Search alternatives:
experimental data » experimental _ (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
level using » level fusion (Expand Search)
element » elements (Expand Search)
Showing 321 - 339 results of 339 for search '(((( experimental data algorithm ) OR ( element data algorithm ))) OR ( level using algorithm ))', query time: 0.15s Refine Results
  1. 321

    Peripheral inflammatory and metabolic markers as potential biomarkers in treatment-resistant schizophrenia: Insights from a Qatari Cohort by Mohamed Adil Shah Khoodoruth (14589828)

    Published 2024
    “…Key measurements included complete blood count, lipid panel, HbA1c, and ferritin levels. Our findings indicated elevated body mass index (BMI) and triglyceride (TG) levels in both patient groups compared to controls. …”
  2. 322

    Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort by Sergio Márquez-Sánchez (19437985)

    Published 2023
    “…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
  3. 323

    Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review by Yazeed Yasin Ghadi (16667109)

    Published 2024
    “…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …”
  4. 324

    Triage decisions for ICU admission by Blanch, Lluis

    Published 2016
    “…The team made recommendations and concluded that triage should be led by intensivists considering input from nurses, emergency medicine professionals, hospitalists, surgeons, and allied professionals. Triage algorithms and protocols can be useful but can never supplant the role of skilled intensivists basing their decisions on input from multidisciplinary teams. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 325

    Optimising Nurse–Patient Assignments: The Impact of Machine Learning Model on Care Dynamics—Discursive Paper by Mutaz I. Othman (21186827)

    Published 2025
    “…</p><h3>Methods</h3><p dir="ltr">A discursive approach was used to optimise nurse–patient assignments and the impact of ML models. …”
  6. 326

    Industrial Internet of Things enabled technologies, challenges, and future directions by Shams Forruque, Ahmed

    Published 2023
    “…Industrial technologies will improve as research and experimentation advance IIoT infrastructure.…”
    Get full text
    Get full text
    Get full text
    article
  7. 327

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
    Get full text
  8. 328

    Industrial Internet of Things enabled technologies, challenges, and future directions by Shams Forruque Ahmed (16517712)

    Published 2023
    “…IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …”
  9. 329

    Integrated whole transcriptome and small RNA analysis revealed multiple regulatory networks in colorectal cancer by Hibah Shaath (5599658)

    Published 2021
    “…IPA in combination with in silico prediction algorithms and experimentally validated databases gave insight into the complex associations and interactions between downregulated miRNAs and upregulated mRNAs in CRC and vice versa. …”
  10. 330

    Design and analysis of efficient and secure elliptic curve cryptoprocessors. by Al-Somani, Turki Faisal

    Published 2006
    “…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …”
    Get full text
    masterThesis
  11. 331
  12. 332

    On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity by Sweidan, Zahraa

    Published 2020
    “…Simulation results are presented for both parts of the thesis to illustrate the effectiveness of the proposed solutions and algorithms in comparison with optimal solutions and baseline algorithms.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  13. 333

    Effective dispatch strategies assortment according to the effect of the operation for an islanded hybrid microgrid by Sk.A. Shezan (21323048)

    Published 2022
    “…In HOMER software, all the possible dispatch algorithms were analyzed, and the power system responses and reliability study were carried out using DIgSILENT PowerFactory. …”
  14. 334

    Exploring the Dynamic Interplay of Deleterious Variants on the RAF1–RAP1A Binding in Cancer: Conformational Analysis, Binding Free Energy, and Essential Dynamics by Abbas Khan (5141000)

    Published 2024
    “…Hence, the current study focuses on the screening of clinically reported substitutions in the <i>RAF1</i> and <i>RAP1A</i> genes using predictive algorithms integrated with all‐atoms simulation, essential dynamics, and binding free energy methods. …”
  15. 335

    Large language models for code completion: A systematic literature review by Rasha Ahmad Husein (19744756)

    Published 2024
    “…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. While several research papers have focused on the use of LLMs for code completion, these studies are fragmented, and there is no systematic overview of the use of LLMs for code completion. …”
  16. 336

    Copy number variations in the genome of the Qatari population by Khalid A. Fakhro (3158862)

    Published 2015
    “…Consistent with high consanguinity levels in the Bedouin subpopulation, we found an increased burden for homozygous deletions in this group. …”
  17. 337
  18. 338

    Sense and Learn: Recent Advances in Wearable Sensing and Machine Learning for Blood Glucose Monitoring and Trend-Detection by Ahmad Yaser Alhaddad (7017434)

    Published 2022
    “…We also review methods that use machine learning algorithms to predict blood glucose trends, especially for high risk events such as hypoglycemia. …”
  19. 339

    The Role of Machine Learning in Diagnosing Bipolar Disorder: Scoping Review by Zainab Jan (17306614)

    Published 2021
    “…</p><h3>Objective</h3><p dir="ltr">This review aims to explore the machine learning algorithms used for the detection and diagnosis of bipolar disorder and its subtypes.…”