Showing 201 - 220 results of 229 for search '(((( element data algorithm ) OR ( complement lasso algorithm ))) OR ( level using algorithm ))', query time: 0.12s Refine Results
  1. 201
  2. 202
  3. 203
  4. 204

    Improving MRI Resolution: A Cycle Consistent Generative Adversarial Network-Based Approach for 3T to 7T Translation by Zakaria Shams Siam (22048001)

    Published 2024
    “…However, the exorbitant expenses associated with 7T MRI scanners hinder their broad use in research and clinical facilities. Efforts are underway to develop algorithms that can generate 7T MRI from 3T MRI to achieve better image quality without the need for 7T MRI machines. …”
  5. 205

    Scrambled Prime Key Encryption by Haraty, Ramzi A.

    Published 2018
    “…To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 206
  7. 207

    Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review by Arfan Ahmed (17541309)

    Published 2022
    “…Wearable devices (WDs) make use of sensors historically reserved for hospital settings. …”
  8. 208

    Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases by Muhammad Ali Muzammil (17910611)

    Published 2024
    “…To guarantee a safe and successful deployment in clinical practice, the use of AI in cardiology must be done with a thorough understanding of the algorithms and their limits. …”
  9. 209

    Peripheral inflammatory and metabolic markers as potential biomarkers in treatment-resistant schizophrenia: Insights from a Qatari Cohort by Mohamed Adil Shah Khoodoruth (14589828)

    Published 2024
    “…Key measurements included complete blood count, lipid panel, HbA1c, and ferritin levels. Our findings indicated elevated body mass index (BMI) and triglyceride (TG) levels in both patient groups compared to controls. …”
  10. 210

    Data Redundancy Management in Connected Environments by Mansour, Elio

    Published 2020
    “…To address these limitations, we propose a framework for data redundancy management at the device level, denoted DRMF. We describe its modules, and clustering-based algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 211

    Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort by Sergio Márquez-Sánchez (19437985)

    Published 2023
    “…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
  12. 212

    Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review by Yazeed Yasin Ghadi (16667109)

    Published 2024
    “…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …”
  13. 213

    Triage decisions for ICU admission by Blanch, Lluis

    Published 2016
    “…The team made recommendations and concluded that triage should be led by intensivists considering input from nurses, emergency medicine professionals, hospitalists, surgeons, and allied professionals. Triage algorithms and protocols can be useful but can never supplant the role of skilled intensivists basing their decisions on input from multidisciplinary teams. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 214

    Data redundancy management for leaf-edges in connected environments by Mansour, Elio

    Published 2022
    “…To address these limitations, we propose here DRMF: Data Redundancy Management for leaF-edges allowing to identify and remove data redundancies in connected environments at the device level. DRMF considers both static and mobile edge devices, and provides two algorithms for temporal and spatio-temporal redundancy detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  15. 215

    Optimising Nurse–Patient Assignments: The Impact of Machine Learning Model on Care Dynamics—Discursive Paper by Mutaz I. Othman (21186827)

    Published 2025
    “…</p><h3>Methods</h3><p dir="ltr">A discursive approach was used to optimise nurse–patient assignments and the impact of ML models. …”
  16. 216

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
    Get full text
  17. 217

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 218

    Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling by Majed Hadid (17148364)

    Published 2022
    “…A Stochastic Discrete Simulation-Based Multi-Objective Optimization (SDSMO) model is developed and linked to clustering algorithms using an iterative sequential approach. The experimental results indicate the positive effect of clustering similar appointments on the performance measures and the computational time. …”
  19. 219

    Design and analysis of efficient and secure elliptic curve cryptoprocessors. by Al-Somani, Turki Faisal

    Published 2006
    “…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …”
    Get full text
    masterThesis
  20. 220