Search alternatives:
processing algorithm » processing algorithms (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
processing algorithm » processing algorithms (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
321
Scheduling and allocation in high-level synthesis using stochastic techniques
Published 2020“…High-level synthesis is the process of automatically translating abstract behavioral models of digital systems to implementable hardware. …”
Get full text
article -
322
Positive Unlabelled Learning to Recognize Dishes as Named Entity
Published 2019“…With the lack of labelled data, I try to overcome the cold start and avoid manual labelling by building a lookup table from a dictionary. …”
Get full text
-
323
Energy conversion of heat from abandoned oil wells to mechanical refrigeration - Transient analysis and optimization
Published 2021“…Among 43 investigated refrigerants, R1234ze(E) has higher efficiency, lower Pumping Work Ratio (PWR), and requires a smaller size of the heat exchangers. Using the genetic algorithm optimization method with R1234ze(E) as working fluid in both power and cooling loops, a maximum power loop efficiency of 6.3% and COP of 5.3 were obtained at a high pressure of 29 bar (in the power loop) with minimal expander diameter of 64, compressor diameter of 171 mm, and 18 expander-compressor units.…”
-
324
Modelling of pollutant transport in compound open channels
Published 1998“…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
Get full text
Get full text
masterThesis -
325
Modeling and Bias-Robust Estimation of the Acoustic Release of Chemotherapeutics from Liposomes
Published 2019“…Optimality is guaranteed by accurately identifying the underlying statistical noise characteristics in experimental data. The estimator also quantifies the bias in the release, exhibited by the experimental data. …”
Get full text
article -
326
Anomaly Detection Based Framework for Profile Monitoring
Published 2023Get full text
doctoralThesis -
327
Reconstruction and simulation of neocortical microcircuitry
Published 2015“…The reconstruction uses cellular and synaptic organizing principles to algorithmically reconstruct detailed anatomy and physiology from sparse experimental data. …”
Get full text
Get full text
Get full text
Get full text
article -
328
Anonymizing multimedia documents
Published 2016“…We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
Get full text
Get full text
Get full text
Get full text
article -
329
-
330
SemIndex: Semantic-Aware Inverted Index
Published 2017“…We provide here a new approach, called SemIndex, that extends the standard inverted index by constructing a tight coupling inverted index graph that combines two main resources: a general purpose semantic network, and a standard inverted index on a collection of textual data. We also provide an extended query model and related processing algorithms with the help of SemIndex. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
331
Modeling and automated blackbox regression testing of web applications
Published 2008“…With this great emergence of web applications, techniques for maintaining their high quality attributes should be developed and exercised. …”
Get full text
Get full text
Get full text
article -
332
Optimising Nurse–Patient Assignments: The Impact of Machine Learning Model on Care Dynamics—Discursive Paper
Published 2025“…Future research should focus on refining algorithms, ensuring real‐time adaptability, addressing ethical considerations, evaluating long‐term patient outcomes, fostering cooperative systems, and integrating relevant data and policies within the healthcare framework.…”
-
333
Role of authentication factors in Fin-tech mobile transaction security
Published 2023“…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
-
334
Integration of Textural and Material Information into BIM Using Spectrometry and Infrared Sensing
Published 2015Get full text
doctoralThesis -
335
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2020“…The performed experiments show that 60% of flow packets are a good compromise that ensures high performance in the least processing time. The results of the conducted experiments indicate that random forest outperforms other algorithms achieving a maximum accuracy of 98.5% and an F-score of 0.932. …”
Get full text
article -
336
A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns
Published 2023“…Statistical analysis showed that the selected features for liquids' and pipe's properties using the BGWOPSO algorithm were adequate to attain superior performance for both models. …”
-
337
-
338
Online Control and Optimization of Directional Drilling
Published 2020“…Gravitational Search Algorithm (GSA) is developed to search for optimal settings of the proposed controller. …”
Get full text
masterThesis -
339
Novel biomarkers for potential risk stratification of drug induced liver injury (DILI)
Published 2019“…</p><h3>Methods:</h3><p dir="ltr">We explored PUBMED and all other relevant databases for scientific studies that explored potential utility of novel biomarkers of DILI, and subsequently carried out a narrative synthesis of this data. …”
-
340
Extreme Early Image Recognition Using Event-Based Vision
Published 2023“…<p dir="ltr">While deep learning algorithms have advanced to a great extent, they are all designed for frame-based imagers that capture images at a high frame rate, which leads to a high storage requirement, heavy computations, and very high power consumption. …”