Search alternatives:
developing based » developing a (Expand Search), developing 21st (Expand Search)
data detection » data injection (Expand Search)
rd algorithm » _ algorithms (Expand Search)
elements rd » elements _ (Expand Search)
Showing 141 - 160 results of 491 for search '(((( developing based algorithm ) OR ( elements rd algorithm ))) OR ( data detection algorithm ))', query time: 0.13s Refine Results
  1. 141

    Systematic review and meta-analysis of performance of wearable artificial intelligence in detecting and predicting depression by Alaa Abd-Alrazaq (17430900)

    Published 2023
    “…<p dir="ltr">Given the limitations of traditional approaches, wearable artificial intelligence (AI) is one of the technologies that have been exploited to detect or predict depression. The current review aimed at examining the performance of wearable AI in detecting and predicting depression. …”
  2. 142

    Machine Learning-Driven Prediction of Corrosion Inhibitor Efficiency: Emerging Algorithms, Challenges, and Future Outlooks by Najam Us Sahar Riyaz (22927843)

    Published 2025
    “…This work identifies the most reliable machine learning (ML) strategies for forecasting corrosion inhibitor efficiency before synthesis, thereby shortening development cycles and reducing experimental cost. Drawing on more than fifteen harmonized datasets that span pyrimidines, ionic liquids, graphene oxides, and additional compound families, we benchmark traditional algorithms, such as artificial neural networks, support vector machines, k-nearest neighbors, random forests, against advanced graph-based and deep architectures including three-level directed message-passing neural networks, 2D3DMol-CIC, and graph convolutional networks. …”
  3. 143
  4. 144
  5. 145

    Artificial intelligence based anomaly detection of energy consumption in buildings: A review, current trends and new perspectives by Yassine Himeur (14158821)

    Published 2021
    “…If leveraged properly, that data could assist end-users, energy producers and utility companies in detecting anomalous power consumption and understanding the causes of each anomaly. …”
  6. 146

    PILE-UP FREE PARAMETER ESTIMATION AND DIGITAL ONLINE PEAK LOCALIZATION ALGORITHMS FOR GAMMA RAY SPECTROSCOPY by Noras, J.M.

    Published 2020
    “…A number of parameter estimation and digital online peak localisation algorithms are being developed, including a pulse classification technique which uses a simple peak search routine based on the smoothed first derivative method, which gave a percentage error of peak amplitude of less than 0.1. …”
    Get full text
    article
  7. 147
  8. 148

    Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights by Malekloo, Arman

    Published 2021
    “…In the age of the smart city, Internet of Things (IoT), and big data analytics, the complex nature of data-driven civil infrastructures monitoring frameworks has not been fully matured. …”
    Get full text
    article
  9. 149

    Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms by Md Ferdous Wahid (13485799)

    Published 2022
    “…<p dir="ltr">Pressure gradient (PG) in liquid-liquid flow is one of the key components to design an energy-efficient transportation system for wellbores. This study aims to develop five robust machine learning (ML) algorithms and their fusions for a wide range of flow patterns (FP) regimes. …”
  10. 150

    Optimization of PV Cleaning Practices: Comparison Between Performance-Based and Periodic-Based Approaches by Abdulla Alhajeri, Rashed

    Published 2020
    “…It is important to choose the right cleaning strategy (method and frequency) to maximize the electricity production and economic performance of the PV facility. An optimization algorithm was developed and tested for multiple PV panel configurations based in Dubai Water and Electricity Authority’s (DEWA) outdoor test facil ity (OTF) solar lab. …”
    Get full text
    Get full text
  11. 151

    Optimisation of PV Cleaning Practices: Comparison Between Performance Based and Periodic Based Approaches by ALHAJERI, RASHED ABDULLA

    Published 2018
    “…To optimize the cleaning practices, an algorithm was developed by the author based on the literature review and economic analysis, and was run for multiple panels and tilts at the DEWA OTF solar lab in Dubai, UAE. …”
    Get full text
  12. 152

    Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks by Mohammed Almehdhar (22046597)

    Published 2024
    “…We highlight the transition from traditional signature-based to anomaly-based detection methods, emphasizing the significant advantages of AI-driven approaches in identifying novel and sophisticated intrusions. …”
  13. 153
  14. 154
  15. 155
  16. 156

    Data of simulation model for photovoltaic system's maximum power point tracking using sequential Monte Carlo algorithm by Odat, Alhaj-Saleh A.

    Published 2024
    “…The model aims to compare the performance of classical perturb and observe (P&O) algorithm, particle swarm optimization (PSO) algorithm, flower pollination algorithm (FPA), and SMC-based tracking techniques. …”
    Get full text
    Get full text
    Get full text
    article
  17. 157

    Stochastic Programming for Hub Energy Management Considering Uncertainty Using Two-Point Estimate Method and Optimization Algorithm by Ali S. Alghamdi (17541711)

    Published 2023
    “…The standard ARO algorithm is developed to mimic the foraging behavior of rabbits, and in this work, the algorithm’s effectiveness in avoiding premature convergence is improved by using the dystudynamic inertia weight technique. …”
  18. 158

    A localized navigation algorithm for radiation evasion for nuclear facilities: Optimizing the "Radiation Evasion" criterion: Part I by Khasawneh, Mohammad

    Published 2013
    “…When used to navigate based on local radiation information, the algorithm will behave more reliably when accidents happen, since no long-haul communication links are required for information exchange. …”
    Get full text
    article
  19. 159

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…They are sniffing the data traffic or causing service denial. In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. …”
    Get full text
  20. 160