Search alternatives:
learning algorithm » learning algorithms (Expand Search)
mesh algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
e learning » _ learning (Expand Search), deep learning (Expand Search)
element » elements (Expand Search)
learning algorithm » learning algorithms (Expand Search)
mesh algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
e learning » _ learning (Expand Search), deep learning (Expand Search)
element » elements (Expand Search)
-
121
-
122
Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St...
Published 2024“…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. Those KPIs were Time to Confirm Cardiac Arrest; Code Blue and /or Code White Activation Time; Time to attempt first chest compression; Defibrillator Arrival Time; Time to First Defibrillation shock; Code blue/code white arrival time and Time to perform Perimortem Caesarean Delivery.…”
-
123
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997“…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …”
Get full text
Get full text
article -
124
Computation of conformal invariants
Published 2020“…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
Get full text
Get full text
Get full text
article -
125
Computation of conformal invariants
Published 2021“…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
-
126
Analysis of Using Machine Learning to Enhance the Efficiency of Facilities Management in the UAE
Published 2022“…This study addresses these issues by Implementing Machine Learning (ML) algorithms using data from Building Management Systems (BMS) and FM maintenance reports, focussing on predictive maintenance for Fresh Air Handling Units. …”
Get full text
-
127
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
Published 2024“…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
-
128
Downlink channel estimation for IMT-DS
Published 2001“…IMT-DS system is an approved terrestrial radio interface standard for 3G mobile communication based on direct sequence code division multiple access (DS-CDMA). It employs a RAKE receiver to exploit multipath diversity. …”
Get full text
Get full text
article -
129
Dynamic multiple node failure recovery in distributed storage systems
Published 2018“…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …”
Get full text
Get full text
Get full text
Get full text
article -
130
The Role of Artificial Intelligence in Decoding Speech from EEG Signals: A Scoping Review
Published 2022“…We categorized the studies based on AI techniques, such as machine learning and deep learning. The most prominent ML algorithm was a support vector machine, and the DL algorithm was a convolutional neural network. …”
-
131
Generic metadata representation framework for social-based event detection, description, and linkage
Published 2020“…SEDDaL consists of four main modules for: i) describing social media objects in a generic Metadata Representation Space Model (MRSM) consisting of three composite dimensions: temporal, spatial, and semantic, ii) evaluating the similarity between social media objects’ descriptions following MRSM, iii) detecting events from similar social media objects using an adapted unsupervised learning algorithm, where events are represented as clusters of objects in MRSM, and iv) identifying directional, metric, and topological relationships between events following MRSM’s dimensions. …”
Get full text
Get full text
Get full text
Get full text
article -
132
On-demand deployment of multiple aerial base stations for traffic offloading and network recovery
Published 2019“…In the case of abrupt disruption to existing cellular network operation or infrastructure, e.g., due to an unexpected surge in user demand or a natural disaster, UAVs can be deployed to provide instant recovery via temporary wireless coverage in designated areas. …”
Get full text
Get full text
Get full text
Get full text
article -
133
Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR)
Published 2018“…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …”
-
134
CEAP
Published 2016“…To reduce the overhead of the proposed detection model and make it feasible for the resource-constrained nodes, we reduce the size of the training dataset by (1) restricting the data collection, storage, and analysis to concern only a set of specialized nodes (i.e., Multi-Point Relays) that are responsible for forwarding packets on behalf of their clusters; and (2) migrating only few tuples (i.e., support vectors) from one detection iteration to another. …”
Get full text
Get full text
Get full text
Get full text
article -
135
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
-
136
Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network
Published 2024“…The ultimate target is to develop a robust multi-modal machine learning method to predict the optimum geometry (i.e., hexagonal ring angle) and suitable in-plane crushing arrangements of the hexagonal ring system for targeted crashworthiness parameters. …”
-
137
Design and analysis of entropy-constrained reflected residual vector quantization
Published 2002“…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …”
Get full text
Get full text
article -
138
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
Published 2008“…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
Get full text
Get full text
Get full text
article -
139
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
-
140
Role of authentication factors in Fin-tech mobile transaction security
Published 2023“…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”