Search alternatives:
lacking algorithm » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
lacking algorithm » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
-
181
Exploratory risk prediction of type II diabetes with isolation forests and novel biomarkers
Published 2024“…In particular, Isolation Forest (iForest) was applied as an anomaly detection algorithm to address class imbalance. iForest was trained on the control group data to detect cases of high risk for T2DM development as outliers. …”
Get full text
-
182
Public schools regrouping decision support system. (c1997)
Published 1997Get full text
Get full text
masterThesis -
183
ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles
Published 2023“…The design of an efficient routing algorithm for the Internet of Vehicles (IoV) poses several problems due to its special characteristics, including nodes high-speed mobility, frequent topology change, link instability, and the presence of radio obstacles. …”
Get full text
Get full text
Get full text
Get full text
article -
184
A multi-pretraining U-Net architecture for semantic segmentation
Published 2025“…<p dir="ltr">Pathological cancer research relies heavily on different domain-specific applications including nucleus segmentation from histopathology images. …”
-
185
Active distribution network type identification method of high proportion new energy power system based on source-load matching
Published 2023“…Firstly, the typical daily output scenarios of DG are extracted by clustering method, and the generalized load curve model is solved by the optimization algorithm to obtain the source load operation data; Secondly, calculate the source-load matching indicators (including matching performance, matching degree, and matching rate) according to the source load data of each region, and identify the distribution network type according to the range of the index values; Finally, several indicators are introduced to quantify the characteristics of different types of distribution networks. …”
Get full text
Get full text
Get full text
article -
186
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…Accordingly security threats and data banks attacks turn out to be a phenomenon. Thus, granting protection to such crucial information becomes a high demand. …”
Get full text
-
187
Scatter search metaheuristic for homology based protein structure prediction. (c2015)
Published 2015Get full text
Get full text
masterThesis -
188
Communications in electronic textile systems
Published 2017“…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …”
Get full text
Get full text
Get full text
conferenceObject -
189
AI-based remaining useful life prediction and modelling of seawater desalination membranes
Published 2024Get full text
doctoralThesis -
190
PERF solutions for distributed query optimization. (c1999)
Published 1999Get full text
Get full text
masterThesis -
191
A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns
Published 2023“…The important feature subset is identified using the modified Binary Grey Wolf Optimization Particle Swarm Optimization (BGWOPSO) algorithm. The MLs' performance is evaluated using metrics including accuracy, sensitivity, specificity, and F1-score for the M1, and coefficient of variation of root mean squared error, mean absolute percentage error (MAPE), and median absolute percentage error for the M2. …”
-
192
Land Use/Land Cover Changes Impact on Groundwater Level and Quality in the Northern Part of the United Arab Emirates
Published 2020“…Each pair of enhanced LULC maps (1990–2000, 2000–2010, 2010–2018, and 1990–2018) were used as input data for an image difference algorithm to monitor LULC changes. …”
Get full text
article -
193
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
Published 2020“…The CRC chip can be used in anumber of applications. These include areas such as error detection and correction in data comunication, signature analysis and mass storage devices for parallel information transfers.…”
Get full text
article -
194
Assigning proctors to exams using scatter search. (c2006)
Published 2006Get full text
Get full text
masterThesis -
195
Single-Cell Transcriptome Analysis Revealed Heterogeneity and Identified Novel Therapeutic Targets for Breast Cancer Subtypes
Published 2023“…In the current study, we employed computational algorithms to decipher the cellular composition of estrogen receptor-positive (ER<sup>+</sup>), HER2<sup>+</sup>, ER<sup>+</sup>HER2<sup>+</sup>, and triple-negative BC (TNBC) subtypes from a total of 49,899 single cells’ publicly available transcriptomic data derived from 26 BC patients. …”
-
196
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
Published 2024“…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
-
197
-
198
Hardware design and VLSI implementation of a byte-wise CRCgenerator chip
Published 1995“…The CRC chip can be used in a number of applications. These include areas such as error detection and correction in data communications, signature analysis, and mass storage devices for parallel information transfers…”
Get full text
Get full text
article -
199
The Effectiveness of Supervised Machine Learning in Screening and Diagnosing Voice Disorders: Systematic Review and Meta-analysis
Published 2022“…Two reviewers independently selected the studies, extracted data from the included studies, and assessed the risk of bias. …”
-
200
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …”
Get full text