Search alternatives:
training algorithm » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
based training » based learning (Expand Search)
element » elements (Expand Search)
Showing 121 - 140 results of 403 for search '(( element method algorithm ) OR ((( data including algorithm ) OR ( based training algorithm ))))', query time: 0.12s Refine Results
  1. 121

    Calibration of building model based on indoor temperature for overheating assessment using genetic algorithm: Methodology, evaluation criteria, and case study by Mutasim Baba, Fuad

    Published 2022
    “…This paper presents a robust automated methodology that can calibrate a building simulation model based on the indoor hourly temperature in multiple rooms simultaneously with high accuracy. This methodology includes a variance-based sensitivity analysis to determine building parameters that significantly influence indoor air temperatures, the Multi-Objective Genetic Algorithm to calibrate different rooms simultaneously based on the significant param eters identified by the sensitivity analysis, and new evaluation criteria to achieve a high-accuracy calibrated model. …”
    Get full text
    Get full text
    Get full text
  2. 122

    Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St... by Mohamed Elsayed Saad Aboudonya (18466385)

    Published 2024
    “…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. …”
  3. 123

    Energy-Efficient VoI-Aware UAV-Assisted Data Collection in Wireless Sensor Networks by Kalash, Saeddin

    Published 2025
    “…We then decompose the problem into two sub-problems where wepropose real-time approaches including (1) data redundancy avoidance and VoI evaluation, and (2) dynamic UAV deployment and position adaptation. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  4. 124

    Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval by Mohammed Tahar Habib Kaib (21633176)

    Published 2024
    “…Generally, RKPCA reduces the number of samples in the training data set and then builds the KPCA model based on this data set. …”
  5. 125
  6. 126
  7. 127

    Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques by Fares, Samar

    Published 2024
    “…An objective function utilizing the covariance of the fused tracks is used by the first algorithm while a cost function based on the Kullback-Leibler (KL) divergence measure is used in the second case for training the LSTM. …”
    Get full text
  8. 128

    PILE-UP FREE PARAMETER ESTIMATION AND DIGITAL ONLINE PEAK LOCALIZATION ALGORITHMS FOR GAMMA RAY SPECTROSCOPY by Noras, J.M.

    Published 2020
    “…A number of parameter estimation and digital online peak localisation algorithms are being developed, including a pulse classification technique which uses a simple peak search routine based on the smoothed first derivative method, which gave a percentage error of peak amplitude of less than 0.1. …”
    Get full text
    article
  9. 129
  10. 130

    Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem by Assaker, Guy

    Published 2016
    “…This research note describes Response-Based Unit Segmentation (REBUS), a “latent class detection” technique used in partial least squares–structural equation modeling (PLS-SEM) to examine data heterogeneity. The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 131
  12. 132

    Evaluation of C-arm CT metal artifact reduction algorithm during intra-aneurysmal coil embolization by Chintalapani, Gouthami

    Published 2016
    “…This analysis was carried out to assess the improvements in both brain parenchyma and device visibility with MAR algorithm. Further, ground truth reference images from phantom experiments and clinical data were used for accurate assessment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  13. 133
  14. 134

    Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network by Mohammad Reza Chalak Qazani (13893261)

    Published 2024
    “…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …”
  15. 135

    Detecting sleep outside the clinic using wearable heart rate devices by Ignacio Perez-Pozuelo (14153007)

    Published 2022
    “…We evaluated it on four study cohorts using different research- and consumer-grade devices for over 2000 nights. Recording periods included both 24 h free-living and conventional lab-based night-only data. …”
  16. 136
  17. 137

    Bird’s Eye View feature selection for high-dimensional data by Samir Brahim Belhaouari (16855434)

    Published 2023
    “…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
  18. 138
  19. 139
  20. 140

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT by Arumugam K (18456690)

    Published 2021
    “…Specifically, Novel Supportive Twin Delayed DDPG trains the user model to authenticate specific regions. …”