Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
mesh algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
level using » level fusion (Expand Search)
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
mesh algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
level using » level fusion (Expand Search)
-
261
Artificial intelligence models for predicting the mode of delivery in maternal care
Published 2025“…</p><h3>Objectives</h3><p dir="ltr">This study aims to evaluate and compare the predictive accuracy of AI algorithms in predicting the mode of delivery (vaginal or cesarean) using routinely collected antepartum data from electronic health records (EHRs). …”
-
262
Cutting‐edge technologies for detecting and controlling fish diseases: Current status, outlook, and challenges
Published 2024“…Here, we highlighted the potential of machine learning algorithms in early pathogen detection and the possibilities of intelligent aquaculture in controlling disease outbreaks at the farm level. …”
-
263
An intelligent EPROM silicon compiler
Published 1991“…A knowledge-based kernel determines the chip architecture and required circuit blocks and calls appropriate module generators for each block. Routing algorithms are then used to connect these blocks into a full chip…”
Get full text
Get full text
article -
264
Secure and Anonymous Communications Over Delay Tolerant Networks
Published 2020“…Instead, our work introduces a novel message forwarding algorithm that delivers messages, from source to destination, via a random walk process. …”
-
265
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
Published 2012“…Tools for generating synthetic XML documents underline an alternative solution, promoting flexibility and adaptability in generating synthetic document collections. Nonetheless, the usefulness of existing XML generators remains rather limited due to the restricted levels of expressiveness allowed to users. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
266
Application of Data Mining to Predict and Diagnose Diabetic Retinopathy
Published 2024Get full text
doctoralThesis -
267
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
Published 2013Get full text
doctoralThesis -
268
Scrambled Prime Key Encryption
Published 2018“…To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
269
Towards Multimedia Fragmentation
Published 2006Get full text
Get full text
Get full text
Get full text
conferenceObject -
270
Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review
Published 2022“…Wearable devices (WDs) make use of sensors historically reserved for hospital settings. …”
-
271
Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases
Published 2024“…To guarantee a safe and successful deployment in clinical practice, the use of AI in cardiology must be done with a thorough understanding of the algorithms and their limits. …”
-
272
Peripheral inflammatory and metabolic markers as potential biomarkers in treatment-resistant schizophrenia: Insights from a Qatari Cohort
Published 2024“…Key measurements included complete blood count, lipid panel, HbA1c, and ferritin levels. Our findings indicated elevated body mass index (BMI) and triglyceride (TG) levels in both patient groups compared to controls. …”
-
273
Data Redundancy Management in Connected Environments
Published 2020“…To address these limitations, we propose a framework for data redundancy management at the device level, denoted DRMF. We describe its modules, and clustering-based algorithms. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
274
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
Published 2024“…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …”
-
275
Triage decisions for ICU admission
Published 2016“…The team made recommendations and concluded that triage should be led by intensivists considering input from nurses, emergency medicine professionals, hospitalists, surgeons, and allied professionals. Triage algorithms and protocols can be useful but can never supplant the role of skilled intensivists basing their decisions on input from multidisciplinary teams. …”
Get full text
Get full text
Get full text
Get full text
article -
276
Data redundancy management for leaf-edges in connected environments
Published 2022“…To address these limitations, we propose here DRMF: Data Redundancy Management for leaF-edges allowing to identify and remove data redundancies in connected environments at the device level. DRMF considers both static and mobile edge devices, and provides two algorithms for temporal and spatio-temporal redundancy detection. …”
Get full text
Get full text
Get full text
Get full text
article -
277
Optimising Nurse–Patient Assignments: The Impact of Machine Learning Model on Care Dynamics—Discursive Paper
Published 2025“…</p><h3>Methods</h3><p dir="ltr">A discursive approach was used to optimise nurse–patient assignments and the impact of ML models. …”
-
278
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
Get full text
-
279
Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling
Published 2022“…A Stochastic Discrete Simulation-Based Multi-Objective Optimization (SDSMO) model is developed and linked to clustering algorithms using an iterative sequential approach. The experimental results indicate the positive effect of clustering similar appointments on the performance measures and the computational time. …”
-
280
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
Published 2006“…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …”
Get full text
masterThesis