Search alternatives:
using algorithm » cosine algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
levels using » cells using (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
elementi » elements (Expand Search), element (Expand Search), elemental (Expand Search)
using algorithm » cosine algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
levels using » cells using (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
elementi » elements (Expand Search), element (Expand Search), elemental (Expand Search)
-
261
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Therefore, for this paper multiple machine learning algorithms are investigated to predict system failure based on vehicle trips information as well as maintenance management historical data including preventive maintenance and corrective maintenance. …”
Get full text
-
262
Exploring the System Dynamics of Covid-19 in Emergency Medical Services
Published 2022“…The predictive analysis yielded a model of response times for emergency missions through machine learning, specifically using a random forest algorithm. The value in building a predictive model of response time lies in identifying the most influential predictors of response times such as team utilization, case severity, COVID-19 patients, and roadway distance. …”
Get full text
Get full text
Get full text
masterThesis -
263
-
264
Comparative Study on Arabic Text Classification: Challenges and Opportunities
Published 2022“…Based on the reviewed researches, SVM and Naive Bayes were the most widely used classifiers for Arabic text classification, while more effort is needed to develop and to implement flexible Arabic text classification methods and classifiers.…”
Get full text
-
265
-
266
Computation of conformal invariants
Published 2020“…The method we use is based on the boundary integral equation method developed and implemented in [1]. …”
Get full text
Get full text
Get full text
article -
267
A standalone RFID indoor positioning system using passive tags
Published 2011“…Based on the location estimate, an iterative procedure is implemented, targeting the estimation of the tag-reader angle-path loss, where the latter is iteratively compensated from the received signal strength information measurement. …”
Get full text
Get full text
Get full text
article -
268
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text
-
269
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
Published 2012“…Tools for generating synthetic XML documents underline an alternative solution, promoting flexibility and adaptability in generating synthetic document collections. Nonetheless, the usefulness of existing XML generators remains rather limited due to the restricted levels of expressiveness allowed to users. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
270
Real-Time Path-Planning using Depth/INS Sensor Fusion for Localization
Published 2019Get full text
doctoralThesis -
271
Application of Data Mining to Predict and Diagnose Diabetic Retinopathy
Published 2024Get full text
doctoralThesis -
272
Developing a framework for using face recognition in transit payment transactions
Published 2021“…This solution considers an effective cost-based solution. The second solution is proposed based on implementing a dedicated full HD face recognition stereo camera system on top of each metro gate and integrate it with the recommended “Banking Payment Context- Account Based Ticketing System” by using the MFcoface face recognition method which results from the systematic literature review and experts’ outcomes. …”
Get full text
-
273
Peripheral inflammatory and metabolic markers as potential biomarkers in treatment-resistant schizophrenia: Insights from a Qatari Cohort
Published 2024“…Key measurements included complete blood count, lipid panel, HbA1c, and ferritin levels. Our findings indicated elevated body mass index (BMI) and triglyceride (TG) levels in both patient groups compared to controls. …”
-
274
Supervised term-category feature weighting for improved text classification
Published 2022“…Training the ANN using the gradient descent algorithm allows updating the term-category matrix until reaching convergence. …”
Get full text
Get full text
Get full text
Get full text
article -
275
Computation of conformal invariants
Published 2021“…The method we use is based on the boundary integral equation method developed and implemented in [1]. …”
-
276
Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St...
Published 2024“…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. …”
-
277
Decomposition method for solving a nonlinear business cycle model
Published 2003“…A numerical algorithm based on a decomposition scheme is implemented for the approximate solution of the model. …”
Get full text
Get full text
Get full text
Get full text
article -
278
Modeling and Guidance of an Underactuated Autonomous Underwater Vehicle
Published 2017Get full text
doctoralThesis -
279
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
Published 2022“…In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. The actions and rewards for the proposed algorithm are selected carefully to guide the agent to its objective. …”
Get full text
Get full text
Get full text
masterThesis -
280
Efficient unified Montgomery inversion with multi-bit shifting
Published 2005“…Since the existing algorithms based on the extended Euclidean algorithm do not permit a fast software implementation, projective co-ordinates, which eliminate almost all of the inversion operations from the curve arithmetic, are preferred. …”
Get full text
Get full text
article