Search alternatives:
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
update » updated (Expand Search)
Showing 561 - 580 results of 654 for search '(( data models algorithm ) OR ((( develop based algorithm ) OR ( elements update algorithm ))))', query time: 0.11s Refine Results
  1. 561

    An Infrastructure-Assisted Crowdsensing Approach for On-Demand Traffic Condition Estimation by Abdul Rahman, Sawsan

    Published 2019
    “…Our approach combines the strengths of mobile crowdsensing, with the support of the mobile infrastructure, a multi-criteria algorithm for the participants' selection, and a deductive rule-based model for traffic condition estimation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 562

    Integrative toxicogenomics: Advancing precision medicine and toxicology through artificial intelligence and OMICs technology by Ajay Vikram Singh (204056)

    Published 2023
    “…As personalized medicine and toxicogenomics involve huge data processing, AI can expedite this process by providing powerful data processing, analysis, and interpretation algorithms. …”
  3. 563

    Diagnostic test accuracy of AI-assisted mammography for breast imaging: a narrative review by Daksh Dave (17949239)

    Published 2025
    “…Although AI models have shown promising improvements in sensitivity and specificity, challenges such as algorithmic bias, interpretability, and the generalizability of models across diverse populations remain. …”
  4. 564

    On the Generation of Quantified Lemmas by Gabriel Ebner (23277217)

    Published 2018
    “…This solution yields a sequence of lemmas and, finally, a proof based on these lemmas. Various techniques are developed to simplify the canonical solution resulting in a reduction of proof complexity. …”
  5. 565
  6. 566

    An Intelligent and Low-Cost Eye-Tracking System for Motorized Wheelchair Control by Mahmoud Dahmani (18810247)

    Published 2020
    “…To accomplish such a feat, four user-specific methods were developed, implemented, and tested; all of which were based on a benchmark database created by the authors. …”
  7. 567
  8. 568

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. …”
    Get full text
    Get full text
    Get full text
    article
  9. 569
  10. 570

    Multi-Classifier Tree With Transient Features for Drift Compensation in Electronic Nose by Atiq Ur Rehman (8843024)

    Published 2020
    “…These electronic instruments rely on Machine Learning (ML) algorithms for recognizing the sensed odors. The effect of long-term drift influences the performance of ML algorithms and the models those are trained on drift free data fail to perform on the drifted data. …”
  11. 571
  12. 572

    Generic metadata representation framework for social-based event detection, description, and linkage by Abebe, Minale A.

    Published 2020
    “…SEDDaL consists of four main modules for: i) describing social media objects in a generic Metadata Representation Space Model (MRSM) consisting of three composite dimensions: temporal, spatial, and semantic, ii) evaluating the similarity between social media objects’ descriptions following MRSM, iii) detecting events from similar social media objects using an adapted unsupervised learning algorithm, where events are represented as clusters of objects in MRSM, and iv) identifying directional, metric, and topological relationships between events following MRSM’s dimensions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  13. 573

    Wearable Artificial Intelligence for Anxiety and Depression: Scoping Review by Alaa Abd-alrazaq (17058018)

    Published 2023
    “…The most commonly used category of data for model development was physical activity data, followed by sleep data and heart rate data. …”
  14. 574

    Novel RFID-Based Pose Estimation Using Single Stationary Antenna by Saab, Samer S.

    Published 2016
    “…Our scheme is based on power map matching algorithm that is capable in estimating the location and orientation of objects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  15. 575

    Estimation of power grid topology parameters through pilot signals by Hargossian, H.

    Published 2016
    “…Pilot voltage stimulations are injected from distributed generators and the induced currents effects are measured at several nodes in the system. The measured data is evaluated through correlation, and a weighed least-square algorithm, applied to the network’s dynamic model, estimates those unknown parameters and provides an accurate snapshot of the power network topology. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 576

    Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements by Stefano Nardean (14151900)

    Published 2023
    “…An original MHFE-based formulation of the two-phase flow model is taken as a reference for the development of the BCPR preconditioner, in which the set of system unknowns comprises both element and face pressures, in addition to the cell saturations, resulting in a $$3\times 3$$ 3 × 3 block-structured Jacobian matrix with a $$2\times 2$$ 2 × 2 inner pressure problem. …”
  17. 577
  18. 578

    Computer-aided detection of Melanoma using geometric features by Azar, Danielle

    Published 2017
    “…The k-Nearest Neighbors (k-NN) machine learning algorithm is used to classify 15 lesions based on their ABD features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 579

    Thermal convection of fluid in fractured media by Sfeir, Abdallah

    Published 1995
    “…Including this phenomenon in a modelling process led us to propose a development of the UDEC code. The computational algorithm is based on the differences between the rates of convective and conductive heat transfers. …”
    Get full text
    Get full text
    Get full text
    article
  20. 580

    Prolonged ventricular pause associated with ticagrelor use: A case report by Alaa Rahhal (14150403)

    Published 2023
    “…Based on the Naranjo algorithm, the likelihood that our patient's prolonged ventricular pause was due to ticagrelor exposure was probable.…”