Search alternatives:
processing algorithm » processing algorithms (Expand Search)
developing ii » developing a (Expand Search), developing _ (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
element » elements (Expand Search)
update » updated (Expand Search)
processing algorithm » processing algorithms (Expand Search)
developing ii » developing a (Expand Search), developing _ (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
element » elements (Expand Search)
update » updated (Expand Search)
-
201
-
202
-
203
Improving MRI Resolution: A Cycle Consistent Generative Adversarial Network-Based Approach for 3T to 7T Translation
Published 2024“…Efforts are underway to develop algorithms that can generate 7T MRI from 3T MRI to achieve better image quality without the need for 7T MRI machines. …”
-
204
Machine Learning Approach for the Design of an Assessment Outcomes Recommendation System
Published 2021“…It is believed that the evaluation of the outcomes of the course, based on grades, is necessary to improve the teaching and learning process. Our research processes and workflows supported by AI utilize machine learning technology in order to interpret big data, analyze broad data sets and recognize associations with more reliably. …”
Get full text
Get full text
-
205
Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements
Published 2023“…Therefore, we designed a dedicated two-stage strategy, inspired by the CPR algorithm, where a block preconditioner is used for the pressure part with the aim at exploiting the inner $$2\times 2$$ 2 × 2 structure. …”
-
206
Predicting long-term type 2 diabetes with support vector machine using oral glucose tolerance test
Published 2019“…In this paper, we present an automatic tool that uses machine learning techniques to predict the development of type 2 diabetes mellitus (T2DM). Data generated from an oral glucose tolerance test (OGTT) was used to develop a predictive model based on the support vector machine (SVM). …”
-
207
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. …”
-
208
Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE
Published 2020“…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …”
Get full text
-
209
Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO
Published 2022“…<p dir="ltr">Recently, electrochemical reduction of CO<sub>2</sub> into value-added fuels has been noticed as a promising process to decrease CO<sub>2</sub> emissions. …”
-
210
Energy-aware adaptive compression for mobile devices. (c2009)
Published 2009Get full text
Get full text
masterThesis -
211
Optimization of Piezoelectric Sensor-Actuator for Plate Vibration Control Using Evolutionary Computation: Modeling, Simulation and Experimentation
Published 2021“…<p dir="ltr">The development of lightweight, stronger, and more flexible structures has received the utmost interest from many researchers. …”
-
212
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis -
213
-
214
C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments
Published 2023“…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …”
Get full text
Get full text
Get full text
-
215
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
-
216
A heuristics for HTTP traffic identification in measuring user dissimilarity
Published 2020“…The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. …”
-
217
Cohen syndrome and early-onset epileptic encephalopathy in male triplets: two disease-causing mutations in VPS13B and NAPB
Published 2023“…Diagnostic exome sequencing (ES), the applied next-generation sequencing approach, revealed the interesting finding of two novel homozygous variants in two genes: VPS13B missense variant (c.8516G > A) and NAPB splice-site loss (c.354 + 2 T > G). …”
-
218
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
Published 2023“…<p dir="ltr">The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. …”
-
219
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las...
Published 2020“…In view of this, an innovative signal processing technique called a self-adaptive-smart algorithm (SASA) was designed and developed. …”
Get full text
-
220
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
Published 2024“…To perform the experiment, we focused on the field of mathematics and used a dataset containing 525 individuals who received awards and 525 individuals who did not receive awards. The rules were developed for each parameter category using the Decision Tree Algorithm, which achieved an average accuracy of 70 to 75 percent for identifying awardees in mathematics domains. …”