Search alternatives:
processing algorithm » processing algorithms (Expand Search)
testing algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data testing » data using (Expand Search)
processing algorithm » processing algorithms (Expand Search)
testing algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data testing » data using (Expand Search)
-
201
An App for Navigating Patient Transportation and Acute Stroke Care in Northwestern Ontario Using Machine Learning: Retrospective Study
Published 2024“…It was tested using historical data, and the next step will to involve usability testing with end users.…”
-
202
-
203
Large-scale annotation dataset for fetal head biometry in ultrasound images
Published 2023“…Its detailed annotations, broad compatibility, and ethical compliance make it a highly reusable and adaptable tool for the development of algorithms aimed at improving maternal and Fetal health.…”
-
204
An Adapted Load-Balancing implementation for Sharded Blockchains
Published 2024Get full text
Get full text
Get full text
masterThesis -
205
Multi Self-Organizing Map (SOM) Pipeline Architecture for Multi-View Clustering
Published 2024“…A self-organizing map is one of the well-known unsupervised neural network algorithms used for preserving typologies during mapping from the input space (high-dimensional) to the display (low-dimensional).An algorithm called Local Adaptive Receptive Field Dimension Selective Self-Organizing Map 2 is a modified form of a self-organizing Map to cater different data types in the dataset. …”
-
206
-
207
Fast Transient Stability Assessment of Power Systems Using Optimized Temporal Convolutional Networks
Published 2024“…The proposed algorithm unlocks scalability and system adaptability to operational variability by adopting numeric imputation and missing-data-tolerant techniques. …”
-
208
-
209
Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE
Published 2020“…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …”
Get full text
-
210
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. …”
-
211
Energy-aware adaptive compression for mobile devices. (c2009)
Published 2009Get full text
Get full text
masterThesis -
212
Building power consumption datasets: Survey, taxonomy and future directions
Published 2020“…The latter will be very useful for testing and training anomaly detection algorithms, and hence reducing wasted energy. …”
-
213
Multi-Agent Meta Reinforcement Learning for Reliable and Low-Latency Distributed Inference in Resource-Constrained UAV Swarms
Published 2025“…A key requirement in these applications is minimizing the latency of data processing, particularly for time-sensitive tasks like image classification of IIoT device data. …”
-
214
Single channel speech denoising by DDPG reinforcement learning agent
Published 2025“…These masks are then applied to the complex STFT matrix of the noisy speech to obtain the denoised speech. For matched testing data, the proposed system offers an improvement of 1.55 points in the perceptual evaluation of speech quality (PESQ) over the unprocessed speech, the highest among the other recent state-of-the-art models used for comparison in this paper. …”
-
215
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis -
216
-
217
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
-
218
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
Published 2022Get full text
doctoralThesis -
219
Correlation Clustering with Overlaps
Published 2020“…Moreover, we allow the new vertex splitting operation, which allows the resulting clusters to overlap. In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
Get full text
Get full text
Get full text
masterThesis -
220
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
Published 2024“…Within each categorical grouping, we meticulously selected the five most pivotal parameters. This selection process was guided by an importance score, that was derived after assessing its influence on the model's performance in the classification of data pertaining to both awardees and non awardees. …”