Showing 841 - 860 results of 884 for search '(( element data algorithm ) OR ((( image modeling algorithm ) OR ( system using algorithm ))))', query time: 0.16s Refine Results
  1. 841

    A Comprehensive Review of Digital Twin Technology in Building Energy Consumption Forecasting by Maissa Boukaf (22282279)

    Published 2024
    “…<p dir="ltr">With the global rise in urban populations, energy consumption in buildings has become a critical issue, now accounting for about 30% of total global energy use. Developing powerful energy forecasting systems is challenging due to frequent fluctuations in energy demand. …”
  2. 842

    Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort by Sergio Márquez-Sánchez (19437985)

    Published 2023
    “…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
  3. 843
  4. 844

    An intelligent approach to predicting the effect of nanoparticle mixture ratio, concentration and temperature on thermal conductivity of hybrid nanofluids by Ifeoluwa Wole-Osho (14151315)

    Published 2020
    “…A polynomial correlation model, the adaptive neuro-fuzzy inference system model and an artificial neural network model optimised with three different learning algorithms. …”
  5. 845

    Sentiment visualization of correlation of loneliness mapped through social intelligence analysis by Hurmat Ali Shah (18192889)

    Published 2024
    “…<h3>Background</h3><p dir="ltr">Loneliness is a global public health issue affecting a considerable number of people as well as burdening the public health system and increasing the risk of other life-threatening and life-damaging conditions. …”
  6. 846
  7. 847
  8. 848

    Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review by Yazeed Yasin Ghadi (16667109)

    Published 2024
    “…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …”
  9. 849

    An XML Document Comparison Framework by Tekli, Joe

    Published 2001
    “…Most of them make use of techniques for finding the edit distance between tree structures, XML documents being modeled as Ordered Labeled Trees. …”
    Get full text
    Get full text
    Get full text
    article
  10. 850

    A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics by Tekli, Joe

    Published 2011
    “…Most of them make use of techniques for finding the edit distance between tree structures, XML documents being commonly modeled as Ordered Labeled Trees. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 851
  12. 852
  13. 853

    FoGMatch by Arisdakessian, Sarhad

    Published 2019
    “…To address this problem, we propose in this paper a multi-criteria intelligent IoT scheduling approach in fog computing environments using matching game theory. Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  14. 854

    Full-fledged semantic indexing and querying model designed for seamless integration in legacy RDBMS by Tekli, Joe

    Published 2018
    “…In the past decade, there has been an increasing need for semantic-aware data search and indexing in textual (structured and NoSQL) databases, as full-text search systems became available to non-experts where users have no knowledge about the data being searched and often formulate query keywords which are different from those used by the authors in indexing relevant documents, thus producing noisy and sometimes irrelevant results. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  15. 855
  16. 856
  17. 857

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
    Get full text
  18. 858

    Data mining approach to predict student's selection of program majors by SIDDARTHA, SHARMILA

    Published 2019
    “…This study presents an approach to design and deploy a data mining project that can be used as a basis for developing systems to enable the selection of student majors.…”
    Get full text
  19. 859
  20. 860

    Developing an online hate classifier for multiple social media platforms by Joni Salminen (7434770)

    Published 2020
    “…We make our code publicly available for application in real software systems as well as for further development by online hate researchers.…”