Suggested Topics within your search.
Suggested Topics within your search.
-
25141
-
25142
Capturing drug use patterns at a glance: An n-ary word sufficient statistic for repeated univariate categorical values.
Published 2023-01-01“…As examples, we provide three algorithms to define primary endpoints from seminal SUD clinical trials.…”
Get full text
Article -
25143
Advanced Computer Vision Techniques for Accurate Measurement in Unmanned Mobile Robots
Published 2024-10-01“…For years, researchers have been studying computer vision, i.e. the ability of artificial intelligence (AI) systems to perceive and interpret visual data like humans. …”
Get full text
Article -
25144
Systematic Literature Review for Detecting Intrusions in Unmanned Aerial Vehicles Using Machine and Deep Learning
Published 2025-01-01“…Detecting these intrusions has recently gained attention in academia and industrial fields for addressing existing threats and developing detection frameworks, such as utilizing machine and deep learning algorithms. Because of its importance in this field, this survey aims to provide a background for researchers interested in detecting malware in drones, discuss recent approaches, depict a taxonomy of constructing approaches, identify existing problems, and explore trends in future work.…”
Get full text
Article -
25145
Pavement performance model for road maintenance and repair planning: a review of predictive techniques
Published 2023-12-01“…Researchers generally agree on their accuracy in estimating pavement condition considering factors like traffic, pavement age, and weather conditions. …”
Get full text
Article -
25146
Parameter Tuning for Local-Search-Based Matheuristic Methods
Published 2017-01-01“…Algorithms that aim to solve optimisation problems by combining heuristics and mathematical programming have attracted researchers’ attention. …”
Get full text
Article -
25147
Facial Recognition Databases: Recent Developments and Review of Methods
Published 2023-12-01“… Facial recognition is one of the most important biometrics that many researchers are increasingly studying, as it is used in various applications such as surveillance, security, law enforcement, information, person identification, smart cards, access control, etc. …”
Get full text
Article -
25148
A survey on PSO based meta-heuristic scheduling mechanism in cloud computing environment
Published 2022-09-01“…To solve those problems many researchers have applied different types of scheduling techniques. …”
Get full text
Article -
25149
Understanding lithium-ion battery management systems in electric vehicles: Environmental and health impacts, comparative study, and future trends: A review
Published 2024-12-01“…This review aims to support researchers and academics by providing a deeper understanding of the environmental and health impact of EVs. …”
Get full text
Article -
25150
Deep learning based adaptive and automatic measurement of palpebral margin in eyelid morphology
Published 2025-04-01“…Abstract Accurate anatomical measurements of the eyelids are essential in periorbital plastic surgery for both disease treatment and procedural planning. Recent researches in eye diseases have adopted deep learning works to measure MRD. …”
Get full text
Article -
25151
General Construction Method and Proof for a Class of Quadratic Chaotic Mappings
Published 2025-07-01“…The importance of chaotic systems as the main pseudo-random cryptographic generator of encryption algorithms in the field of communication secrecy cannot be overstated, but in practical applications, researchers often choose to build upon traditional chaotic maps, such as the logistic map, for study and application. …”
Get full text
Article -
25152
Enhancing cyber threat detection with an improved artificial neural network model
Published 2025-03-01“…Data labeling difficulties, incorrect conclusions, and vulnerability to malicious data injections are only a few drawbacks of using machine learning algorithms for cybersecurity. To overcome these obstacles, researchers have created several network IDS models, such as the Hidden Naive Bayes Multiclass Classifier and supervised/unsupervised machine learning techniques. …”
Get full text
Article -
25153
Single-Pixel Imaging for Partially Occluded Objects
Published 2023-01-01“…In traditional optical imaging system, the lenslet array or the reference beam and special algorithms are usually needed to solve this problem, which increase the complexity of the system. …”
Get full text
Article -
25154
Crack Detection in Civil Infrastructure Using Autonomous Robotic Systems: A Synergistic Review of Platforms, Cognition, and Autonomous Action
Published 2025-07-01“…The aim is to provide a clear roadmap of current progress and future directions, helping researchers and engineers better understand the field and develop smart, deployable systems for infrastructure crack inspection.…”
Get full text
Article -
25155
Player Performance Analysis in Table Tennis Through Human Action Recognition
Published 2024-12-01“…To address these issues, in this paper, we combine the latest computer vision and deep learning algorithms to accurately identify and classify a few table tennis strokes in human action recognition. …”
Get full text
Article -
25156
Analysing learning behaviour: A data-driven approach to improve time management and active listening skills in students
Published 2025-06-01“…After testing multiple ML models with datasets, Random Forest was determined to be the most dependable model by emphasizing algorithms. It demonstrated remarkable durability (0.811012) and accuracy during cross-validation. …”
Get full text
Article -
25157
Migraine triggers, phases, and classification using machine learning models
Published 2025-05-01Get full text
Article -
25158
Soft computing approaches of direct torque control for DFIM Motor's
Published 2025-02-01“…These findings provide valuable insights for researchers and engineers seeking to optimize modern DTC system performance according to the specific needs of their applications.…”
Get full text
Article -
25159
-
25160
Roads Taken, Not Taken and Halted: A Brief Review of the American Regulations Regarding Youth Social Media Use
Published 2025-07-01“…Concern continues to grow over social media design: endless scrolling, personalised algorithms and addictive features increasingly compete for the users’ attention, facilitating the risk of harm. …”
Get full text
Article