Search alternatives:
making algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data making » data mining (Expand Search)
develop » developed (Expand Search)
element » elements (Expand Search)
making algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data making » data mining (Expand Search)
develop » developed (Expand Search)
element » elements (Expand Search)
-
321
LNCRI: Long Non-Coding RNA Identifier in Multiple Species
Published 2021“…To overcome these challenges we developed LNCRI (Long Non-Coding RNA Identifier), a novel machine learning (ML)-based tool for the identification of lncRNA transcripts. …”
-
322
A reduced model for phase-change problems with radiation using simplified PN approximations
Published 2025“…To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. A Newton-based algorithm is also adopted for solving the nonlinear systems resulting from the considered monolithic approach. …”
Get full text
article -
323
Spatiotemporal Mapping and Monitoring of Mangrove Forests Changes From 1990 to 2019 in the Northern Emirates, UAE Using Random Forest, Kernel Logistic Regression and Naive Bayes Tr...
Published 2020“…The approach was developed based on random forest (RF), Kernel logistic regression (KLR), and Naive Bayes Tree machine learning algorithms which use multitemporal Landsat images. …”
Get full text
article -
324
Low Cost Autopilot Design Using Fuzzy Supervisory Control
Published 2005Get full text
doctoralThesis -
325
Software tool for regression testing. (c1997)
Published 1997Get full text
Get full text
masterThesis -
326
Predicting long-term type 2 diabetes with support vector machine using oral glucose tolerance test
Published 2019“…In this paper, we present an automatic tool that uses machine learning techniques to predict the development of type 2 diabetes mellitus (T2DM). Data generated from an oral glucose tolerance test (OGTT) was used to develop a predictive model based on the support vector machine (SVM). …”
-
327
-
328
COMPUTER AIDED PROGRAMMING EDUCATION (CAPE)
Published 2020“…CAPE consists of problem definition and algorithm construction modules. Algorithm construction module is currently supported with a facility to map an algorithm(s) into FORTRAN or Pascal code. …”
Get full text
article -
329
Recent Advances in Harris Hawks Optimization: A Comparative Study and Applications
Published 2022“…The Harris hawk optimizer is a recent population-based metaheuristics algorithm that simulates the hunting behavior of hawks. …”
Get full text
-
330
Morphology for Planar Hexagonal Modular Self-Reconfigurable Robotic Systems
Published 2009Get full text
doctoralThesis -
331
A Stochastic Newton-Raphson Method with Noisy Function Measurements
Published 2016“…The development of the proposed optimal algorithm is based on minimizing a stochastic performance index. …”
Get full text
Get full text
Get full text
Get full text
article -
332
LDSVM: Leukemia Cancer Classification Using Machine Learning
Published 2022“…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …”
-
333
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
Published 2023“…Moreover, it is faster and requires fewer parameters to train than other CNN based models, making it a good choice for large-scale deployment in clinical settings and a promising tool for automated lung cancer diagnosis from CT scan images.…”
-
334
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …”
Get full text
Get full text
Get full text
article -
335
Assigning proctors to exams using scatter search. (c2006)
Published 2006Get full text
Get full text
masterThesis -
336
-
337
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…<p>The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …”
-
338
Validation of plasma protein glycation and oxidation biomarkers for the diagnosis of autism
Published 2023“…It is currently diagnosed by behaviour-based assessments made by observation and interview. …”
-
339
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
340
Computation of conformal invariants
Published 2020“…The method we use is based on the boundary integral equation method developed and implemented in [1]. …”
Get full text
Get full text
Get full text
article