Showing 2,381 - 2,400 results of 25,328 for search 'research algorithm', query time: 0.24s Refine Results
  1. 2381

    Recognition of Augmented Frontal Face Images Using FFT-PCA/SVD Algorithm by Francis Ayiah-Mensah, Louis Asiedu, Felix O. Mettle, Richard Minkah

    Published 2021-01-01
    “…Although there have been numerous researches on face recognition under varying pose, illumination, expression, and image degradations, problems caused by occlusions are mostly ignored. …”
    Get full text
    Article
  2. 2382
  3. 2383

    Taming TikTok: how BIPOC individuals perceive and interact with algorithmically generated content by Jiarun Dai, Naila Hajiyeva, Sehba Wani, Kayla Booth

    Published 2025-03-01
    “…Future research should expand participant diversity and investigate long-term algorithmic trends to promote inclusive digital spaces. …”
    Get full text
    Article
  4. 2384
  5. 2385
  6. 2386
  7. 2387
  8. 2388
  9. 2389
  10. 2390

    Using Deep Learning algorithms to detect the success or failure of the Electroconvulsive Therapy (ECT) sessions by usef faghihi, Cyrus kalantarpour

    Published 2021-04-01
    “…So far, to our knowledge, researchers have used multi-parametric magnetic resonance imaging (MRI) techniques combined with statistical methods and/or linear machine learning algorithms to predict patients’ responses to ECT. …”
    Get full text
    Article
  11. 2391

    How does artificial intelligence shape the productivity and quality of research in business studies? A systematic literature review and future research framework by Sugandha Agarwal, Qian Long Kweh, Dima Jamali, Walton Wider, Syed Far Abid Hossain, Muhammad Ashraf Fauzi

    Published 2025-07-01
    “…We also highlight significant challenges that require attention, including data privacy, intellectual property rights, and algorithmic bias. While we acknowledge limitations related to data usage and the generalizability of our reviews, especially given the rapid evolution of AI technologies, we recommend that researchers effectively integrate AI into their research activities and establish ethical frameworks for its application. …”
    Get full text
    Article
  12. 2392
  13. 2393
  14. 2394
  15. 2395

    Detection of network anomaly based on hybrid intelligence techniques by Shahbaa Khaleel, Karam mahdi saleh

    Published 2012-12-01
    “…As always, the hardest thing with learning Artificial Intelligence systems is to make them learn the right things. This research focuses on finding out how to make an Intrusion Detection Systems environment learn the preferences and work practices of a security officer, In this research hybrid intelligence system is designed and developed for network intrusion detection, where the research was presented four methods for network anomaly detection using clustering technology and dependence on artificial intelligence techniques, which include a Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) to develop and improve the performance of intrusion detection system. …”
    Get full text
    Article
  16. 2396

    Quantum Chosen-Cipher Attack on Camellia by Yanjun Li, Qi Wang, Dingyun Huang, Jian Liu, Huiqin Xie

    Published 2025-04-01
    “…The Feistel structure represents a fundamental architectural component within the domain of symmetric cryptographic algorithms, with a substantial body of research conducted within the context of classical computing environments. …”
    Get full text
    Article
  17. 2397
  18. 2398
  19. 2399
  20. 2400