We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. DNA codes over \(GR(2^{3},d)[X]/\langle X^{2},2X \rangle\)

    The main results of this paper are in two directions. First, the family of finite local rings of length 4 whose annihilator of their maximal ideals...

    C. Álvarez-García, C. A. Castillo-Guillén, Mohamed Badaoui in Applicable Algebra in Engineering, Communication and Computing
    Article 13 July 2024
  2. Multi-channel anomaly detection using graphical models

    Anomaly detection in multivariate time-series data is critical for monitoring asset conditions, enabling prompt fault detection and diagnosis to...

    Bernadin Namoano, Christina Latsou, John Ahmet Erkoyuncu in Journal of Intelligent Manufacturing
    Article Open access 13 July 2024
  3. Distributed neuro-fuzzy routing for energy-efficient IoT smart city applications in WSN

    Wireless sensor networks (WSNs) enable seamless data gathering and communication, facilitating efficient and real-time decision-making in IoT...

    S. Jeevanantham, C. Venkatesan, B. Rebekka in Telecommunication Systems
    Article 13 July 2024
  4. MDGCL: Graph Contrastive Learning Framework with Multiple Graph Diffusion Methods

    In recent years, some classical graph contrastive learning(GCL) frameworks have been proposed to address the problem of sparse labeling of graph data...

    Yuqiang Li, Yi Zhang, Chun Liu in Neural Processing Letters
    Article Open access 13 July 2024
  5. Net versus relative impacts in public policy automation: a conjoint analysis of attitudes of Black Americans

    The use of algorithms and automated systems, especially those leveraging artificial intelligence (AI), has been exploding in the public sector, but...

    Ryan Kennedy, Amanda Austin, ... Peter Salib in AI & SOCIETY
    Article Open access 13 July 2024
  6. Parameters optimization and precision enhancement of Takagi–Sugeno fuzzy neural network

    Takagi–Sugeno fuzzy neural network (TSFNN) has been widely used in intelligent prediction. The prediction accuracy of TSFNN is impacted by its model...

    Dewen Qiao, Pengzhan Zhou, ... Songtao Guo in Soft Computing
    Article 13 July 2024
  7. Needle tracking in low-resolution ultrasound volumes using deep learning

    Purpose

    Clinical needle insertion into tissue, commonly assisted by 2D ultrasound imaging for real-time navigation, faces the challenge of precise...

    Sarah Grube, Sarah Latus, ... Alexander Schlaefer in International Journal of Computer Assisted Radiology and Surgery
    Article Open access 13 July 2024
  8. A novel fusion feature imageization with improved extreme learning machine for network anomaly detection

    As the complexity and quantity of network data continue to increase, accurate and efficient anomaly detection methods become critical. Deep...

    Geying Yang, **yu Wu, ... Jie Fu in Applied Intelligence
    Article 13 July 2024
  9. Enhancing weld line visibility prediction in injection molding using physics-informed neural networks

    This study introduces a novel approach using Physics-Informed Neural Networks (PINN) to predict weld line visibility in injection-molded components...

    Andrea Pieressa, Giacomo Baruffa, ... Giovanni Lucchetta in Journal of Intelligent Manufacturing
    Article Open access 13 July 2024
  10. Fake and propaganda images detection using automated adaptive gaining sharing knowledge algorithm with DenseNet121

    An additional tool for swaying public opinion on social media is to present recent developments in the creation of natural language. The term “Deep...

    A. Muthukumar, M. Thanga Raj, ... P. Kaleeswari in Journal of Ambient Intelligence and Humanized Computing
    Article 13 July 2024
  11. ASRE-KG&RS: knowledge graph and recommender system for adaptive smart radio environment

    With the rapid advancement of wireless communication technologies, efficient utilization of the spectrum has become more complex and competitive....

    Wenyu Luo, Tianze Yan, ... **a Shao in Signal, Image and Video Processing
    Article 13 July 2024
  12. Subgraph generation applied in GraphSAGE deal with imbalanced node classification

    In graph neural network applications, GraphSAGE applies inductive learning and has been widely applied in important research topics such as node...

    Kai Huang, Chen Chen in Soft Computing
    Article 13 July 2024
  13. When is it acceptable to break the rules? Knowledge representation of moral judgements based on empirical data

    Constraining the actions of AI systems is one promising way to ensure that these systems behave in a way that is morally acceptable to humans. But...

    Edmond Awad, Sydney Levine, ... Max Kleiman-Weiner in Autonomous Agents and Multi-Agent Systems
    Article Open access 13 July 2024
  14. VLSI realization of hybrid fast fourier transform using reconfigurable booth multiplier

    A discrete fourier transform (DFT) of a series of samples may be quickly and efficiently computed with the use of a mathematical procedure known as...

    A. V. S. S. Varma, Kasiprasad Manepalli in International Journal of Information Technology
    Article 13 July 2024
  15. 3D mobile regression vision transformer for collateral imaging in acute ischemic stroke

    Purpose

    The accurate and timely assessment of the collateral perfusion status is crucial in the diagnosis and treatment of patients with acute...

    Sumin Jung, Hyun Yang, ... ** Tae Kwak in International Journal of Computer Assisted Radiology and Surgery
    Article Open access 13 July 2024
  16. Deep reinforcement learning based mapless navigation for industrial AMRs: advancements in generalization via potential risk state augmentation

    This article introduces a novel Deep Reinforcement Learning (DRL)-based approach for mapless navigation in Industrial Autonomous Mobile Robots,...

    Degang Xu, Peng Chen, ... Guanzheng Tan in Applied Intelligence
    Article 13 July 2024
  17. A Review of Anonymization Algorithms and Methods in Big Data

    In the era of big data, with the increase in volume and complexity of data, the main challenge is how to use big data while preserving the privacy of...

    Elham Shamsinejad, Touraj Banirostam, ... Amir Masoud Rahmani in Annals of Data Science
    Article 13 July 2024
  18. Analyzing processing time and load factor: 5-node mix network with ElGamal encryption and XOR shuffling

    To provide anonymous communication, this paper proposes the implementation of a 5-node mix network using ElGamal encryption and XOR Shuffling. An...

    Fayaz Ahmad Naikoo, Khaleel Ahmad, Khairol Amali Bin Ahmad in International Journal of Information Technology
    Article 13 July 2024
  19. Detection of pulmonary nodules in chest radiographs: novel cost function for effective network training with purely synthesized datasets

    Purpose

    Many large radiographic datasets of lung nodules are available, but the small and hard-to-detect nodules are rarely validated by computed...

    Shouhei Hanaoka, Yukihiro Nomura, ... Osamu Abe in International Journal of Computer Assisted Radiology and Surgery
    Article Open access 13 July 2024
  20. DQMMBSC: design of an augmented deep Q-learning model for mining optimisation in IIoT via hybrid-bioinspired blockchain shards and contextual consensus

    Single-chained blockchains are highly secure but cannot be scaled to larger IIoT (Internet of Industrial Things) network scenarios due to storage...

    Manisha Gokuldas Gedam, Swapnili Karmore in International Journal of Data Science and Analytics
    Article 13 July 2024
Did you find what you were looking for? Share feedback.