Showing 61 - 75 results of 75 for search '(((( select controls algorithm ) OR ( complement box algorithm ))) OR ( neural coding algorithm ))', query time: 0.10s Refine Results
  1. 61

    Blood-Based Proteomic Profiling Identifies Potential Biomarker Candidates and Pathogenic Pathways in Dementia by Hanan Ehtewish (17149825)

    Published 2023
    “…We used a high-throughput proximity extension immunoassay to quantify 1090 proteins in 122 participants (22 with dementia, 64 with mild cognitive impairment (MCI), and 36 controls with normal cognitive function). Limma-based differential expression analysis reported the dysregulation of 61 proteins in the plasma of those with dementia compared with controls, and machine learning algorithms identified 17 stable diagnostic biomarkers that differentiated individuals with AUC = 0.98 ± 0.02. …”
  2. 62

    Fuzzy simulated evolution for power and performance optimization ofVLSI placement by Sait, Sadiq M.

    Published 2001
    “…In this work, a new method to calculate membership in evaluation stage is proposed. Selection stage is also fuzzified and a new controlled fuzzy operator is introduced. …”
    Get full text
    Get full text
    article
  3. 63

    Adaptive false discovery rate for wavelet denoising of pavement continuous deflection measurements by Katicha, Samer W.

    Published 2016
    “…The algorithm minimizes the classification error of features in the wavelet transform domain by adaptively selecting the level at which to control the false discovery rate. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 64

    Optimal Trajectory and Positioning of UAVs for Small Cell HetNets: Geometrical Analysis and Reinforcement Learning Approach by Mohammad Taghi Dabiri (16904658)

    Published 2023
    “…Then, using geometrical analysis and deep reinforcement learning (RL) method, we propose several algorithms to find the optimal trajectory and select an optimal pattern during the trajectory. …”
  5. 65
  6. 66

    Regression Testing of Database Applications by Haraty, Ramzi A.

    Published 2002
    “…In phase 2, further reduction in the regression test cases is performed by using reduction algorithms. We present two such algorithms. The Graph Walk algorithm walks through the control flow graph of database modules and selects a safe set of test cases to retest. …”
    Get full text
    Get full text
    Get full text
    article
  7. 67
  8. 68

    Developing an online hate classifier for multiple social media platforms by Joni Salminen (7434770)

    Published 2020
    “…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”
  9. 69
  10. 70

    An Infrastructure-Assisted Crowdsensing Approach for On-Demand Traffic Condition Estimation by Abdul Rahman, Sawsan

    Published 2019
    “…Our approach combines the strengths of mobile crowdsensing, with the support of the mobile infrastructure, a multi-criteria algorithm for the participants' selection, and a deductive rule-based model for traffic condition estimation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 71
  12. 72

    Applying urban parametric design optimisation processes to a hot climate: Case study of the UAE by Taleb, Hanan

    Published 2014
    “…Parametric and algorithmic design is considered a current trend in architectural design processes. …”
    Get full text
  13. 73

    Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning by Mohamed Massaoudi (16888710)

    Published 2025
    “…Additionally, it assists stakeholders in selecting the most appropriate clustering algorithms for PGP applications.…”
  14. 74

    Machine learning based approaches for intelligent adaptation and prediction in banking business processes. (c2018) by Tay, Bilal M.

    Published 2018
    “…The proposed scheme is capable of assessing the deployed access control polices and updating them systematically with new roles based on employees behaviors and system constraints. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  15. 75