Search alternatives:
mining algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
defined » designed (Expand Search)
element » elements (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
defined » designed (Expand Search)
element » elements (Expand Search)
-
121
Genetic Fuzzimetric Technique (GFT)
Published 2012“…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
122
Common weaving approach in mainstream languages for software security hardening
Published 2013“…Finally, we explore the viability and the relevance of our propositions by applying the defined approach for systematic security hardening to develop case studies.…”
Get full text
Get full text
Get full text
article -
123
Crown Structures for Vertex Cover Kernelization
Published 2007“…Crown structures in a graph are defined and shown to be useful in kernelization algorithms for the classic vertex cover problem. …”
Get full text
Get full text
Get full text
article -
124
A new minimum curvator multi-step method for unconstrained optimization
Published 1998“…In this paper, we carry on with a similar idea and define a rational model with a free parameter. Our derivation of the new algorithm is based on determining some value of the parameter that minimizes the curvature in some chosen metric. …”
Get full text
Get full text
Get full text
conferenceObject -
125
-
126
Data Redundancy Management in Connected Environments
Published 2020“…Connected environments are typically defined as physical infrastructures (e.g., building) equipped with sensors that produce and exchange raw data. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
127
A geographic information system method to generate long term regional solar radiation resource maps: enhancing decision-making
Published 2024“…The regression-kriging algorithm and its variants are used to calibrate satellite data, through interpolation of ground solar radiation data. …”
-
128
-
129
Next-generation energy systems for sustainable smart cities: Roles of transfer learning
Published 2022“…These algorithms might not perform as expected, take much time in training, or do not have enough input data to generalize well. …”
-
130
Control of cardiac alternans by mechanical and electrical feedback
Published 2014“…The coupled model includes the active stress which defines the mechanical properties of the tissue and is utilized in the feedback algorithm as an independent input from the pacing based controller realization in alternans annihilation. …”
Get full text
article -
131
Precision nutrition: A systematic literature review
Published 2021“…Four machine learning tasks are seen in the form of regression, classification, recommendation and clustering, with most of these utilizing a supervised approach. In total, 30 algorithms were used, with 19 appearing more than once. …”
-
132
Computational evluation of protein energy functions
Published 2014“…A protein is characterized by its 3D structure, which defines its biological function. Proteins fold into 3D structures in a way that leads to low-energy state. …”
Get full text
Get full text
Get full text
conferenceObject -
133
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
Published 2023“…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
-
134
THE FUTURE OF MEDICINE, healthcare innovation through precision medicine: policy case study of Qatar
Published 2020“…Consequently, the big data revolution has provided an opportunity to apply artificial intelligence and machine learning algorithms to mine such a vast data set. …”
-
135
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
Get full text
Get full text
Get full text
Get full text
article -
136
Applications of artificial intelligence in emergency and critical care diagnostics: a systematic review and meta-analysis
Published 2024“…<h3>Introduction</h3><p dir="ltr">Artificial intelligence has come to be the highlight in almost all fields of science. It uses various models and algorithms to detect patterns and specific findings to diagnose a disease with utmost accuracy. …”
-
137
A family of minimum curvature variable-methods for unconstrained optimization. (c1998)
Published 1998Get full text
Get full text
masterThesis -
138
Reconstruction and simulation of neocortical microcircuitry
Published 2015“…We present a first-draft digital reconstruction of the microcircuitry of somatosensory cortex of juvenile rat. The reconstruction uses cellular and synaptic organizing principles to algorithmically reconstruct detailed anatomy and physiology from sparse experimental data. …”
Get full text
Get full text
Get full text
Get full text
article -
139
What are artificial intelligence literacy and competency? A comprehensive framework to support them
Published 2024“…We also identify five effective learning experiences to foster abilities and confidences, and suggest five future research directions: prompt engineering, data literacy, algorithmic literacy, self-reflective mindset, and empirical research.…”
Get full text
Get full text
Get full text
article -
140
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
Published 2023“…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …”