Showing 281 - 300 results of 320 for search '(((( test processing algorithm ) OR ( element deer algorithm ))) OR ( level using algorithm ))', query time: 0.12s Refine Results
  1. 281

    An intelligent EPROM silicon compiler by Amin, A.

    Published 1991
    “…A knowledge-based kernel determines the chip architecture and required circuit blocks and calls appropriate module generators for each block. Routing algorithms are then used to connect these blocks into a full chip…”
    Get full text
    Get full text
    article
  2. 282
  3. 283

    Deep and transfer learning for building occupancy detection: A review and comparative analysis by Aya Nabil Sayed (17317006)

    Published 2022
    “…Moreover, the paper conducted a comparative study of the readily available algorithms for occupancy detection to determine the optimal method in regards to training time and testing accuracy. …”
  4. 284

    A Closed Queueing Networks Approach for an Optimal Heterogeneous Fleet Size of an Inter-Facility Bulk Material Transfer System by Mohamed Amjath (17542512)

    Published 2024
    “…Results: The proposed analytical model tested within a steel manufacturing plant’s material transfer process. …”
  5. 285

    KNNOR: An oversampling technique for imbalanced datasets by Ashhadul Islam (16869981)

    Published 2021
    “…To overcome these problems, this article proposes an advanced algorithm by studying the compactness and location of the minority class relative to other classes. …”
  6. 286

    XBeGene: Scalable XML Documents Generator by Example Based on Real Data by Harazaki, Manami

    Published 2012
    “…Tools for generating synthetic XML documents underline an alternative solution, promoting flexibility and adaptability in generating synthetic document collections. Nonetheless, the usefulness of existing XML generators remains rather limited due to the restricted levels of expressiveness allowed to users. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 287
  8. 288
  9. 289

    Improving MRI Resolution: A Cycle Consistent Generative Adversarial Network-Based Approach for 3T to 7T Translation by Zakaria Shams Siam (22048001)

    Published 2024
    “…However, the exorbitant expenses associated with 7T MRI scanners hinder their broad use in research and clinical facilities. Efforts are underway to develop algorithms that can generate 7T MRI from 3T MRI to achieve better image quality without the need for 7T MRI machines. …”
  10. 290

    Scrambled Prime Key Encryption by Haraty, Ramzi A.

    Published 2018
    “…To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 291
  12. 292
  13. 293
  14. 294

    Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review by Arfan Ahmed (17541309)

    Published 2022
    “…Wearable devices (WDs) make use of sensors historically reserved for hospital settings. …”
  15. 295

    Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases by Muhammad Ali Muzammil (17910611)

    Published 2024
    “…To guarantee a safe and successful deployment in clinical practice, the use of AI in cardiology must be done with a thorough understanding of the algorithms and their limits. …”
  16. 296

    Peripheral inflammatory and metabolic markers as potential biomarkers in treatment-resistant schizophrenia: Insights from a Qatari Cohort by Mohamed Adil Shah Khoodoruth (14589828)

    Published 2024
    “…Key measurements included complete blood count, lipid panel, HbA1c, and ferritin levels. Our findings indicated elevated body mass index (BMI) and triglyceride (TG) levels in both patient groups compared to controls. …”
  17. 297

    Data Redundancy Management in Connected Environments by Mansour, Elio

    Published 2020
    “…To address these limitations, we propose a framework for data redundancy management at the device level, denoted DRMF. We describe its modules, and clustering-based algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 298

    Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review by Yazeed Yasin Ghadi (16667109)

    Published 2024
    “…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …”
  19. 299

    Triage decisions for ICU admission by Blanch, Lluis

    Published 2016
    “…The team made recommendations and concluded that triage should be led by intensivists considering input from nurses, emergency medicine professionals, hospitalists, surgeons, and allied professionals. Triage algorithms and protocols can be useful but can never supplant the role of skilled intensivists basing their decisions on input from multidisciplinary teams. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 300

    Data redundancy management for leaf-edges in connected environments by Mansour, Elio

    Published 2022
    “…To address these limitations, we propose here DRMF: Data Redundancy Management for leaF-edges allowing to identify and remove data redundancies in connected environments at the device level. DRMF considers both static and mobile edge devices, and provides two algorithms for temporal and spatio-temporal redundancy detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article