Showing 201 - 220 results of 461 for search '(( element data algorithm ) OR ((( data processing algorithm ) OR ( based finding algorithm ))))*', query time: 0.13s Refine Results
  1. 201
  2. 202

    Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE by Mathew, Elezabeth

    Published 2020
    “…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …”
    Get full text
  3. 203

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. …”
  4. 204
  5. 205
  6. 206

    AI-Based Methods for Predicting Required Insulin Doses for Diabetic Patients by Azar, Danielle

    Published 2015
    “…Hence, there is a great need to automate this process. In this paper, we propose and compare three techniques two of which are Artificial Intelligence techniques, namely C4.5 and Case-Based Reasoning, and the third one is a meta-heuristic namely genetic algorithms. …”
    Get full text
    Get full text
    article
  7. 207

    Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants by Surbhi Choudhary (21633701)

    Published 2024
    “…It also provides implications for tech-managers and algorithm designers to build effective voice technology for superior user experience.…”
  8. 208

    Optimization of Piezoelectric Sensor-Actuator for Plate Vibration Control Using Evolutionary Computation: Modeling, Simulation and Experimentation by Asan G. A. Muthalif (16888818)

    Published 2021
    “…The analytical model is derived based on the Euler-Bernoulli model. The Optimal location of the collocated sensor-actuator, as well as PID controller gains, are determined using Ant Colony Optimization (ACO) technique, then compared with the Genetic Algorithm (GA) and enumerative method (EM). …”
  9. 209
  10. 210

    C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments by Raun, Kristo

    Published 2023
    “…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …”
    Get full text
    Get full text
    Get full text
  11. 211

    Energy Hub Optimal Scheduling and Management in the Day-Ahead Market Considering Renewable Energy Sources, CHP, Electric Vehicles, and Storage Systems Using Improved Fick’s Law Alg... by Ali S. Alghamdi (12722891)

    Published 2023
    “…In this paper, the scheduling and management framework of an energy hub (EH) is presented with the aim of energy profit maximization in partnership with electricity, natural gas, and district heating networks (EGHNs) considering the coordinated multi-energy management based on the day-ahead market. The optimum capacity of EH equipment, including photovoltaic and wind renewable energy sources, a combined heat and power system (CHP), a boiler, energy storage, and electric vehicles is determined in the day-ahead market using the improved Fick’s law algorithm (IFLA), considering the energy profit maximization and also satisfying the linear network and hub constraints. …”
  12. 212
  13. 213

    A heuristics for HTTP traffic identification in measuring user dissimilarity by Adeyemi R. Ikuesan (14157123)

    Published 2020
    “…The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. The algorithm was experimentally tested on a group of users, to ascertain the certainty of identifying user-initiated requests. …”
  14. 214

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection by Zina Chkirbene (16869987)

    Published 2020
    “…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
  15. 215

    A 3-D vision-based man-machine interface for hand-controlled telerobot by Al-Mouhamed, M.A.

    Published 2005
    “…To determine the three-dimensional (3-D) position a tracking algorithm based on uncalibrated cameras with weak perspective projection model is used. …”
    Get full text
    Get full text
    article
  16. 216

    Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems by Jaber Al-Khori (16855470)

    Published 2019
    “…We develop physical layer security algorithms that mitigate eavesdropping on both RF and VLC networks based on zero-forcing beamforming techniques. …”
  17. 217
  18. 218

    Defining quantitative rules for identifying influential researchers: Insights from mathematics domain by Ghulam Mustafa (458105)

    Published 2024
    “…<p>In the midst of a vast amount of scientific literature, the need for specific rules arise especially when it comes to deciding which impactful researchers should be nominated. These rules are based on measurable quantities that can easily be applied to a researcher's quantitative data. …”
  19. 219

    Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation by Hariprasath Manoharan (14157966)

    Published 2023
    “…<p dir="ltr">The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. …”
  20. 220

    Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las... by Masurkar, Faeez

    Published 2020
    “…In view of this, an innovative signal processing technique called a self-adaptive-smart algorithm (SASA) was designed and developed. …”
    Get full text