Search alternatives:
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
system models » system modeling (Expand Search)
Showing 681 - 700 results of 979 for search '(((( data using algorithm ) OR ( system models algorithm ))) OR ( elements method algorithm ))', query time: 0.13s Refine Results
  1. 681

    Wearable Artificial Intelligence for Anxiety and Depression: Scoping Review by Alaa Abd-alrazaq (17058018)

    Published 2023
    “…The most frequently used data set from open sources was Depresjon. The most commonly used algorithm was random forest, followed by support vector machine.…”
  2. 682

    Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review by Arfan Ahmed (17541309)

    Published 2022
    “…WDs coupled with artificial intelligence (AI) algorithms show promise to help understand and conclude meaningful information from the gathered data and provide advanced and clinically meaningful analytics.…”
  3. 683

    Humanizing AI in medical training: ethical framework for responsible design by Mohammed Tahri Sqalli (18420840)

    Published 2023
    “…The transparency pillar highlights the crucial role of maintaining the explainabilty of AI algorithms, while the fairness and justice pillar emphasizes on addressing biases in healthcare data and designing models that prioritize equitable medical training outcomes. …”
  4. 684

    Automated skills assessment in open surgery: A scoping review by Hawa Hamza (17707224)

    Published 2025
    “…In this scoping review, we present the open surgeries and clinical settings where AI-based skill assessment has been applied, the kind of surgical data acquired for the AI-based algorithms, and the types of AI-based models used for automated skills assessment. …”
  5. 685

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review by Yasir Ali (799969)

    Published 2023
    “…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …”
  6. 686

    An optimization approach to increasing sustainability and enhancing resilience against environmental constraints in LNG supply chains: A Qatar case study by Sara Al-Haidous (18095368)

    Published 2022
    “…The developed model, which is implemented using the Binary Particle Swarm Optimization algorithm subjected to economic and environmental objectives within an overarching strategic aim for sustainability and resilience. …”
  7. 687
  8. 688

    Blockchain-Based Decentralized Architecture for Software Version Control by Muhammad Hammad (17541570)

    Published 2023
    “…In this study, we present the BDA-SCV architecture for implementing a version control system in blockchain technology. Our proposed approach would replace the necessity for a centralized system, with a decentralized approach implemented in the blockchain using distributed file storage, for which we will use the InterPlanetary File System (IPFS), which is a distributed file system. …”
  9. 689

    Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings by Ahmad Yaser Alhaddad (7017434)

    Published 2022
    “…Experiments with features showed that acceleration data were the most contributing factor on the prediction compared to gyroscope data and that combined data of raw and extracted features provided a better overall performance. …”
  10. 690

    Diagnostic performance of artificial intelligence in detecting and subtyping pediatric medulloblastoma from histopathological images: A systematic review by Hiba Alzoubi (18001609)

    Published 2025
    “…Two reviewers independently conducted study selection, data extraction, and risk of bias assessment. Results were synthesized narratively. …”
  11. 691

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
  12. 692

    A novel few shot learning derived architecture for long-term HbA1c prediction by Marwa Qaraqe (10135172)

    Published 2024
    “…Short-term CGM time-series data are processed using both novel image transformation approaches, as well as using conventional signal processing methods. …”
  13. 693
  14. 694

    Adaptive temperature control of a reverse flow process by using reinforcement learning approach by A. Binid (22046054)

    Published 2024
    “…It should be mentioned that this approach is not reliant on the internal dynamics of the CFRR system, which is a complex process and is most effectively modeled using Partial Differential Equations (PDEs). …”
  15. 695

    Prediction of Multiple Clinical Complications in Cancer Patients to Ensure Hospital Preparedness and Improved Cancer Care by Regina Padmanabhan (14231606)

    Published 2022
    “…Hence, for predicting three critical clinical complications, such as sepsis, the presence of multidrug-resistant organisms, and mortality, from the data available from medical records, we used 1166 febrile neutropenia episodes reported in 513 patients. …”
  16. 696
  17. 697

    Applications of artificial intelligence in emergency and critical care diagnostics: a systematic review and meta-analysis by Jithin Kalathikudiyil Sreedharan (18268894)

    Published 2024
    “…<h3>Introduction</h3><p dir="ltr">Artificial intelligence has come to be the highlight in almost all fields of science. It uses various models and algorithms to detect patterns and specific findings to diagnose a disease with utmost accuracy. …”
  18. 698
  19. 699
  20. 700

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security by S. Shitharth (12017480)

    Published 2023
    “…Therefore, the proposed work intends to implement a group of novel methodologies for developing an effective Cyborg intelligence security model to secure smart city systems. Here, the Quantized Identical Data Imputation (QIDI) mechanism is implemented at first for data preprocessing and normalization. …”