Showing 421 - 440 results of 502 for search 'while (shark OR share) algorithm', query time: 0.09s Refine Results
  1. 421

    FedDL: personalized federated deep learning for enhanced detection and classification of diabetic retinopathy by Dasari Bhulakshmi, Dharmendra Singh Rajput

    Published 2024-12-01
    “…Our primary goal is to develop a system that can monitor various medical facilities while ensuring privacy during the training of DL models. …”
    Get full text
    Article
  2. 422

    Artificial intelligence in personalized rehabilitation: current applications and a SWOT analysis by Elpidio Attoh-Mensah, Arnaud Boujut, Arnaud Boujut, Mikaël Desmons, Anaick Perrochon

    Published 2025-07-01
    “…Collaborations with industry can accelerate innovation, while data sharing can promote best practices across institutions. …”
    Get full text
    Article
  3. 423

    Refreshable memristor via dynamic allocation of ferro-ionic phase for neural reuse by Jiangang Chen, Zhixing Wen, Fan Yang, Renji Bian, Qirui Zhang, Er Pan, Yuelei Zeng, Xiao Luo, Qing Liu, Liang-Jian Deng, Fucai Liu

    Published 2025-01-01
    “…Notably, ferroelectric polarization can remain consistent even after undergoing the refresh process, providing a foundation for the shared functionality across multiple tasks. By implementing neural reuse, the classification accuracy of neuromorphic hardware can improve by 17%, while the consumption is reduced by 40%; in multi-task scenarios, its training speed is accelerated by 2200%, while its generalization ability is enhanced by 21%. …”
    Get full text
    Article
  4. 424

    Comprehensive bioinformatics analysis of the common mechanism of atherosclerosis and atrial fibrillation: emphasizing mitochondrial metabolic disorder and immune inflammation by Rui Dai, Xiaotong Lei, Xiaojun Liu, Chen Bian

    Published 2025-06-01
    “…IntroductionAtherosclerosis (AS) and atrial fibrillation (AF) are clinically intertwined cardiovascular disorders, yet their shared pathophysiological mechanisms remain poorly understood. …”
    Get full text
    Article
  5. 425

    THE ROLE OF ARTIFICIAL INTELLIGENCE IN ECONOMIC TRANSFORMATION: FROM AUTOMATION TO THE DATA ECONOMY by Viktoriia Mykytas

    Published 2025-06-01
    “…The paper emphasizes that successful integration of AI into economic systems requires a balanced approach that promotes innovation while safeguarding social cohesion. Governments, businesses, and educational institutions must collaborate to ensure that the benefits of AI are broadly shared and that societies remain adaptable in the face of accelerating technological change. …”
    Get full text
    Article
  6. 426

    The Hydrodynamic Performance of a Vertical-Axis Hydro Turbine with an Airfoil Designed Based on the Outline of a Sailfish by Aiping Wu, Shiming Wang, Chenglin Ding

    Published 2025-06-01
    “…Furthermore, a coaxial dual-rotor vertical axis turbine configuration was developed, integrating centrifugal and axial-flow energy conversion mechanisms through a shared drivetrain system. The centrifugal rotor component harnessed tidal current kinetic energy while the axial-flow rotor module captured wave-induced potential energy. …”
    Get full text
    Article
  7. 427

    Development of time to event prediction models using federated learning by Rasmus Rask Kragh Jørgensen, Jonas Faartoft Jensen, Tarec El-Galaly, Martin Bøgsted, Rasmus Froberg Brøndum, Mikkel Runason Simonsen, Lasse Hjort Jakobsen

    Published 2025-05-01
    “…Conclusion The proposed procedures enable training of time-to-event models using data distributed across sites, without direct sharing of individual-level data and event times, while retaining a predictive performance on par with undistributed approaches.…”
    Get full text
    Article
  8. 428

    Lost in translation: using global fact-checks to measure multilingual misinformation prevalence, spread, and evolution by Dorian Quelle, Calvin Yixiang Cheng, Alexandre Bovet, Scott A. Hale

    Published 2025-03-01
    “…Misinformation changes over time, reducing the effectiveness of static claim matching algorithms. The findings advocate for expanded information sharing between fact-checkers globally while underscoring the importance of localized verification.…”
    Get full text
    Article
  9. 429

    Utility-based optimization of Fujikawa's basket trial design - Pre-specified protocol of a comparison study. by Lukas D Sauer, Alexander Ritz, Meinhard Kieser

    Published 2025-01-01
    “…Many basket trial designs implement borrowing mechanisms. These allow sharing information between similar strata with the goal of increasing power in responsive strata while at the same time constraining type-I error inflation to a bearable threshold. …”
    Get full text
    Article
  10. 430

    Enhancing Last-Mile Logistics: AI-Driven Fleet Optimization, Mixed Reality, and Large Language Model Assistants for Warehouse Operations by Saverio Ieva, Ivano Bilenchi, Filippo Gramegna, Agnese Pinto, Floriano Scioscia, Michele Ruta, Giuseppe Loseto

    Published 2025-04-01
    “…The framework prioritizes the customizability of AI algorithms and real-time information sharing between stakeholders. …”
    Get full text
    Article
  11. 431

    Zero-shot performance analysis of large language models in sumrate maximization. by Ali Abir Shuvro, Md Shahriar Islam Bhuiyan, Faisal Hussain, Md Sakhawat Hossen

    Published 2025-01-01
    “…In the field of Networking, LLMs can also play a major role when it comes to resource optimization and sharing. While Sumrate maximization has been a crucial factor for resource optimization in the networking domain, the optimal or sub-optimal algorithms it requires can be cumbersome to comprehend and implement. …”
    Get full text
    Article
  12. 432

    Network security systems by M. A. Ganzhur, A. I. Bryukhovetsky

    Published 2022-11-01
    “…Some networks are private while others are open to the public. Whether your network is private or public, it must be well secured and secure. …”
    Get full text
    Article
  13. 433

    Short-term scheduling optimization of battery electric buses in the context of sustainable energy resources under uncertainty by Muhammad Ahmad Iqbal, Ismail I. Almaraj

    Published 2025-07-01
    “…The primary goal is to allocate BEB to the best CSs while focusing on increasing overall profit by serving the grid and passenger needs effectively. …”
    Get full text
    Article
  14. 434

    Federated Learning Based on an Internet of Medical Things Framework for a Secure Brain Tumor Diagnostic System: A Capsule Networks Application by Roman Rodriguez-Aguilar, Jose-Antonio Marmolejo-Saucedo, Utku Köse

    Published 2025-07-01
    “…It enables machine learning or deep learning algorithms to establish a client–server relationship, whereby specific parameters are securely shared between models while maintaining the integrity of the learning tasks being executed. …”
    Get full text
    Article
  15. 435

    Identification of diagnostic biomarkers and dissecting immune microenvironment with crosstalk genes in the POAG and COVID-19 nexus by Changfan Peng, Long Hu, Wanwen Su, Xin Hu

    Published 2025-07-01
    “…HDL levels were significantly higher in POAG patients (P = 0.028), while vb001_s1 positivity was negatively associated with POAG (P < 0.001). …”
    Get full text
    Article
  16. 436

    Intelligent collaborative management and control platform for continuous mining equipment in open-pit mines by Zhiyong LEI, Xiaolong MA, Shujun ZHAO, Shiming ZHANG, Bin YAN

    Published 2025-04-01
    “…The platform integrates advanced technologies, including dual-ring network transmission, network security protocols, multi-machine cooperative control, digital twin modeling, and big data analytics, facilitating effective coordination among coal miners, transfer machines, unloaders, and conveyors for seamless continuous mining operations.Three critical technical challenges are addressed: ① The implementation of dual-ring network transmission technology reduces data transmission latency and enhances network stability. ② A secure network transmission framework has been developed to safeguard data confidentiality and integrity. ③ The multi-machine cooperative control system incorporates data acquisition, process control, and 3D visualization modules, employing real-time monitoring and optimized control algorithms to boost mining and transportation efficiency while ensuring the continuity of multi-machine operations. …”
    Get full text
    Article
  17. 437

    Application of collaborative innovation between the logical brain and the associative brain in oil and gas gathering and transportation systems by Jing GONG, Siheng SHEN, Daqian LIU, Qi KANG, Shangfei SONG, Haihao WU, Bohui SHI

    Published 2025-05-01
    “…Traditional simplified analytical methods struggle to cope with dynamic uncertainties, while existing data-driven algorithms are confronted with the dual challenges of lacking interpretability and insufficient robustness. …”
    Get full text
    Article
  18. 438

    Data stewardship and curation practices in AI-based genomics and automated microscopy image analysis for high-throughput screening studies: promoting robust and ethical AI applicat... by Asefa Adimasu Taddese, Assefa Chekole Addis, Bjorn T. Tam

    Published 2025-02-01
    “…Results Our findings indicated that significant research was conducted in 2023 by highlighting the increasing recognition of robust data governance frameworks in AI-driven genomics and microscopy. While 36 articles extensively discussed data interoperability and sharing, AI-model explain ability and data augmentation remained underexplored, indicating significant gaps. …”
    Get full text
    Article
  19. 439

    A New Collision Avoidance Approach for Automated Guided Vehicle Systems Based on Finite State Machines by Mustafa COBAN, Gokhan GELEN

    Published 2024-12-01
    “…In this study, a control strategy is proposed to enforce collision avoidance of automated guided vehicles operating in a shared zone and overlapping route environment. In the proposed method, while finite state machines are used to model the movement of automated guided vehicles in the environment, the Q-learning method, one of the most common reinforcement learning algorithms, is used for collision avoidance. …”
    Get full text
    Article
  20. 440

    Research on Credit Risk Prevention in Supply Chain Finance Driven by Blockchain by Lin Kejing

    Published 2025-01-01
    “…It will also detail the principles and characteristics of blockchain technology, including its decentralized architecture, encryption algorithms, resistance to tampering, smart contract functionalities, and more. …”
    Get full text
    Article