportation process; probability theory is not the best option due to the lack of adequate historical data. …”
    Get full text
    Article
  18. 4098

    The ethics of data interoperability: Mapping problems and strategies in biomedical data and beyond by Asher Brandon Caplan, Colin Koopman

    Published 2025-06-01
    “…However, interoperability poses a number of ethical problems whose contours can prove especially challenging in comparison to how ethical harms take hold at other moments of the data life cycle (such as algorithmic processing or results dissemination). Taking biomedical data interoperability as a focal domain, this article provides an overview of data interoperability, maps the central ethical harms that may challenge interoperability projects, and proposes a response to these problems through an approach rooted in philosophical pragmatism. …”
    Get full text
    Article
  19. 4099

    Statistical dynamics of flowing red blood cells by morphological image processing. by John M Higgins, David T Eddington, Sangeeta N Bhatia, L Mahadevan

    Published 2009-02-01
    “…We analyze these interactions using computational morphological image analysis and machine learning algorithms to quantify the non-equilibrium fluctuations of cellular velocities in a minimal, quasi-two-dimensional microfluidic setting that enables high-resolution spatio-temporal measurements of blood cell flow. …”
    Get full text
    Article
  20. 4100

    Optimal Control of Epidemic Routing in Delay Tolerant Networks with Selfish Behaviors by Shengze Hu, Weidong Bao, Bin Ge, Daquan Tang

    Published 2014-04-01
    “…Most routing algorithms in delay tolerant networks (DTN) need nodes serving as relays for the source to carry and forward message. …”
    Get full text
    Article