Showing 201 - 220 results of 447 for search '(((( implement ii algorithm ) OR ( element data algorithm ))) OR ( levels using algorithm ))', query time: 0.13s Refine Results
  1. 201

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System by Alkhatib, Osama

    Published 2019
    “…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. …”
    Get full text
  2. 202

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security by S. Shitharth (12017480)

    Published 2023
    “…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …”
  3. 203

    Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements by Emara-Shabaik, Husam

    Published 2020
    “…The model structure is made up of two linear dynamic elements separated by a nonlinear static one. The nonlinear element is assumed to be of the polynomial type with known order; The identification is based on input/output data where the output is contaminated with measurement noise. …”
    Get full text
    article
  4. 204
  5. 205
  6. 206

    A hybrid approach for XML similarity by Tekli, Joe

    Published 2007
    “…Various algorithms for comparing hierarchically structured data, e.g. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 207

    On the complexity of multi-parameterized cluster editing by Abu-Khzam, Faisal

    Published 2017
    “…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 208

    A survey and comparison of wormhole routing techniques in a meshnetworks by Al-Tawil, K.M.

    Published 1997
    “…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …”
    Get full text
    Get full text
    article
  9. 209
  10. 210

    Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring by Muzna Yumman (16494023)

    Published 2020
    “…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …”
  11. 211

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…”
  12. 212
  13. 213

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study by Masurkar, Faeez

    Published 2022
    “…Finally, a 3D Finite Element simulation was conducted to validate the findings and each observation resulting from the experiments. …”
    Get full text
  14. 214

    Artificial Intelligence (AI) based machine learning models predict glucose variability and hypoglycaemia risk in patients with type 2 diabetes on a multiple drug regimen who fast d... by Tarik Elhadd (5480393)

    Published 2020
    “…The optimal XGBoost model prioritized age, gender, BMI and HbA1c followed by glucose levels and physical activity. Interestingly, the blood glucose level prediction by our model was influenced by use of SGLT2i.…”
  15. 215

    Blockchain-Based Decentralized Architecture for Software Version Control by Muhammad Hammad (17541570)

    Published 2023
    “…<p dir="ltr">Version control is an important component of configuration management, and most enterprise-level software uses different tools and technologies to manage the software version control such as CVS, Subversion, or Perforce. …”
  16. 216
  17. 217

    Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles by Wadi, Ali

    Published 2017
    “…The results suggest that the proposed algorithm, the optimal Kalman filter, performs better than the other two in all tests performed.…”
    Get full text
    article
  18. 218
  19. 219

    Multi-class subarachnoid hemorrhage severity prediction: addressing challenges in predicting rare outcomes by Muhammad Mohsin Khan (22150360)

    Published 2025
    “…Feature selection was done using a Random Forest algorithm to identify the top 20 features for the SAH severity prediction. …”
  20. 220

    Query acceleration in distributed database systems by Haraty, Ramzi A.

    Published 2001
    “…Programs were designed to implement both the original and the enhanced algorithms. …”
    Get full text
    Get full text
    Get full text
    article