Showing 141 - 160 results of 278 for search '(((( data code algorithm ) OR ( deep learning algorithms ))) OR ( element method algorithm ))', query time: 0.13s Refine Results
  1. 141
  2. 142

    Artificial Intelligence for Skin Cancer Detection: Scoping Review by Abdulrahman Takiddin (14153181)

    Published 2021
    “…Hence, to aid in diagnosing skin cancer, artificial intelligence (AI) tools are being used, including shallow and deep machine learning–based methodologies that are trained to detect and classify skin cancer using computer algorithms and deep neural networks.…”
  3. 143
  4. 144
  5. 145

    MSD-NAS: multi-scale dense neural architecture search for real-time pedestrian lane detection by Sui Paul Ang (18460605)

    Published 2023
    “…<p dir="ltr">Accurate detection of pedestrian lanes is a crucial criterion for vision-impaired people to navigate freely and safely. The current deep learning methods have achieved reasonable accuracy at this task. …”
  6. 146
  7. 147
  8. 148
  9. 149

    DAP: A dataset-agnostic predictor of neural network performance by Sui Paul Ang (18460605)

    Published 2024
    “…This task often must be repeated many times, especially when developing a new deep learning algorithm or performing a neural architecture search. …”
  10. 150

    Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements by Stefano Nardean (14151900)

    Published 2023
    “…<p dir="ltr">This work proposes an original preconditioner that couples the Constrained Pressure Residual (CPR) method with block preconditioning for the efficient solution of the linearized systems of equations arising from fully implicit multiphase flow models. …”
  11. 151

    A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity by Abdullah Al Siam (22304047)

    Published 2025
    “…We examine cutting-edge AI methodologies and principal models across many domains, including machine learning algorithms, deep learning architectures, natural language processing techniques, and anomaly detection algorithms, emphasizing their distinct contributions to enhancing security. …”
  12. 152
  13. 153

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …”
    Get full text
    Get full text
    article
  14. 154
  15. 155

    A method for optimizing test bus assignment and sizing for system-on-a-chip by Harmanani, Haidar M.

    Published 2017
    “…Test access mechanism (TAM) is an important element of test access architectures for embedded cores and is responsible for on-chip test patterns transport from the source to the core under test to the sink. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 156

    Assessment of static pile design methods and non-linear analysis of pile driving by Abou-Jaoude, Grace G.

    Published 2006
    “…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  17. 157

    Evolutionary algorithms for state justification in sequential automatic test pattern generation by El-Maleh, Aiman H.

    Published 2005
    “…A common search operation in sequential Automatic Test Pattern Generation is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …”
    Get full text
    article
  18. 158

    DRL-Based UAV Path Planning for Coverage Hole Avoidance: Energy Consumption and Outage Time Minimization Trade-Offs by Bahareh Jafari (22501715)

    Published 2025
    “…As such, in addition to avoiding coverage holes, we should also make the outage time as small as possible. By deploying a deep reinforcement learning algorithm, we find optimal UAV paths based on the two families of trajectories: spiral and oval curves, to tackle different design considerations and constraints, in terms of QoS, energy consumption and coverage hole avoidance. …”
  19. 159

    A Novel Approach for Detecting Anomalous Energy Consumption Based on Micro-Moments and Deep Neural Networks by Yassine Himeur (14158821)

    Published 2022
    “…Experimental results on simulated and real datasets collected at two regions, which have extremely different climate conditions, confirm that the proposed deep micro-moment architecture outperforms other machine learning algorithms and can effectively detect anomalous patterns. …”
  20. 160