Search alternatives:
method algorithm » mould algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
element » elements (Expand Search)
-
141
-
142
Artificial Intelligence for Skin Cancer Detection: Scoping Review
Published 2021“…Hence, to aid in diagnosing skin cancer, artificial intelligence (AI) tools are being used, including shallow and deep machine learning–based methodologies that are trained to detect and classify skin cancer using computer algorithms and deep neural networks.…”
-
143
Blood Glucose Regulation Modelling and Intelligent Control
Published 2024Get full text
doctoralThesis -
144
-
145
MSD-NAS: multi-scale dense neural architecture search for real-time pedestrian lane detection
Published 2023“…<p dir="ltr">Accurate detection of pedestrian lanes is a crucial criterion for vision-impaired people to navigate freely and safely. The current deep learning methods have achieved reasonable accuracy at this task. …”
-
146
-
147
-
148
-
149
DAP: A dataset-agnostic predictor of neural network performance
Published 2024“…This task often must be repeated many times, especially when developing a new deep learning algorithm or performing a neural architecture search. …”
-
150
Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements
Published 2023“…<p dir="ltr">This work proposes an original preconditioner that couples the Constrained Pressure Residual (CPR) method with block preconditioning for the efficient solution of the linearized systems of equations arising from fully implicit multiphase flow models. …”
-
151
A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity
Published 2025“…We examine cutting-edge AI methodologies and principal models across many domains, including machine learning algorithms, deep learning architectures, natural language processing techniques, and anomaly detection algorithms, emphasizing their distinct contributions to enhancing security. …”
-
152
-
153
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …”
Get full text
Get full text
article -
154
-
155
A method for optimizing test bus assignment and sizing for system-on-a-chip
Published 2017“…Test access mechanism (TAM) is an important element of test access architectures for embedded cores and is responsible for on-chip test patterns transport from the source to the core under test to the sink. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
156
Assessment of static pile design methods and non-linear analysis of pile driving
Published 2006“…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
Get full text
Get full text
Get full text
masterThesis -
157
Evolutionary algorithms for state justification in sequential automatic test pattern generation
Published 2005“…A common search operation in sequential Automatic Test Pattern Generation is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …”
Get full text
article -
158
DRL-Based UAV Path Planning for Coverage Hole Avoidance: Energy Consumption and Outage Time Minimization Trade-Offs
Published 2025“…As such, in addition to avoiding coverage holes, we should also make the outage time as small as possible. By deploying a deep reinforcement learning algorithm, we find optimal UAV paths based on the two families of trajectories: spiral and oval curves, to tackle different design considerations and constraints, in terms of QoS, energy consumption and coverage hole avoidance. …”
-
159
A Novel Approach for Detecting Anomalous Energy Consumption Based on Micro-Moments and Deep Neural Networks
Published 2022“…Experimental results on simulated and real datasets collected at two regions, which have extremely different climate conditions, confirm that the proposed deep micro-moment architecture outperforms other machine learning algorithms and can effectively detect anomalous patterns. …”
-
160