Search alternatives:
processing algorithm » processing algorithms (Expand Search)
research algorithm » search algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data research » do research (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
research algorithm » search algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data research » do research (Expand Search)
element » elements (Expand Search)
-
81
-
82
-
83
A reduced model for phase-change problems with radiation using simplified PN approximations
Published 2025“…The integro-differential equation for the full radiative transfer is replaced by a set of differential equations which are independent of the angle variable and easy to solve using conventional computational methods. To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. …”
Get full text
article -
84
-
85
Machine Learning-Driven Prediction of Corrosion Inhibitor Efficiency: Emerging Algorithms, Challenges, and Future Outlooks
Published 2025“…At the same time, virtual sample augmentation and genetic algorithm feature selection elevate sparse data performance, raising k-nearest neighbor models from R<sup>2</sup> = 0.05 to 0.99 in a representative thiophene set. …”
-
86
Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images
Published 2022“…Therefore, early and accurate diagnosis and classification of breast lesions into malignant or benign lesions is an active domain of research. Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. …”
-
87
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
Published 2007“…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
Get full text
Get full text
Get full text
article -
88
Efficient Approximate Conformance Checking Using Trie Data Structures
Published 2021“…Conformance checking compares a process model and recorded executions of a process, i.e., a log of traces. …”
Get full text
Get full text
Get full text
-
89
-
90
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
91
Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations
Published 2025“…<p dir="ltr">Cyber threats are increasingly frequent in today’s world, posing challenges for organizations and individuals to protect their data from cybercriminals. On the other hand, Generative Artificial Intelligence (GAI) technology offers an efficient way to automatically address these issues with the help of AI models and algorithms. …”
-
92
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
Published 2016Subjects: Get full text
doctoralThesis -
93
Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms
Published 2022“…While the previous studies mostly used ANN to demonstrate the capability of MLs to predict PG over the mechanistic or correlation-based models, the present research has shown that GP is even better than ANN using a wide range of FPs and a large data set.…”
-
94
Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights
Published 2021“…Connecting the ubiquitous sensing and big data processing of critical information in infrastructures through the IoT paradigm is the future of SHM systems. …”
Get full text
article -
95
-
96
-
97
-
98
Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering
Published 2022“…This paper proposes a new data clustering method using the advantages of metaheuristic (MH) optimization algorithms. …”
-
99
Exploring the Impact of Explainable Artificial Intelligence on Decision-making in Healthcare
Published 2023“…The study analyses the benefits and limitations of applying XAI in healthcare decision-making processes through an exhaustive analysis of current literature and empirical data. …”
Get full text
-
100
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
Published 2019Get full text
article