Search alternatives:
coefficiency » efficiency (Expand Search)
efficient » efficiency (Expand Search)
Showing 21 - 40 results of 118 for search 'undermine (coefficiency OR efficient) methods', query time: 0.11s Refine Results
  1. 21

    A competitive-collaborative nonnegative representation method and its application for face recognition in smart campus by Tingting Guo, Ziqi Li, Jun Sun, Yonghong Zhang, Qingfeng Xia, Ke Ren

    Published 2025-07-01
    “…This separation limits the method’s classification effectiveness. Furthermore, the presence of multicollinearity in the nonnegative representation may introduce inaccuracies in classification estimates, further undermining performance. …”
    Get full text
    Article
  2. 22

    Design of an Exam Cheating Detection System Application Based on Machine Learning with the Computer Vision Method by Andra Putra Hendrawan, Esti Wijayanti, Ahmad Abdul Chamid

    Published 2025-07-01
    “…This cheating not only harms honest students but also undermines the integrity of the education system. In today's digital age, various forms of cheating are increasingly difficult to detect using manual proctoring methods. …”
    Get full text
    Article
  3. 23

    An improved hybrid policy optimization method for economic-preference dispatch considering cross time-scales collaboration by Qianli Zhang, Hao Tang, Duanchao Li

    Published 2025-08-01
    “…However, existing DRL methods have a deficiency in reasonably responding to the relatively long time-scale power schedule at the dispatching level, which undermines the cooperativity between the expected schedule and RAPD and also results in the incapability of well-tracking the operation preferences. …”
    Get full text
    Article
  4. 24

    Variable Dose-Constraints Method Based on Multiplicative Dynamical Systems for High-Precision Intensity-Modulated Radiation Therapy Planning by Omar M. Abou Al-Ola, Takeshi Kojima, Ryosei Nakada, Norihisa Obata, Kohei Hayashi, Tetsuya Yoshinaga

    Published 2025-06-01
    “…Specifically, because it is as an iterative process derived from discretization of a linear differential equation system using the additive Euler method, a lower-bound clipping procedure is required to prevent the state variables for both beam coefficients and dose constraints from taking negative values. …”
    Get full text
    Article
  5. 25

    Building consistency in explanations: Harmonizing CNN attributions for satellite-based land cover classification by Timo T. Stomberg, Lennart A. Reißner, Martin G. Schultz, Ribana Roscher

    Published 2025-06-01
    “…However, a key challenge is that different attribution methods often produce different outcomes undermining trust in their results. …”
    Get full text
    Article
  6. 26

    Método de avaliação da suspensão do SMAS no rejuvenescimento facial A method to evaluate the SMAS suspension in facelift by Ithamar Nogueira Stocchero, Gustavo Flosi Stocchero, Guilherme Flosi Stocchero, Alexandre Siqueira Franco Fonseca

    Published 2012-09-01
    “…CONCLUSIONS: The described methodology confirms that the round block SMAS treatment technique is efficient regarding the suspension of the superficial muscular aponeurotic system, with significant reduction of the undermined area, consequently reducing the dead space, and may be a parameter to comparison of different techniques.…”
    Get full text
    Article
  7. 27

    Low Capillary Elastic Flow Model Optimization Using the Lattice Boltzmann Method and Non-Dominated Sorting Genetic Algorithm by Yaqi Hou, Wei Zhang, Jiahua Hu, Feiyu Gao, Xuexue Zong

    Published 2025-02-01
    “…This phenomenon undermines the precise control of heat transfer, mass transfer, and reactions within microchannels and microreactors. …”
    Get full text
    Article
  8. 28

    Human-Centered AI for Migrant Integration Through LLM and RAG Optimization by Dagoberto Castellanos-Nieves, Luis García-Forte

    Published 2024-12-01
    “…We evaluate generative metrics, energy efficiency metrics, and metrics for assessing contextually appropriate and non-discriminatory responses. …”
    Get full text
    Article
  9. 29

    XGBoost-Based Detection of DDoS Attacks in Named Data Networking by Liang Liu, Weiqing Yu, Zhijun Wu, Silin Peng

    Published 2025-05-01
    “…These attacks exploit the inherent data retrieval and caching mechanisms of NDN, leading to severe disruptions in data availability and network efficiency, thereby undermining the overall performance and reliability of the system. …”
    Get full text
    Article
  10. 30

    Stakeholder Consultation Workshop on the Perceived Value of Thermostable Vaccines to Relieve Program Barriers: A Case Study from Côte d’Ivoire by Anna-Lea Kahn, Dijana Spasenoska, Kouadio Daniel Ekra, Soplé Ruth Coulibaly, Kossia Yao, Sié Kabran Kouadio, Aminatou Sar, Joanie Robertson

    Published 2024-12-01
    “…They prioritized barriers undermining coverage and equity in their country and explored the potential impact of CTC on the immunization program in the context of thermostable vaccines. …”
    Get full text
    Article
  11. 31

    Methodology for Automating and Orchestrating Performance Evaluation of Kubernetes Container Network Interfaces by Vedran Dakić, Jasmin Redžepagić, Matej Bašić, Luka Žgrablić

    Published 2024-11-01
    “…Any compromise in network performance can severely affect distributed HPC applications, leading to bottlenecks that undermine the entire system’s efficiency. This paper highlights the critical need for precise and consistent evaluation of Kubernetes Container Network Interfaces (CNIs) to ensure that HPC workloads can operate at their full potential. …”
    Get full text
    Article
  12. 32

    Analisis Visual dan Machine Learning untuk Mengukur Validitas Dokumen Akademik Perpustakaan: Studi pada Data Turnitin by Hesti Ari Wardani, Imam Yuadi

    Published 2025-07-01
    “…Additionally, this research is expected to serve as a foundation for academic policies in strengthening plagiarism detection systems, increasing transparency in evaluation, and promoting the development of more accurate and efficient document validation methods. However, this study has limitations regarding the scope of data used, particularly in terms of study program representation and external factors that may influence Turnitin scores. …”
    Get full text
    Article
  13. 33

    High-precision positioning of robotic systems on programme trajectories using satellite navigation measurements by S. V. Sokolov, A. I. Okhotnikov, D. V. Marshakov, I. V. Reshetnikova

    Published 2024-09-01
    “…Use of satellite navigation in recent years shows that such conditions undermine traditional satellite signal processing methods based on the least squares method or its modifications. …”
    Get full text
    Article
  14. 34

    The Great Disruption: How Machine Intelligence Will Transform the Role of Lawyers in the Delivery of Legal Services by J. O. Mcginnis, R. G. Pearce

    Published 2019-06-01
    “…Objective: to analyze the influence of machine intelligence on legal practice and services.Methods: dialectical approach to cognition of social phenomena, allowing to analyze them in the historical development and functioning in the context of a set of objective and subjective factors, which determined the choice of the following research methods: formal-logical, comparative-legal, state and legal modeling.Results: The market for electronic legal services is at a relatively early, yet significant, stage in terms of the disruptive effect of machine intelligence in undermining lawyers' monopoly. …”
    Get full text
    Article
  15. 35

    High-quality development and rural revitalization: the role of rural e-commerce by Qi You, Zihao Yuan, Xiao-She Yu

    Published 2025-07-01
    “…This study explores how high-quality development (HQD), a strategic priority aimed at sustainable and efficient growth, impacts RR, with a focus on the mediating role of rural e-commerce (RE).MethodsUsing Chinese provincial panel data from 2011 to 2021, this study applies a panel quantile regression model to capture the nonlinear relationship between HQD, RE, and RR. …”
    Get full text
    Article
  16. 36

    Comparative review of intelligent structural safety in building seismic risk mitigation utilizing an integrated artificial intelligence controller by Normaisharah Mamat, Rawad Abdulghafor, Sherzod Turaev, Fitri Yakub

    Published 2025-04-01
    “…The fundamental unpredictability and complexity of seismic forces can undermine conventional safety measures, resulting in deficiencies in effectiveness and responses. …”
    Get full text
    Article
  17. 37

    Integrating digital and narrative medicine in modern healthcare: a systematic review by Efthymia Efthymiou

    Published 2025-12-01
    “…The increasing integration of digital technologies in healthcare, such as electronic health records, telemedicine, and diagnostic algorithms, improved efficiency but raised concerns about the depersonalization of care. …”
    Get full text
    Article
  18. 38

    Scaling Up Domestic Resource Mobilization Via Non-Tax Revenues: Is The Government Directive Sustainable? by Adrian Peter Njau, Wilbard Jackson Kombe, Lemayon Lemilia Melyoki

    Published 2024-10-01
    “…It highlights the importance of efficient use of resources for socio-economic development. …”
    Get full text
    Article
  19. 39

    Analytical approach to digital channel performance optimization of mobile money transactions in emerging markets by Adeolu Dairo, Krisztián Szűcs

    Published 2020-07-01
    “…The results indicated that fuzzy c-means clustering and RFM algorithm are efficient for target selection. Also, the mapping of clusters with the appropriate channel of transactions revealed that mobile money users’ transactions could be optimized along the digital channel. …”
    Get full text
    Article
  20. 40

    Mapping stakeholders, services, data, and the information system for adolescent health in the West Bank by Aisha Shalash, Maysaa Nemer, Niveen Abu-Rmeileh, Mohammad Kittaneh, Dervla Kelly, Khalifa Elmusharaf

    Published 2025-05-01
    “…In conflict-affected regions like the West Bank, fragmented service delivery, inconsistent data collection, and lack of coordination between providers undermine the effectiveness of health services. An efficient health information system ensures accurate data collection, stakeholder integration, and evidence-based decision-making. …”
    Get full text
    Article