Search alternatives:
using algorithm » cosine algorithm (Expand Search)
c5 algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
levels using » cells using (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
using algorithm » cosine algorithm (Expand Search)
c5 algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
levels using » cells using (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
-
321
Effective dispatch strategies assortment according to the effect of the operation for an islanded hybrid microgrid
Published 2022“…In HOMER software, all the possible dispatch algorithms were analyzed, and the power system responses and reliability study were carried out using DIgSILENT PowerFactory. …”
-
322
Reliability of artificial intelligence in predicting total knee arthroplasty component sizes: a systematic review
Published 2023“…</p><h3>Conclusion</h3><p dir="ltr">This study demonstrated the potential of AI as a valuable complement for planning TKA, exhibiting a satisfactory level of reliability in predicting TKA implant sizes. …”
-
323
Diagnostic performance of artificial intelligence in detecting and subtyping pediatric medulloblastoma from histopathological images: A systematic review
Published 2025“…Models analyzing images at the architectural level yielded higher accuracy (94.7 %), sensitivity (94.1 %), and specificity (98.2 %) compared to cellular-level analysis. …”
-
324
An App for Navigating Patient Transportation and Acute Stroke Care in Northwestern Ontario Using Machine Learning: Retrospective Study
Published 2024“…We aimed to develop an app using a comprehensive geomapping navigation and estimation system based on machine learning algorithms. This app uses key stroke-related timelines including the last time the patient was known to be well, patient location, treatment options, and imaging availability at different health care facilities.…”
-
325
Scrambled Prime Key Encryption
Published 2018“…To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
326
CAD TOOL FOR THE AUTOMATIC-GENERATION OF MICROPROGRAMS
Published 2020“…Abstract A methodology for automatic synthesis of microprograms for digital systems modeled in the UAHPL register-transfer-level language is described. The algorithms used in the process of translation from UAHPL description to microprograms are also discussed. …”
Get full text
article -
327
An intelligent EPROM silicon compiler
Published 1991“…A knowledge-based kernel determines the chip architecture and required circuit blocks and calls appropriate module generators for each block. Routing algorithms are then used to connect these blocks into a full chip…”
Get full text
Get full text
article -
328
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
Published 2024“…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …”
-
329
Towards Multimedia Fragmentation
Published 2006Get full text
Get full text
Get full text
Get full text
conferenceObject -
330
Data Redundancy Management in Connected Environments
Published 2020“…To address these limitations, we propose a framework for data redundancy management at the device level, denoted DRMF. We describe its modules, and clustering-based algorithms. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
331
Triage decisions for ICU admission
Published 2016“…The team made recommendations and concluded that triage should be led by intensivists considering input from nurses, emergency medicine professionals, hospitalists, surgeons, and allied professionals. Triage algorithms and protocols can be useful but can never supplant the role of skilled intensivists basing their decisions on input from multidisciplinary teams. …”
Get full text
Get full text
Get full text
Get full text
article -
332
Data redundancy management for leaf-edges in connected environments
Published 2022“…To address these limitations, we propose here DRMF: Data Redundancy Management for leaF-edges allowing to identify and remove data redundancies in connected environments at the device level. DRMF considers both static and mobile edge devices, and provides two algorithms for temporal and spatio-temporal redundancy detection. …”
Get full text
Get full text
Get full text
Get full text
article -
333
Optimising Nurse–Patient Assignments: The Impact of Machine Learning Model on Care Dynamics—Discursive Paper
Published 2025“…</p><h3>Methods</h3><p dir="ltr">A discursive approach was used to optimise nurse–patient assignments and the impact of ML models. …”