Search alternatives:
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
systems using » system using (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
systems using » system using (Expand Search)
-
221
-
222
-
223
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text
-
224
A parallel search tree algorithm for vertex cover on graphical processing units. (c2013)
Published 2013Get full text
Get full text
masterThesis -
225
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
Published 2022“…The initial statistical and convergence profile assessment showed better performance of the proposed algorithm. The comparative analyses for transient and frequency responses were performed for the PID-controlled FES system using the original AOA, sine–cosine and particle swarm optimization algorithms and the traditional Ziegler-Nichols tuning scheme. …”
-
226
Detecting sleep outside the clinic using wearable heart rate devices
Published 2022“…Personalized yet device-agnostic algorithms can sidestep laborious human annotations and objectify cross-cohort comparisons. …”
-
227
-
228
Interpreting patient-Specific risk prediction using contextual decomposition of BiLSTMs: application to children with asthma
Published 2019“…We extend the method to bidirectional LSTMs (BiLSTMs) and use it in the context of predicting future clinical outcomes using patients’ EHR historical visits.…”
-
229
LaScaDa: A Novel Scalable Topology for Data Center Network
Published 2020“…LaScaDa forwards packets between nodes using a new hierarchical row-based routing algorithm. …”
-
230
Performance Modeling of Rooftop PV Systems in Arid Climate, a Case Study for Qatar: Impact of Soiling Losses and Albedo Using PVsyst and SAM
Published 2025“…<p dir="ltr">This study presents a comparative performance modeling and optimization framework for a 5 kWp rooftop photovoltaic (PV) system in Qatar, using two widely adopted simulation tools, PVsyst and the System Advisor Model (SAM). …”
-
231
-
232
Distributed optimal coverage control in multi-agent systems: Known and unknown environments
Published 2024“…<p>This paper introduces a novel approach to solve the coverage optimization problem in multi-agent systems. The proposed technique offers an optimal solution with a lower cost with respect to conventional Voronoi-based techniques by effectively handling the issue of agents remaining stationary in regions void of information using a ranking function. …”
-
233
Digital Image Watermarking Using Balanced Multiwavelets
Published 2006“…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …”
Get full text
article -
234
Tailoring motivational health messages for smoking cessation using an mHealth recommender system integrated with an electronic health record: a study protocol
Published 2018“…Patients’ feedback on the messages and their interactions with the app will be analyzed and evaluated following an observational prospective methodology to a) assess the perceived quality of the mobile-based health recommender system and the messages, using the precision and time-to-read metrics and an 18-item questionnaire delivered to all patients who complete the program, and b) measure patient engagement with the mobile-based health recommender system using aggregated data analytic metrics like session frequency and, to determine the individual-level engagement, the rate of read messages for each user. …”
-
235
Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring
Published 2024“…</p><h3>Conclusion</h3><p dir="ltr">The proposed TTR-GAN can be implemented in wearable devices to obtain reliable real-time cardiovascular data during daily activities.</p><h2>Other Information</h2><p dir="ltr">Published in: Expert Systems with Applications<br>License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.eswa.2024.123167" target="_blank">https://dx.doi.org/10.1016/j.eswa.2024.123167</a></p>…”
-
236
-
237
Energy-aware adaptive compression for mobile devices. (c2009)
Published 2009Get full text
Get full text
masterThesis -
238
An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure
Published 2024“…<p>In this paper, we provide a novel failure-resilient token-based mutual exclusion (ME) algorithm for distributed systems. Like a few other solutions in the literature, the proposed solution leverages a logical tree as its underlying topology. …”
-
239
Portfolio Selection Problem Using CVaR Risk Measures Equipped with DEA, PSO, and ICA Algorithms
Published 2022“…There are different metrics for the calculation of the risk factor, among which the most important one is the Conditional Value at Risk (CVaR). On the other hand, Data Envelopment Analysis (DEA) can be used to form the optimal portfolio and evaluate its efficiency. …”
-
240