Search alternatives:
processing algorithm » processing algorithms (Expand Search)
research algorithm » search algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
Showing 661 - 680 results of 733 for search '(( element research algorithm ) OR ((( based method algorithm ) OR ( data processing algorithm ))))', query time: 0.14s Refine Results
  1. 661

    CEAP by Abdel Wahab, Omar

    Published 2016
    “…The first challenge is related to the highly mobile nature of vehicles that complicates the processes of monitoring, buffering, and analyzing observations on these vehicles as they are continuously moving and changing their locations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 662

    Gene-specific machine learning model to predict the pathogenicity of BRCA2 variants by Mohannad N. Khandakji (13885434)

    Published 2022
    “…Local, gene-specific information have been shown to aid variant pathogenicity prediction; therefore, our aim was to develop a BRCA2-specific machine learning model to predict pathogenicity of all types of BRCA2 variants.</p><p><br></p><h3>Methods</h3><p dir="ltr">We developed an XGBoost-based machine learning model to predict pathogenicity of BRCA2 variants. …”
  3. 663

    Designing Cellular Mobile Networks Using Non{Deterministic Iterative Heuristics by Sait, Sadiq M.

    Published 2020
    “…Hence, a randomized, heuristic algorithm, such as Simulated Evolution is used in this work to optimize the transmission costs in cellular networks. …”
    Get full text
    article
  4. 664

    Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer by Andrea Remo (447375)

    Published 2015
    “…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …”
  5. 665

    Cyberbullying Detection in Arabic Text using Deep Learning by ALBAYARI, REEM RAMADAN SA’ID

    Published 2023
    “…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …”
    Get full text
  6. 666

    The political economy of AI: a content analysis of ChatGPT outputs and anti-Palestinian media bias by King, Gretchen

    Published 2026
    “…A theoretical framework for analysing digital Orientalism is advanced through a historicisation of media imperialism, the military–industrial–communications complex and the political economy of AI in occupied Palestine. Grounded in research-based teaching methods, and employing a mixed-method content and frequency analysis and comparison of ChatGPT outputs in English and Arabic, this article expands research on AI biases, algorithmic oppression and digital divides within the context of digital Orientalism and anti-Palestinianism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 667

    A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem by Habchi, Wassim

    Published 2008
    “…The complexity is the same as for classical algorithms, but an improved convergence rate, a reduced size of the problem and a sparse Jacobian matrix are obtained. …”
    Get full text
    Get full text
    Get full text
    article
  8. 668

    Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network by Monzure-Khoda Kazi (17191207)

    Published 2024
    “…These algorithms include random forest (RF) classification and artificial neural networks (ANN). …”
  9. 669

    Comparative assessment of fracture risk among osteoporosis and osteopenia patients: a cross-sectional study by Snezana Tomasevic-Todorovic (5782682)

    Published 2018
    “…The assessment of the fracture risk was executed by applying the Fracture Assessment Risk (FRAX) index (an algorithm developed by the World Health Organization) based on clinical fracture risks or combination of clinical fracture risks and bone mineral density.…”
  10. 670

    Current trends and future orientation in diagnosing lung pathologies: A systematic survey by Noorizadeh, Mohammad

    Published 2025
    “…These VOCs can aid in the diagnosis of lung pathologies such as pneumonia. The CV processing method involves the application of advanced imaging techniques and machine learning algorithms to scrutinize and diagnose lung pathologies and ventilator-associated pneumonia (VAP). …”
    Get full text
    Get full text
    Get full text
    article
  11. 671

    Optimal Trajectory and Positioning of UAVs for Small Cell HetNets: Geometrical Analysis and Reinforcement Learning Approach by Mohammad Taghi Dabiri (16904658)

    Published 2023
    “…Then, using geometrical analysis and deep reinforcement learning (RL) method, we propose several algorithms to find the optimal trajectory and select an optimal pattern during the trajectory. …”
  12. 672

    MLMRS-Net: Electroencephalography (EEG) motion artifacts removal using a multi-layer multi-resolution spatially pooled 1D signal reconstruction network by Sakib Mahmud (15302404)

    Published 2022
    “…Leave-one-out cross-validation method was used in this work. The performance of the deep learning models is measured using three well-known performance matrices viz. mean absolute error (MAE)-based construction error, the difference in the signal-to-noise ratio (ΔSNR), and percentage reduction in motion artifacts (<i>η</i>). …”
  13. 673

    Multimodal feature fusion and ensemble learning for non-intrusive occupancy monitoring using smart meters by Sakib Mahmud (15302404)

    Published 2025
    “…We combine features from all three modes of MMF-NIOM to achieve a state-of-the-art non-intrusive occupancy classification performance of 91.5 % accuracy and 91.5 % f1-score, approximately, by an ensemble of fine-tuned classifiers on the electricity consumption & occupancy (ECO) dataset. The proposed method is sustainable, robust, adaptable to various households, and can be mass-implemented within smart meters at a much lower cost and effort compared to the traditional internet of things (IoT)-based intrusive systems.…”
  14. 674

    Deep Learning in Smart Grid Technology: A Review of Recent Advancements and Future Prospects by Mohamed Massaoudi (16888710)

    Published 2021
    “…Motivated by the outstanding success of DL-based prediction methods, this article attempts to provide a thorough review from a broad perspective on the state-of-the-art advances of DL in SG systems. …”
  15. 675

    Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis by Hassan, Ali

    Published 2023
    “…We thus propose Con-Detect—a Contribution based Detection method—for detecting adversarial attacks against NLP classifiers. …”
    Get full text
    Get full text
    Get full text
    article
  16. 676

    Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis by Hassan Ali (3348749)

    Published 2023
    “…We thus propose Con-Detect—a Contribution based Detection method—for detecting adversarial attacks against NLP classifiers. …”
  17. 677

    A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications by Sharafeddine, Sanaa

    Published 2011
    “…The proposed scheme monitors the signal strength level during the file transfer process and compresses data blocks on-the-fly only whenever energy reduction gain is expected. …”
    Get full text
    Get full text
    Get full text
    article
  18. 678

    Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects by ALKAABI, ABDULLA

    Published 2023
    “…The situation may cause concern and trepidation about integrating AI technologies and lack understanding of their optimal deployment and operation. Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …”
    Get full text
  19. 679
  20. 680

    Dynamic single node failure recovery in distributed storage systems by Itani, M.

    Published 2017
    “…We selected fractional repetition coding due to its simple repair mechanism that minimizes the repair and disk access bandwidths together with the property of un-coded repair process. To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article