Search alternatives:
using algorithm » cosine algorithm (Expand Search)
wold algorithm » mould algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
level using » level fusion (Expand Search)
using algorithm » cosine algorithm (Expand Search)
wold algorithm » mould algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
level using » level fusion (Expand Search)
-
341
Comprehensive whole genome sequence analyses yields novel genetic and structural insights for Intellectual Disability
Published 2017“…The <i>de novo</i> assembly resulted in unmasking hidden genome instability that was missed by standard re-alignment based algorithms. We also interrogated regulatory sequence variation for known and hypothesized ID genes and present useful strategies for WGS data analyses for non-coding variation.…”
-
342
Application of Data Mining to Predict and Diagnose Diabetic Retinopathy
Published 2024Get full text
doctoralThesis -
343
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…These capabilities support the various states of the typical cycle of dynamic cyber resilience, including threshold, bottom, and equilibrium states to increase CIIs robustness against cyberattacks, absorb frequent cyber disturbances that occurred, recover quickly from cyber failures, and re-establish their acceptable performance levels within appropriate timeframe. This thesis presents the novel proposed solution of dynamic cyber resilience using cyber zero-trust engineering for the first time to cope with highlighted shortcomings of the standard solutions, overcome the single hub node failure and enhance dynamic cyber resilience capabilities of interdependent CII networks against concurrent and consecutive cyberattacks to deliver their core services continuously. …”
Get full text
-
344
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
Published 2013Get full text
doctoralThesis -
345
ANT-colony optimization-direct torque control for a doubly fed induction motor : An experimental validation
Published 2022“…For that reason, this work is focused on the theoretical studies and experimental validation on dSPACE Board DS1104 of the new proposed approach based on PID speed regulation, optimized by the Ant Colony Optimization algorithm (ACO) for DTC, applied to both sides of the Doubly Fed Induction Motor (DFIM), to overcome the previous drawbacks cited at the beginning. …”
-
346
Improving MRI Resolution: A Cycle Consistent Generative Adversarial Network-Based Approach for 3T to 7T Translation
Published 2024“…However, the exorbitant expenses associated with 7T MRI scanners hinder their broad use in research and clinical facilities. Efforts are underway to develop algorithms that can generate 7T MRI from 3T MRI to achieve better image quality without the need for 7T MRI machines. …”
-
347
Scrambled Prime Key Encryption
Published 2018“…To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
348
DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins
Published 2025“…This method offers precise endotoxin classification and holds significant potential for expedited medical diagnoses and therapeutic decision-making in cases of pathogenic infections. ConclusionWe present the effectiveness of DeepRaman, an innovative architecture inspired by the Progressive Fourier Transform and integrated with the scalogram transformation method, in classifying raw SERS Raman spectral data from biological specimens with unparalleled accuracy relative to conventional machine learning algorithms. …”
Get full text
Get full text
Get full text
article -
349
Small-Signal Stability Analysis and Parameters Optimization of Virtual Synchronous Generator for Low-Inertia Power System
Published 2025“…We further propose a hybrid Particle Swarm Optimization (PSO) algorithm with a multi-objective cost function to optimize VSG controller gains. …”
-
350
Short-Term Load Forecasting in Active Distribution Networks Using Forgetting Factor Adaptive Extended Kalman Filter
Published 2023“…A few research studies focused on developing data filtering algorithm for the load forecasting process using approaches such as Kalman filter, which has good tracking capability in the presence of noise in the data collection process. …”
-
351
-
352
Towards Multimedia Fragmentation
Published 2006Get full text
Get full text
Get full text
Get full text
conferenceObject -
353
Reconstruction and simulation of neocortical microcircuitry
Published 2015“…We present a first-draft digital reconstruction of the microcircuitry of somatosensory cortex of juvenile rat. …”
Get full text
Get full text
Get full text
Get full text
article -
354
New aspect-oriented constructs for security hardening concerns
Published 2009“…Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…”
Get full text
Get full text
Get full text
article -
355
Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review
Published 2022“…Wearable devices (WDs) make use of sensors historically reserved for hospital settings. …”
-
356
Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases
Published 2024“…To guarantee a safe and successful deployment in clinical practice, the use of AI in cardiology must be done with a thorough understanding of the algorithms and their limits. …”
-
357
Diagnostic and therapeutic challenges of BRASH syndrome
Published 2021“…Further studies are warranted to understand the pathophysiology and develop better and accurate management algorithms. …”
-
358
Data Redundancy Management in Connected Environments
Published 2020“…To address these limitations, we propose a framework for data redundancy management at the device level, denoted DRMF. We describe its modules, and clustering-based algorithms. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
359
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité
Published 2009“…Moreover, we show the viability and correctness of our proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the results of explanatory case studies.…”
Get full text
Get full text
Get full text
article -
360
Common weaving approach in mainstream languages for software security hardening
Published 2013“…To achieve this goal, we present a formal specification for GIMPLE weaving and the implementation strategies of the proposed weaving semantics. …”
Get full text
Get full text
Get full text
article