Search alternatives:
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
movement using » management using (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
movement using » management using (Expand Search)
-
41
DRL-Based IRS-Assisted Secure Hybrid Visible Light and mmWave Communications
Published 2024“…To address this complexity optimally, we propose a deep reinforcement learning (DRL) approach based on the deep deterministic policy gradient (DDPG) technique. The DDPG algorithm can adapt to channel variations due to user movement and high-dimensional factors. …”
-
42
Automated skills assessment in open surgery: A scoping review
Published 2025“…The assessment input for the automation algorithms were predominantly hand movement. Around 37.5 % (<i>n </i>= 15) of the studies assessed algorithm performance using classification accuracy. …”
-
43
An Intelligent and Low-Cost Eye-Tracking System for Motorized Wheelchair Control
Published 2020“…The first three techniques were automatic, employ correlation, and were variants of template matching, whereas the last one uses convolutional neural networks (CNNs). Different metrics to quantitatively evaluate the performance of each algorithm in terms of accuracy and latency were computed and overall comparison is presented. …”
-
44
-
45
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
Published 2013Get full text
doctoralThesis -
46
Towards Scalable Process Mining Pipelines
Published 2023“…Contributions have covered the spectrum of better algorithms, richer comparison metrics, and movement towards online analysis for process data. …”
Get full text
Get full text
Get full text
-
47
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
Published 2023“…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
-
48
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
-
49
A hybrid approach for XML similarity
Published 2007“…Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
50
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …”
Get full text
Get full text
Get full text
Get full text
article -
51
On the complexity of multi-parameterized cluster editing
Published 2017“…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
Get full text
Get full text
Get full text
Get full text
article -
52
-
53
-
54
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Fifth, it is also observed that the actuation and sensing position plays a crucial role in receiving the time-domain data with a sufficient SNR and the one that is easy to analyze and interpret. …”
Get full text
-
55
Generation and Detection of Sign Language Deepfakes - A Linguistic and Visual Analysis
Published 2025“…Visual analysis demonstrates that convincingly realistic deepfakes can be produced, even for new subjects. Using a pose/style transfer model, we pay close attention to detail, ensuring hand movements are accurate and align with the driving video. …”
Get full text
article -
56
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
Published 2017Get full text
doctoralThesis -
57
Artificial Intelligence for Assessing the Correlation Between Sleep Apnoea and Comorbidities
Published 2022Get full text
doctoralThesis