Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
-
641
-
642
Adaptive Federated Learning Architecture To Mitigate Non-IID Through Multi-Objective GA-Based Efficient Client Selection
Published 2024“…In this paper, we propose a novel approach that incorporates genetic algorithms with an enhanced client selection strategy, utilizing client metadata rather than raw data. …”
Get full text
Get full text
Get full text
masterThesis -
643
Multi-Modal Emotion Aware System Based on Fusion of Speech and Brain Information
Published 2019“…For classifying unimodal data of either speech or EEG, a hybrid fuzzy c-means-genetic algorithm-neural network model is proposed, where its fitness function finds the optimal fuzzy cluster number reducing the classification error. …”
Get full text
Get full text
-
644
A Biologicaly Inspired Decision Model for Multivariable Genetic- Fuzzy-AHP System
Published 2016“…This paper describes a hybridized intelligent algorithm as a tuning mechanism for one type of Genetic Fuzzy system termed the Genetic Fuzzimetric Technique (GFT). …”
Get full text
Get full text
Get full text
Get full text
article -
645
Prediction of Multiple Clinical Complications in Cancer Patients to Ensure Hospital Preparedness and Improved Cancer Care
Published 2022“…Hence, for predicting three critical clinical complications, such as sepsis, the presence of multidrug-resistant organisms, and mortality, from the data available from medical records, we used 1166 febrile neutropenia episodes reported in 513 patients. …”
-
646
Joint computing, communication and cost-aware task offloading in D2D-enabled Het-MEC
Published 2022“…Furthermore, we propose a low-complexity algorithm that generates high performance results and can be applied for large-scale networks. …”
Get full text
Get full text
Get full text
Get full text
article -
647
A decentralized load balancing approach for parallel search-tree optimization
Published 2017“…We tackle the problems of efficiency and scalability by combining a fully decentralized dynamic load balancing strategy with special implementation techniques for exact graph algorithms. As a case-study, we use our framework to implement parallel algorithms for the VERTEX COVER and DOMINATING SET problems. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
648
-
649
Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects
Published 2023“…Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …”
Get full text
-
650
Real-Time Implementation of GPS Aided Low Cost Strapdown Inertial Navigation System
Published 2009Get full text
doctoralThesis -
651
Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis
Published 2024“…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…”
-
652
A Novel Deep Learning Technique for Detecting Emotional Impact in Online Education
Published 2022“…Emotional intelligence is the automatic detection of human emotions using various intelligent methods. Several studies have been conducted on emotional intelligence, and only a few have been adopted in education. …”
Get full text
-
653
A Navigation and Control System for a Robot in Indoor/Outdoor Environments
Published 2016Get full text
doctoralThesis -
654
-
655
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
Published 2013Get full text
doctoralThesis -
656
Dynamic single node failure recovery in distributed storage systems
Published 2017“…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
Get full text
Get full text
Get full text
Get full text
article -
657
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
Get full text
-
658
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
-
659
Machine Learning-Based Approach for EV Charging Behavior
Published 2021Get full text
doctoralThesis -
660