Search alternatives:
generation algorithm » genetic algorithm (Expand Search)
code generation » power generation (Expand Search), image generation (Expand Search)
wide detection » video detection (Expand Search), fire detection (Expand Search), ion detection (Expand Search)
generation algorithm » genetic algorithm (Expand Search)
code generation » power generation (Expand Search), image generation (Expand Search)
wide detection » video detection (Expand Search), fire detection (Expand Search), ion detection (Expand Search)
-
41
Optimizing overheating, lighting, and heating energy performances in Canadian school for climate change adaptation: Sensitivity analysis and multi-objective optimization methodolog...
Published 2023“…This paper aims to develop long-term adaptation strategies for the existing Canadian school buildings under extreme current and future climates using a developed methodology based on global and local sensitivity analysis and Multi-Objective Optimization Genetic Algorithm. The calibrated simulation model based on indoor and outdoor measured temperature for a school of interest is used to evaluate the optimization strategies. …”
Get full text
Get full text
Get full text
-
42
Benchmark on a large cohort for sleep-wake classification with machine learning techniques
Published 2019“…We also implemented and compared state-of-the-art methods to score sleep-wake stages, which range from the widely used traditional algorithms to recent machine learning approaches. …”
-
43
Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security
Published 2024“…The time efficiency of both proposed algorithms renders them well-suited for deployment in IoT ecosystems. …”
-
44
Hybrid deep learning based threat intelligence framework for Industrial IoT systems
Published 2025“…The proposed approach was also compared against several contemporary deep learning-based architectures and existing benchmark algorithms. The results indicate that the proposed method achieves superior detection accuracy, with only a minimal compromise in speed efficiency. …”
-
45
Prototype project management tool (PPMT) with cocomo calibration. (c1998)
Published 1998Get full text
Get full text
masterThesis -
46
-
47
Common weaving approach in mainstream languages for software security hardening
Published 2013“…In the first approach, we prove them according to the rules and algorithms provided in this paper. In the second approach, we accommodate Kniesel's discipline that ensures that security solutions specified by our approach are applied at all and only the required points in source code, taking into consideration weaving interactions and interferences. …”
Get full text
Get full text
Get full text
article -
48
Differential diagnosis of bile duct injury and ductopenia
Published 1998“…Injury and loss of intrahepatic bile ducts are relatively common manifestations of liver disease in both adults and children. They occur in a wide variety of conditions ranging from developmental abnormalities and errors of metabolism to autoimmune disorders, infections, and iatrogenic states. …”
Get full text
Get full text
Get full text
article -
49
-
50
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…The proposed method in this paper is unique in that it converts the mechanical behaviour of shell structures into images that are then used to train a machine learning algorithm. This is achieved by mapping shell deformations and stresses to a set of images that are used to train a conditional generative adversarial network. …”
-
51
Developing an online hate classifier for multiple social media platforms
Published 2020“…<p>The proliferation of social media enables people to express their opinions widely online. However, at the same time, this has resulted in the emergence of conflict and hate, making online environments uninviting for users. …”
-
52
Assessment of Inventory and Transportation Collaboration in a Logistics Marketplace
Published 2020Get full text
doctoralThesis -
53
Assessment and Performance Analysis of Machine Learning Techniques for Gas Sensing E-nose Systems
Published 2021Get full text
doctoralThesis -
54
Dynamic single node failure recovery in distributed storage systems
Published 2017“…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
Get full text
Get full text
Get full text
Get full text
article -
55
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
Get full text
Get full text
Get full text
article -
56
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
Get full text
Get full text
Get full text
article