Search alternatives:
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
system models » system modeling (Expand Search)
Showing 961 - 979 results of 979 for search '(((( data using algorithm ) OR ( system models algorithm ))) OR ( elements method algorithm ))', query time: 0.14s Refine Results
  1. 961
  2. 962

    Reconstruction and simulation of neocortical microcircuitry by Khazen, Georges

    Published 2015
    “…We present a first-draft digital reconstruction of the microcircuitry of somatosensory cortex of juvenile rat. The reconstruction uses cellular and synaptic organizing principles to algorithmically reconstruct detailed anatomy and physiology from sparse experimental data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  3. 963

    Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review by Yazeed Yasin Ghadi (16667109)

    Published 2024
    “…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …”
  4. 964

    Industrial Internet of Things enabled technologies, challenges, and future directions by Shams Forruque, Ahmed

    Published 2023
    “…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …”
    Get full text
    Get full text
    Get full text
    article
  5. 965

    Scatter search technique for exam timetabling by Mansour, Nashat

    Published 2011
    “…We evaluate our suggested technique on real-world university data and compare our results with the registrar’s manual timetable in addition to the timetables of other heuristic optimization algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  6. 966
  7. 967

    Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning by Mohamed Massaoudi (16888710)

    Published 2025
    “…This article provides an updated review of the cutting-edge machine learning and data-driven techniques used for PGP in networked PSs. …”
  8. 968

    Industrial Internet of Things enabled technologies, challenges, and future directions by Shams Forruque Ahmed (16517712)

    Published 2023
    “…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …”
  9. 969
  10. 970

    A systematic review of recent advances in the application of machine learning in membrane-based gas separation technologies by Farideh Abdollahi (22303153)

    Published 2024
    “…Study selection, quality assessment, and data extraction were performed independently by four authors. …”
  11. 971

    Precision nutrition: A systematic literature review by Daniel Kirk (17302798)

    Published 2021
    “…Therefore, we carried out a Systematic Literature Review (SLR) to provide an overview of where and how machine learning has been used in Precision Nutrition from various aspects, what such machine learning models use as input features, what the availability status of the data used in the literature is, and how the models are evaluated. …”
  12. 972

    Machine learning for predicting outcomes of transcatheter aortic valve implantation: A systematic review by Ruba, Sulaiman

    Published 2025
    “…MethodsPreferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guideline was adapted for searching the PubMed and Scopus databases on ML use in TAVI outcomes prediction. Once the studies that meet the inclusion criteria were identified, data from these studies were retrieved and were further examined. 17 parameters relevant to TAVI outcomes were carefully identified for assessing the quality of the included studies. …”
    Get full text
    Get full text
    Get full text
    article
  13. 973
  14. 974

    Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR) by Elaine Beller (44602)

    Published 2018
    “…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …”
  15. 975

    Machine learning for predicting outcomes of transcatheter aortic valve implantation: A systematic review by Ruba Sulaiman (17734065)

    Published 2025
    “…</p><h3>Methods</h3><p dir="ltr">Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guideline was adapted for searching the PubMed and Scopus databases on ML use in TAVI outcomes prediction. Once the studies that meet the inclusion criteria were identified, data from these studies were retrieved and were further examined. 17 parameters relevant to TAVI outcomes were carefully identified for assessing the quality of the included studies. …”
  16. 976
  17. 977
  18. 978

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The primary goal of this research is to develop a robust and efficient chaos-based hash function that addresses the requirements of cryptographic systems. By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. …”
  19. 979

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. The evaluation results of the proposed solution were compared to the results of standard solutions under different cyberattack scenarios using quantitative research methods involving computing simulations, emulation experiments, and analytical modeling. …”
    Get full text