Search alternatives:
pattern » patterns (Expand Search)
Showing 941 - 960 results of 2,064 for search 'network evaluation pattern', query time: 0.14s Refine Results
  1. 941
  2. 942
  3. 943

    Not seeing the trees for the forest. The impact of neighbours on graph-based configurations in histopathology by Olga Fourkioti, Matt De Vries, Reed Naidoo, Chris Bakal

    Published 2025-01-01
    “…By incorporating neighboring tiles into the analysis, we examined whether contextual information improves or impairs the network’s ability to identify patterns and features critical for accurate classification. …”
    Get full text
    Article
  4. 944

    Diagnosis of array antennas based on near-field data using Faster R-CNN by Boguang Yang, Yulun Wei, Jixiang Shi, Tao Hong, Liangyu Li, Kai-Da Xu

    Published 2025-06-01
    “…The near-field pattern images of an array are collected, divided into training and test datasets, and then fed into the Faster R-CNN to learn the inverse operator of the EFIE formula. …”
    Get full text
    Article
  5. 945

    Examining the Impact of Content Features on Customer Engagement in Social Media: A Data Mining Approach on Instagram by Azade Shekari, Mohammad Mehdi Poursaeed, Saeed Dehyadegari

    Published 2025-03-01
    “…Methodology Considering the huge amount of content produced on social networks, one of the best methods to analyze and identify patterns in these networks is data mining techniques. …”
    Get full text
    Article
  6. 946

    A Novel Framework for Saraiki Script Recognition Using Advanced Machine Learning Models (YOLOv8 and CNN) by Hafiz Muhammad Raza Ur Rehman, Syed Arfan Haider, Hiba Faisal, Kook-Yeol Yoo, M. Z. Jhandir, Gyu Sang Choi

    Published 2025-01-01
    “…The study used Convolutional Neural Networks (CNNs) in conjunction with YOLOv8 models to address the problems of recognizing Saraiki alphabets’ primary and secondary components. …”
    Get full text
    Article
  7. 947

    Iterative Assessment of Edge Criticality: Efficiency Enhancement or Hidden Insufficiency Detection by Vasily Lubashevskiy, Hamza Ejjbiri, Ihor Lubashevsky

    Published 2025-01-01
    “…Two main approaches are commonly used to rank edges based on their importance for maintaining network connectivity. The first is the Static approach, which relies on a single evaluation of topological features. …”
    Get full text
    Article
  8. 948

    Enhancing prediction of crop yield and soil health assessment for sustainable agriculture using machine learning approach by Kapil Netaji Vhatkar, Shweta Ashish Koparde, Sonali Kothari, Jayesh Sarwade, Kishor Sakur

    Published 2025-06-01
    “…Back-propagation Neural Network (BPNN) is an SL algorithm applied for predicting complex patterns, especially in crop yield and soil health assessments. …”
    Get full text
    Article
  9. 949

    Integrated solar electrification and community empowerment in a burkina faso Village: A feasibility and design study by Bertrand Sawadogo, Amel Benmouna, Mohamed Becherif, Shimaa barakat, Mohamed Samy

    Published 2025-09-01
    “…This study combines spatial analysis through geographic information systems to enhance network layout and utilizes comprehensive load profiling to understand household energy demand patterns. …”
    Get full text
    Article
  10. 950

    Urban resilience assessment framework and spatiotemporal dynamics in Hubei, China by Yan Liang, Yingsong Cheng, Fu Ren, Qingyun Du

    Published 2024-12-01
    “…Abstract Building resilient cities has become an emerging risk management strategy, thus it is necessary to make a scientific evaluation on urban resilience. In this study, both the Driving Force-Pressure-State-Impact-Response (DPSIR) framework and the BP neural network are innovatively adopted to construct a comprehensive urban resilience evaluation system. …”
    Get full text
    Article
  11. 951

    SDN-Enabled IoT Security Frameworks—A Review of Existing Challenges by Sandipan Rakeshkumar Mishra, Bharanidharan Shanmugam, Kheng Cher Yeo, Suresh Thennadil

    Published 2025-03-01
    “…This comprehensive systematic review examines the integration of software-defined networking (SDN) with IoT security frameworks, analyzing recent advancements in encryption, authentication, access control techniques, and intrusion detection systems. …”
    Get full text
    Article
  12. 952

    Long-Term, Multivariate Time Series Generation With the Capture of Intervariate Correlations and Variatewise Characteristics by Kasumi Ohno, Kohei Makino, Makoto Miwa, Yutaka Sasaki

    Published 2025-01-01
    “…Since existing TSG methods, particularly Generative Adversarial Networks (GANs)-based methods, focus on modeling long-term time series and capturing intervariate correlations, they often struggle to adequately capture the characteristics of each variate, such as specific patterns of waveforms. …”
    Get full text
    Article
  13. 953

    Data-driven strategies for digital native market segmentation using clustering by Md Ashraf Uddin, Md. Alamin Talukder, Md. Redwan Ahmed, Ansam Khraisat, Ammar Alazab, Md. Manowarul Islam, Sunil Aryal, Ferdaus Anam Jibon

    Published 2024-01-01
    “…Our findings provide actionable insights into business impact and critical patterns driving future marketing growth. In our experiment, we systematically evaluate various clustering techniques, and notably, the Kmeans cluster outperforms others, demonstrating strong segmentation ability in the digital market. …”
    Get full text
    Article
  14. 954

    Human activity-aware coverage path planning for robot-based mosquito control by Ash Yaw Sang Wan, Prabakaran Veerajagadheswar, Mohan Rajesh Elara, Anh Vu Le

    Published 2025-08-01
    “…In response to these challenges, this article proposes a novel human-first approach for complete coverage path planning (HFA-CCPP) that leverages the Glasius Bio-inspired Neural Network (GBNN) to cover areas that simulate and consider human activity patterns systematically. …”
    Get full text
    Article
  15. 955

    Modeling the Impact of Public Transportation and Mitigation Strategies in COVID-19 Spread in Mexico City by Fernando Reyes-Gomez, Emmanuel Torres-Marin, Maria Elena Larraga, Luis Alvarez-Icaza, Roman A. Mora-Gutierrez

    Published 2025-01-01
    “…Furthermore, the model incorporates several key time-varying parameters such as district population, commuting patterns, and contact matrices for different settings. …”
    Get full text
    Article
  16. 956

    Identification of hub genes in myocardial infarction by bioinformatics and machine learning: insights into inflammation and immune regulation by Juan Yang, Xiang Li, Li Ma, Jun Zhang

    Published 2025-06-01
    “…The CIBERSORT algorithm was utilized to evaluate immune cell infiltration patterns. Finally, potential therapeutic targets were explored through drug-gene interaction analysis using the DGIdb database.ResultsAfter correcting for batch effects across datasets, we identified 687 differentially expressed genes (DEGs), including 405 upregulated and 282 downregulated genes. …”
    Get full text
    Article
  17. 957
  18. 958

    Safeguarding against Cyber Threats: Machine Learning-Based Approaches for Real-Time Fraud Detection and Prevention by Vikas R. Shetty, Pooja R., Rashmi Laxmikant Malghan

    Published 2023-12-01
    “…In addition, deep learning techniques and artificial neural networks (ANN) are used to detect complex fraud patterns, while logistic regression is used to model the probability of fraudulent events. …”
    Get full text
    Article
  19. 959

    A Sparse Pooling Adversarial Learning Framework for Anomaly Event Detection by ZHANG, M., HU, H., LI, Z.

    Published 2025-06-01
    “…The test results demonstrate that the proposed method can effectively learn action patterns and accurately detect abnormal events in community scenarios.…”
    Get full text
    Article
  20. 960

    BGNER: A boundary guidance framework for enhanced named entity recognition by Yu He, Li Sun, Qianyu Yue, Haitao Wu, Xiaojuan Wang

    Published 2025-06-01
    “…We design a novel neural architecture to exploit this representation: a boundary-aware global pointer module efficiently scores spans by incorporating boundary context, and an entity-guided 3D convolutional neural network captures local patterns between spans and their boundaries. …”
    Get full text
    Article