Showing 421 - 440 results of 495 for search 'while share algorithm', query time: 0.09s Refine Results
  1. 421

    Lost in translation: using global fact-checks to measure multilingual misinformation prevalence, spread, and evolution by Dorian Quelle, Calvin Yixiang Cheng, Alexandre Bovet, Scott A. Hale

    Published 2025-03-01
    “…Misinformation changes over time, reducing the effectiveness of static claim matching algorithms. The findings advocate for expanded information sharing between fact-checkers globally while underscoring the importance of localized verification.…”
    Get full text
    Article
  2. 422

    Utility-based optimization of Fujikawa's basket trial design - Pre-specified protocol of a comparison study. by Lukas D Sauer, Alexander Ritz, Meinhard Kieser

    Published 2025-01-01
    “…Many basket trial designs implement borrowing mechanisms. These allow sharing information between similar strata with the goal of increasing power in responsive strata while at the same time constraining type-I error inflation to a bearable threshold. …”
    Get full text
    Article
  3. 423

    Enhancing Last-Mile Logistics: AI-Driven Fleet Optimization, Mixed Reality, and Large Language Model Assistants for Warehouse Operations by Saverio Ieva, Ivano Bilenchi, Filippo Gramegna, Agnese Pinto, Floriano Scioscia, Michele Ruta, Giuseppe Loseto

    Published 2025-04-01
    “…The framework prioritizes the customizability of AI algorithms and real-time information sharing between stakeholders. …”
    Get full text
    Article
  4. 424

    Zero-shot performance analysis of large language models in sumrate maximization. by Ali Abir Shuvro, Md Shahriar Islam Bhuiyan, Faisal Hussain, Md Sakhawat Hossen

    Published 2025-01-01
    “…In the field of Networking, LLMs can also play a major role when it comes to resource optimization and sharing. While Sumrate maximization has been a crucial factor for resource optimization in the networking domain, the optimal or sub-optimal algorithms it requires can be cumbersome to comprehend and implement. …”
    Get full text
    Article
  5. 425

    Network security systems by M. A. Ganzhur, A. I. Bryukhovetsky

    Published 2022-11-01
    “…Some networks are private while others are open to the public. Whether your network is private or public, it must be well secured and secure. …”
    Get full text
    Article
  6. 426

    Short-term scheduling optimization of battery electric buses in the context of sustainable energy resources under uncertainty by Muhammad Ahmad Iqbal, Ismail I. Almaraj

    Published 2025-07-01
    “…The primary goal is to allocate BEB to the best CSs while focusing on increasing overall profit by serving the grid and passenger needs effectively. …”
    Get full text
    Article
  7. 427

    Federated Learning Based on an Internet of Medical Things Framework for a Secure Brain Tumor Diagnostic System: A Capsule Networks Application by Roman Rodriguez-Aguilar, Jose-Antonio Marmolejo-Saucedo, Utku Köse

    Published 2025-07-01
    “…It enables machine learning or deep learning algorithms to establish a client–server relationship, whereby specific parameters are securely shared between models while maintaining the integrity of the learning tasks being executed. …”
    Get full text
    Article
  8. 428

    Identification of diagnostic biomarkers and dissecting immune microenvironment with crosstalk genes in the POAG and COVID-19 nexus by Changfan Peng, Long Hu, Wanwen Su, Xin Hu

    Published 2025-07-01
    “…HDL levels were significantly higher in POAG patients (P = 0.028), while vb001_s1 positivity was negatively associated with POAG (P < 0.001). …”
    Get full text
    Article
  9. 429

    Intelligent collaborative management and control platform for continuous mining equipment in open-pit mines by Zhiyong LEI, Xiaolong MA, Shujun ZHAO, Shiming ZHANG, Bin YAN

    Published 2025-04-01
    “…The platform integrates advanced technologies, including dual-ring network transmission, network security protocols, multi-machine cooperative control, digital twin modeling, and big data analytics, facilitating effective coordination among coal miners, transfer machines, unloaders, and conveyors for seamless continuous mining operations.Three critical technical challenges are addressed: ① The implementation of dual-ring network transmission technology reduces data transmission latency and enhances network stability. ② A secure network transmission framework has been developed to safeguard data confidentiality and integrity. ③ The multi-machine cooperative control system incorporates data acquisition, process control, and 3D visualization modules, employing real-time monitoring and optimized control algorithms to boost mining and transportation efficiency while ensuring the continuity of multi-machine operations. …”
    Get full text
    Article
  10. 430

    Application of collaborative innovation between the logical brain and the associative brain in oil and gas gathering and transportation systems by Jing GONG, Siheng SHEN, Daqian LIU, Qi KANG, Shangfei SONG, Haihao WU, Bohui SHI

    Published 2025-05-01
    “…Traditional simplified analytical methods struggle to cope with dynamic uncertainties, while existing data-driven algorithms are confronted with the dual challenges of lacking interpretability and insufficient robustness. …”
    Get full text
    Article
  11. 431

    Data stewardship and curation practices in AI-based genomics and automated microscopy image analysis for high-throughput screening studies: promoting robust and ethical AI applicat... by Asefa Adimasu Taddese, Assefa Chekole Addis, Bjorn T. Tam

    Published 2025-02-01
    “…Results Our findings indicated that significant research was conducted in 2023 by highlighting the increasing recognition of robust data governance frameworks in AI-driven genomics and microscopy. While 36 articles extensively discussed data interoperability and sharing, AI-model explain ability and data augmentation remained underexplored, indicating significant gaps. …”
    Get full text
    Article
  12. 432

    A New Collision Avoidance Approach for Automated Guided Vehicle Systems Based on Finite State Machines by Mustafa COBAN, Gokhan GELEN

    Published 2024-12-01
    “…In this study, a control strategy is proposed to enforce collision avoidance of automated guided vehicles operating in a shared zone and overlapping route environment. In the proposed method, while finite state machines are used to model the movement of automated guided vehicles in the environment, the Q-learning method, one of the most common reinforcement learning algorithms, is used for collision avoidance. …”
    Get full text
    Article
  13. 433

    Research on Credit Risk Prevention in Supply Chain Finance Driven by Blockchain by Lin Kejing

    Published 2025-01-01
    “…It will also detail the principles and characteristics of blockchain technology, including its decentralized architecture, encryption algorithms, resistance to tampering, smart contract functionalities, and more. …”
    Get full text
    Article
  14. 434

    Regulating neural data processing in the age of BCIs: Ethical concerns and legal approaches by Hong Yang, Li Jiang

    Published 2025-03-01
    “…Brain–computer interfaces (BCIs) have seen increasingly fast growth under the help from AI, algorithms, and cloud computing. While providing great benefits for both medical and educational purposes, BCIs involve processing of neural data which are uniquely sensitive due to their most intimate nature, posing unique risks and ethical concerns especially related to privacy and safe control of our neural data. …”
    Get full text
    Article
  15. 435
  16. 436

    Doing What Is Right: Role of Social Media Users in Resilience to Disinformation by Karolína Bieliková, Alena Pospíšil Macková, Martina Novotná

    Published 2025-05-01
    “…However, the ones correcting often face frustration and demotivation due to hostile interactions and a lack of visible impact, while the ones sharing remain persistent. Strategies are influenced by the perceptions of the individuals and the type of disinformation. …”
    Get full text
    Article
  17. 437

    GAB-YOLO: a lightweight deep learning model for real-time detection of abnormal behaviors in juvenile greater amberjack fish by Mingxin Liu, Mingxin Liu, Chun Zhang, Cong Lin, Cong Lin

    Published 2025-05-01
    “…Additionally, the PMSRNet module is integrated into the backbone network to replace C2f, improving the model’s feature extraction capabilities through multi-scale feature fusion and enhanced spatial information capture, which aids in the accurate localization of the fish target.Furthermore, by incorporating shared decoupled heads for classification and regression features, alongside GroupConv and DBB(Diverse Branch Block) modules in the detection head, we significantly reduce the model’s parameter count while simultaneously improving its accuracy and robustness. …”
    Get full text
    Article
  18. 438

    5G OFDM channel estimation method based on complex-valued generative adversarial network by LU Yuanzhi, WEI Xianglin, YU Long, YAO Changhua

    Published 2024-03-01
    “…Channel estimation methods based on least square (LS) and minimum mean square error (MMSE) effectively utilize the system’s sparsity, but LS algorithms face low computational precision, while MMSE algorithms suffer from high computational complexity. …”
    Get full text
    Article
  19. 439

    Identifying Common Diagnostic Biomarkers and Therapeutic Targets between COPD and Sepsis: A Bioinformatics and Machine Learning Approach by Li X, Xiao Y, Yang M, Zhang X, Yuan Z, Zhang Z, Zhang H, Liu L, Zhao M

    Published 2025-05-01
    “…Functional enrichment analyses were conducted to explore the biological roles of these genes. LASSO and SVM-RFE algorithms identified shared diagnostic genes, which were evaluated using receiver operating characteristic (ROC) curves. …”
    Get full text
    Article
  20. 440

    B-UMCS: Blockchain-enabled Unified Medical Consultancy Service. by Albatoul Almohana, Iman Almomani, Walid El-Shafai

    Published 2024-01-01
    “…Therefore, this paper introduces a pioneering Blockchain-based Unified Medical Consultancy Service (B-UMCS) that leverages blockchain's robustness to revolutionize telehealth services by (a) alleviating the shortage of medical expertise through facilitating the interconnection of physicians from diverse hospitals and geographical areas onto a consolidated platform, (b) promoting the seamless sharing of medical consultations, electronic health records (EHRs), and expert insights while upholding rigorous security and privacy protocols, (c) integrating the inherent security mechanisms of blockchain with the distributed data storage functionality offered by the Interplanetary File System (IPFS). …”
    Get full text
    Article