Suggested Topics within your search.
Suggested Topics within your search.
-
22081
-
22082
Thrombocytopenia in patients with melanoma receiving immune checkpoint inhibitor therapy
Published 2017-08-01Get full text
Article -
22083
Beyond the current state of just-in-time adaptive interventions in mental health: a qualitative systematic review
Published 2025-01-01“…To accomplish this, JITAIs often apply complex analytic techniques, such as machine learning or Bayesian algorithms to real- or near-time data acquired from smartphones and other sensors. …”
Get full text
Article -
22084
A comparison of several intrusion detection methods using the NSL-KDD dataset
Published 2024-06-01“… The increasing significance of cybersecurity underscores the critical necessity of addressing evolving methods of hackers. This research investigates the way to classify and predict cyber-attacks on the NSL-KDD dataset using intrusion detection methods the investigation contrasts the capabilities of various algorithms, including RNN, MLP, CNN-LSTM, and ANN, in recognizing attacks. …”
Get full text
Article -
22085
Artificial Intelligence in Social Media
Published 2025-04-01“…In addition, the review discusses ethical concerns, including data privacy, algorithmic bias, and the potential for misinformation dissemination. …”
Get full text
Article -
22086
Assessing Similarity Between Datasets Using Vector Representations
Published 2025-07-01“…The article considers an approach to determining the similarity of datasets for training algorithms using datasets with human faces as an example. …”
Get full text
Article -
22087
-
22088
APPLICATION OF REAL-TIME DICTIONARY INSTEAD OF FULL-TEXT INDEX FOR SEARCHING IN WEB PUBLICATIONS
Published 2019-10-01“…In these cases, full-text indexes are mostly used for the implementation of algorithms for searching in the content of web publications. …”
Get full text
Article -
22089
-
22090
-
22091
A Novel Homogenous Hybridization Scheme for Performance Improvement of Support Vector Machines Regression in Reservoir Characterization
Published 2016-01-01“…Hybrid computational intelligence is defined as a combination of multiple intelligent algorithms such that the resulting model has superior performance to the individual algorithms. …”
Get full text
Article -
22092
Enhancing stock index prediction: A hybrid LSTM-PSO model for improved forecasting accuracy.
Published 2025-01-01“…Comparative analysis with seven other machine learning algorithms confirms the superior performance of PSO-LSTM. …”
Get full text
Article -
22093
Dependable identity recognition and authorization based on visual information
Published 2020-11-01“…Recently,deep learning has been widely applied to video and image based identity recognition and authorization tasks,including face recognition and person identification.However,machine learning models,especially deep learning models,can be easily fooled by adversarial attacks,which may cause the identity recognition systems to make a wrong decision.Therefore,dependable identity recognition and authorization has become one of the hot topics currently.Recent advances on dependable identity recognition and authorization from both information space and physical space were presented,where the development of the attack models on face detection,face recognition,person re-identification,and face anti-spoofing as well as printable adversarial patches were introduced.The algorithms of visual identity anonymization and privacy protection were further discussed.Finally,the datasets,experimental protocols and performance of dependable identity recognition methods were summarized,and the possible directions in the future research were presented.…”
Get full text
Article -
22094
A Method of Kill Chains Fusion Based on Granulated Rules and Matrix Computation
Published 2024-01-01“…Then, the matrix computing formed the algorithmic foundation matrix of kill chains through granulation rules involving intermediate and target transformations. …”
Get full text
Article -
22095
Artificial intelligence in healthcare: A focus on the best practices
Published 2024-01-01Get full text
Article -
22096
Overbounding of Near Real-Time Estimated Ionospheric Gradient Slope in Low-Latitude Regions
Published 2025-03-01“…To solve these issues, previous research has introduced a methodology for real-time detection and estimation of ionospheric gradients using a network of dual-frequency, multi-constellation global navigation satellite system monitoring stations. …”
Get full text
Article -
22097
Interpretability Study on the Fault Diagnosis Model of the Heat pipe/ Vapor Compression Composite Air Conditioning System
Published 2025-01-01“…This study develops a composite fault diagnosis model based on typical machine learning algorithms, compares the diagnostic performance of different models, and finally conducts interpretability research on the diagnostic models using the SHAP method. …”
Get full text
Article -
22098
Clustering Methods Application for Customer Segmentation to Manage Advertisement Campaign
Published 2010-10-01“…Clustering methods are recently so advanced elaborated algorithms for large collection data analysis that they have been already included today to data mining methods. …”
Get full text
Article -
22099
A review of dynamic scene reconstruction based on neural representation
Published 2025-06-01“…Dynamic scene reconstruction holds significant research value in the fields of computer vision and virtual reality. …”
Get full text
Article -
22100
An Efficient Biobjective Heuristic for Scheduling Workflows on Heterogeneous DVS-Enabled Processors
Published 2014-01-01“…In the context of scheduling, there have been increasing research interests on algorithms using dynamic voltage scaling (DVS), which allows processors to operate at lower voltage supply levels at the expense of sacrificing processing speed, to acquire a satisfactory trade-off between quality of schedule and energy consumption. …”
Get full text
Article