Showing 41 - 56 results of 56 for search '(( code generation algorithm ) OR ( wide detection algorithm ))', query time: 0.10s Refine Results
  1. 41

    Optimizing overheating, lighting, and heating energy performances in Canadian school for climate change adaptation: Sensitivity analysis and multi-objective optimization methodolog... by Mutasim Baba, Fuad

    Published 2023
    “…This paper aims to develop long-term adaptation strategies for the existing Canadian school buildings under extreme current and future climates using a developed methodology based on global and local sensitivity analysis and Multi-Objective Optimization Genetic Algorithm. The calibrated simulation model based on indoor and outdoor measured temperature for a school of interest is used to evaluate the optimization strategies. …”
    Get full text
    Get full text
    Get full text
  2. 42

    Benchmark on a large cohort for sleep-wake classification with machine learning techniques by Joao Palotti (8479842)

    Published 2019
    “…We also implemented and compared state-of-the-art methods to score sleep-wake stages, which range from the widely used traditional algorithms to recent machine learning approaches. …”
  3. 43

    Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security by Muhammad Maaz (5600600)

    Published 2024
    “…The time efficiency of both proposed algorithms renders them well-suited for deployment in IoT ecosystems. …”
  4. 44

    Hybrid deep learning based threat intelligence framework for Industrial IoT systems by Jahanzaib Malik (23718816)

    Published 2025
    “…The proposed approach was also compared against several contemporary deep learning-based architectures and existing benchmark algorithms. The results indicate that the proposed method achieves superior detection accuracy, with only a minimal compromise in speed efficiency. …”
  5. 45
  6. 46
  7. 47

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…In the first approach, we prove them according to the rules and algorithms provided in this paper. In the second approach, we accommodate Kniesel's discipline that ensures that security solutions specified by our approach are applied at all and only the required points in source code, taking into consideration weaving interactions and interferences. …”
    Get full text
    Get full text
    Get full text
    article
  8. 48

    Differential diagnosis of bile duct injury and ductopenia by West, A.B.

    Published 1998
    “…Injury and loss of intrahepatic bile ducts are relatively common manifestations of liver disease in both adults and children. They occur in a wide variety of conditions ranging from developmental abnormalities and errors of metabolism to autoimmune disorders, infections, and iatrogenic states. …”
    Get full text
    Get full text
    Get full text
    article
  9. 49
  10. 50

    Nonlinear analysis of shell structures using image processing and machine learning by M.S. Nashed (16392961)

    Published 2023
    “…The proposed method in this paper is unique in that it converts the mechanical behaviour of shell structures into images that are then used to train a machine learning algorithm. This is achieved by mapping shell deformations and stresses to a set of images that are used to train a conditional generative adversarial network. …”
  11. 51

    Developing an online hate classifier for multiple social media platforms by Joni Salminen (7434770)

    Published 2020
    “…<p>The proliferation of social media enables people to express their opinions widely online. However, at the same time, this has resulted in the emergence of conflict and hate, making online environments uninviting for users. …”
  12. 52
  13. 53
  14. 54

    Dynamic single node failure recovery in distributed storage systems by Itani, M.

    Published 2017
    “…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  15. 55

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Amindari, Armin

    Published 2017
    “…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
    Get full text
    Get full text
    Get full text
    article
  16. 56

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Armin, Amindari

    Published 2017
    “…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
    Get full text
    Get full text
    Get full text
    article