Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
Showing 801 - 820 results of 921 for search '(( element method algorithm ) OR ((( data using algorithm ) OR ( test using algorithm ))))', query time: 0.12s Refine Results
  1. 801

    Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects by ALKAABI, ABDULLA

    Published 2023
    “…Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …”
    Get full text
  2. 802

    Low-Cost Reduced Navigation System for Mobile Robot in Indoor/Outdoor Environments by Al Khatib, Ehab

    Published 2020
    “…For the indoor environment, where GPS signals are blocked, another EKF algorithm is proposed using low cost depth sensor (Microsoft Kinect stream). …”
    Get full text
    article
  3. 803
  4. 804

    Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis by Ashraf Gad (17040114)

    Published 2024
    “…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…”
  5. 805
  6. 806

    Dynamic single node failure recovery in distributed storage systems by Itani, M.

    Published 2017
    “…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 807

    Deepfakes Signatures Detection in the Handcrafted Features Space by Hamadene, Assia

    Published 2023
    “…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
    Get full text
  8. 808
  9. 809

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
  10. 810
  11. 811
  12. 812

    Hybrid Interval Type-2 Fuzzy PID+I Controller for a Multi-DOF Oilwell Drill-String System by Abdelbaset Laib (16904688)

    Published 2022
    “…An optimal hybrid interval Type-2 fuzzy PID+I logic controller (OH-IT2FPID+I) using a practical swarm optimization algorithm for a multi-degree-of-freedom oil well drill-string system is proposed in this paper. …”
  13. 813

    Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer by Andrea Remo (447375)

    Published 2015
    “…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …”
  14. 814
  15. 815
  16. 816

    Axes-Based Encryption Key by Haidar, Imane

    Published 2018
    “…For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 817

    ON THE FFT OF 1-BIT DITHER-QUANTIZED DETERMINISTIC SIGNALS by Cheded, L.

    Published 2020
    “…This loss in accuracy will in turn prohibit exploiting the practical advantages that an FFT algorithm, with a coarsely-quantized input, will otherwise enjoy. …”
    Get full text
    article
  18. 818

    On the protection of power system: Transmission line fault analysis based on an optimal machine learning approach by Md. Sihab Uddin (17542488)

    Published 2022
    “…The design is carried out based on the selection of the optimal model parameters using a search optimization algorithm called GridSearchCV. …”
  19. 819
  20. 820

    Resilience analytics: coverage and robustness in multi-modal transportation networks by Abdelkader Baggag (14153040)

    Published 2018
    “…In this work, we propose MUME, an efficient algorithm for Multi-modal Urban Mobility Estimation, that takes advantage of the special structure of the supra-Laplacian matrix of the transportation multiplex, to compute the coverage of the system. …”