Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
Showing 201 - 220 results of 619 for search '(((( data processing algorithm ) OR ( designed using algorithm ))) OR ( element data algorithm ))*', query time: 0.14s Refine Results
  1. 201

    Artificial intelligence-based methods for fusion of electronic health records and imaging data by Farida Mohsen (16994682)

    Published 2022
    “…In our analysis, a typical workflow was observed: feeding raw data, fusing different data modalities by applying conventional machine learning (ML) or deep learning (DL) algorithms, and finally, evaluating the multimodal fusion through clinical outcome predictions. …”
  2. 202
  3. 203

    Design of a vibration absorber for harmonically forced damped systems by Issa, Jimmy

    Published 2013
    “…Two different numerical approaches are used in solving the problem; the first is based on the genetic algorithm technique and the second on the downhill simplex method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 204

    Power system output feedback stabilizer design via geneticalgorithms by Abdel-Magid, Y.L.

    Published 1997
    “…The paper demonstrates the use of genetic algorithms to design output feedback power system stabilizers. …”
    Get full text
    Get full text
    article
  5. 205

    A Novel Partitioned Random Forest Method-Based Facial Emotion Recognition by Hanif Heidari (22467148)

    Published 2025
    “…Using three statistical measures Lyapunov exponents (LE), Correlation Dimension (CD), and approximate entropy (AE), we evaluated the performance of machine learning algorithms over different data lengths. …”
  6. 206

    Self-Checking Hardware Design for Montgomery Exponentiation-Based Cryptography by Muhammad Ali Akbar (16875915)

    Published 2024
    “…<p dir="ltr">Montgomery exponentiation is widely used for public-key-based cryptography systems. The current state-of-the-art designs for this algorithm are well-analyzed in terms of hardware overhead but are not investigated for faults caused by physical attacks. …”
  7. 207

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…Its security has been verified formally using Random Oracle Model (ROM), ProVerif2.02 and informally using assumptions and pragmatic illustration. …”
  8. 208

    Humanizing AI in medical training: ethical framework for responsible design by Mohammed Tahri Sqalli (18420840)

    Published 2023
    “…Humanizing AI in medical training is crucial to ensure that the design and deployment of its algorithms align with ethical principles and promote equitable healthcare outcomes for both medical practitioners trainees and patients. …”
  9. 209
  10. 210
  11. 211

    Stochastic management of hybrid AC/DC microgrids considering electric vehicles charging demands by Peng, Wang

    Published 2020
    “…A novel evolving solution based on flower pollination algorithm is also proposed to solve the problem optimally. …”
    Get full text
    Get full text
    Get full text
    article
  12. 212
  13. 213
  14. 214

    Hardware design and VLSI implementation of a byte-wise CRCgenerator chip by Sait, Sadiq M.

    Published 1995
    “…The byte-wise CRC algorithm is translated to hardware and pressed in APHL (VLSI design automation language). …”
    Get full text
    Get full text
    article
  15. 215
  16. 216

    A Data-Driven Decision-Making Framework for Fleet Management in the Government Sector of Dubai by ALGHANEM, HANI SUBHI MOHD

    Published 2024
    “…The proposed framework comprises key elements: Important Decisions derived from interviews with transportation leaders, Knowledge Management enhanced by AI algorithms, Data Mining/Analysis utilizing historical data, the Fleet Management System employing Oracle ERP, and a Data-Driven Decision Support Framework that leans towards the extended framework approach. …”
    Get full text
  17. 217
  18. 218

    KNNOR: An oversampling technique for imbalanced datasets by Ashhadul Islam (16869981)

    Published 2021
    “…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …”
  19. 219

    Machine Learning-Driven Prediction of Corrosion Inhibitor Efficiency: Emerging Algorithms, Challenges, and Future Outlooks by Najam Us Sahar Riyaz (22927843)

    Published 2025
    “…At the same time, virtual sample augmentation and genetic algorithm feature selection elevate sparse data performance, raising k-nearest neighbor models from R<sup>2</sup> = 0.05 to 0.99 in a representative thiophene set. …”
  20. 220