Search alternatives:
modelling algorithm » scheduling algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
fbe algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
element » elements (Expand Search)
modelling algorithm » scheduling algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
fbe algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
element » elements (Expand Search)
-
201
-
202
C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments
Published 2023“…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. The state-of-the-art output from streaming confor mance checking is a prefix-alignment. …”
Get full text
Get full text
Get full text
-
203
-
204
Single channel speech denoising by DDPG reinforcement learning agent
Published 2025“…It achieves this performance by utilizing data that is 7 times smaller than that required by other models. …”
-
205
-
206
Optimising Nurse–Patient Assignments: The Impact of Machine Learning Model on Care Dynamics—Discursive Paper
Published 2025“…<h3>Background</h3><p dir="ltr">Machine learning (ML) models can enhance patient–nurse assignments in healthcare organisations by learning from real data and identifying key capabilities. …”
-
207
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
Published 2023“…Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …”
-
208
-
209
Integration of Textural and Material Information into BIM Using Spectrometry and Infrared Sensing
Published 2015Get full text
doctoralThesis -
210
-
211
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
Published 2020Get full text
doctoralThesis -
212
Development of Machine Learning Models for Studying the Premixed Turbulent Combustion of Gas-To-Liquids (GTL) Fuel Blends
Published 2024“…Based on previous 3D numerical analyses, this study aims to develop data-driven machine learning (ML) models for predicting the flame radius evolution and turbulent flame speeds for diesel, gas-to-liquids (GTL), and their 50/50 blend (by volumetric composition) under different thermodynamic and turbulence operating conditions. …”
-
213
Autopilot Design and Commercial Autopilot Evaluation Using Flybarless Helicopter
Published 2014Get full text
doctoralThesis -
214
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
Published 2024“…This selection process was guided by an importance score, that was derived after assessing its influence on the model's performance in the classification of data pertaining to both awardees and non awardees. …”
-
215
Boosting the visibility of services in microservice architecture
Published 2023“…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …”
-
216
-
217
Artificial Intelligence for the Prediction and Early Diagnosis of Pancreatic Cancer: Scoping Review
Published 2023“…Artificial intelligence (AI) provides advanced models and algorithms for better diagnosis of pancreatic cancer. …”
-
218
Decomposition-based wind power forecasting models and their boundary issue: An in-depth review and comprehensive discussion on potential solutions
Published 2022“…These methods generally disaggregate the original time series data into sub-time-series with better stationarity, and then the target data is predicted based on the sub-series. …”
-
219
Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations
Published 2025“…<p dir="ltr">Cyber threats are increasingly frequent in today’s world, posing challenges for organizations and individuals to protect their data from cybercriminals. On the other hand, Generative Artificial Intelligence (GAI) technology offers an efficient way to automatically address these issues with the help of AI models and algorithms. …”
-
220
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
Published 2024“…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”