Search alternatives:
processing algorithm » processing algorithms (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
341
Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO
Published 2022“…Accordingly, a dataset containg 258 data points was extracted from the DFT method to use in machine learning method. …”
-
342
-
343
Sentiment Analysis of Dialectal Speech: Unveiling Emotions through Deep Learning Models
Published 2024“…Dialect Speech Sentiment Analysis is an evolutional field where machine learning algorithms are utilized to detect emotions in spoken language. …”
Get full text
-
344
CEAP
Published 2016“…The first challenge is related to the highly mobile nature of vehicles that complicates the processes of monitoring, buffering, and analyzing observations on these vehicles as they are continuously moving and changing their locations. …”
Get full text
Get full text
Get full text
Get full text
article -
345
An Enhanced Approach for Solar PV Hosting Capacity Analysis in Distribution Networks
Published 2022“…The developed algorithms were tested on the IEEE 123 bus network, and their results were compared. …”
-
346
-
347
H.264/AVC to HEVC Video Transcoder Based on Dynamic Thresholding and Content Modeling
Published 2014“…This paper proposes and evaluates several transcoding algorithms from the H.264/AVC to the HEVC format. In particular, a novel transcoding architecture, in which the first frames of the sequence are used to compute the parameters so that the transcoder can 'learn' the mapping for that particular sequence, is proposed. …”
Get full text
article -
348
A Digital DNA Sequencing Engine for Ransomware Analysis using a Machine Learning Network
Published 2020“…The research work proposes a novel detection mechanism for ransomware using machine learning approach using Digital DNA sequencing. …”
Get full text
-
349
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …”
Get full text
Get full text
Get full text
article -
350
Discrimination between genuine and acted expressions using EEG signals and machine learning
Published 2019Get full text
doctoralThesis -
351
AI-Based Methods for Predicting Required Insulin Doses for Diabetic Patients
Published 2015“…The performance of the three algorithms is evaluated on a data set found in the public UCMI repository.…”
Get full text
Get full text
article -
352
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
Published 2011“…The proposed scheme monitors the signal strength level during the file transfer process and compresses data blocks on-the-fly only whenever energy reduction gain is expected. …”
Get full text
Get full text
Get full text
article -
353
Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects
Published 2023“…The situation may cause concern and trepidation about integrating AI technologies and lack understanding of their optimal deployment and operation. Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …”
Get full text
-
354
Sense and Learn: Recent Advances in Wearable Sensing and Machine Learning for Blood Glucose Monitoring and Trend-Detection
Published 2022“…We also review methods that use machine learning algorithms to predict blood glucose trends, especially for high risk events such as hypoglycemia. …”
-
355
Common weaving approach in mainstream languages for software security hardening
Published 2013“…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. …”
Get full text
Get full text
Get full text
article -
356
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
357
Machine Learning Techniques for Pharmaceutical Bioinformatics
Published 2018“…A predictive model is developed to predict drug indication as well as to predict new DDIs using multiple machine learning algorithms. …”
Get full text
-
358
Dynamic single node failure recovery in distributed storage systems
Published 2017“…We selected fractional repetition coding due to its simple repair mechanism that minimizes the repair and disk access bandwidths together with the property of un-coded repair process. To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …”
Get full text
Get full text
Get full text
Get full text
article -
359
ISSP
Published 2017“…Many decision-support tools were developed to assist planners in space scheduling but these were limited to providing the user with a platform that ties spatial and temporal data in the project and left it up to the user to decide on positions of resources and schedule adjustments to solve spatial conflicts that may arise in the process of constructing site layouts over time.The ISSP system, presented here, provides a graphical user-interactive interface with underlying layout and scheduling algorithms that construct feasible layout and schedule solutions under 2-dimensional spatial constraints between resources. …”
Get full text
Get full text
Get full text
conferenceObject -
360
The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation
Published 2007“…We particularly discuss multimedia primary horizontal fragmentation and focus on semantic-based textual predicates implication required as a pre-process in current fragmentation algorithms in order to partition multimedia data efficiently. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject