Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
update » updated (Expand Search)
Showing 281 - 300 results of 880 for search '(( element update algorithm ) OR ((( data processing algorithm ) OR ( model using algorithm ))))', query time: 0.13s Refine Results
  1. 281

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model by Ramesh Sundar (19326046)

    Published 2024
    “…The proposed approach of DDN is trained with proper data sequences used for communication and the training phase is conducted with the norms of numerous channel variants. …”
  2. 282

    Interpreting patient-Specific risk prediction using contextual decomposition of BiLSTMs: application to children with asthma by Rawan AlSaad (14159019)

    Published 2019
    “…</p><h3>Methods</h3><p dir="ltr">We use a real EHR dataset comprising 11071 patients, to evaluate and compare CD interpretations from LSTM and BiLSTM models. …”
  3. 283

    Improving MRI Resolution: A Cycle Consistent Generative Adversarial Network-Based Approach for 3T to 7T Translation by Zakaria Shams Siam (22048001)

    Published 2024
    “…However, the exorbitant expenses associated with 7T MRI scanners hinder their broad use in research and clinical facilities. Efforts are underway to develop algorithms that can generate 7T MRI from 3T MRI to achieve better image quality without the need for 7T MRI machines. …”
  4. 284
  5. 285
  6. 286
  7. 287

    Fast Transient Stability Assessment of Power Systems Using Optimized Temporal Convolutional Networks by Mohamed Massaoudi (16888710)

    Published 2024
    “…The proposed algorithm unlocks scalability and system adaptability to operational variability by adopting numeric imputation and missing-data-tolerant techniques. …”
  8. 288

    Scatter search for homology modeling by Mansour, Nashat

    Published 2016
    “…Results obtained by our SS algorithm are compared with other approaches. The 3D models predicted by our algorithm show improved root mean standard deviations with respect to the native structures.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 289

    KNNOR: An oversampling technique for imbalanced datasets by Ashhadul Islam (16869981)

    Published 2021
    “…<p>Predictive performance of Machine Learning (ML) models rely on the quality of data used for training the models. …”
  10. 290

    Multi-Model Investigation and Adaptive Estimation of the Acoustic Release of a Model Drug From Liposomes by Wadi, Ali

    Published 2019
    “…The three moieties were chosen to target specific cancers using receptor-mediated endocytosis. The best-fitting mathematical model is then enhanced using a Kalman filtering (KF) algorithm to account for the statistics of the dynamic and measurements noise sequences in predicted drug release. …”
    Get full text
    article
  11. 291
  12. 292

    On sensor selection in mobile devices based on energy, application accuracy, and context metrics by Taleb, Sireen

    Published 2013
    “…We use this algorithm to build a sensor selection model to choose among location sensors. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 293
  14. 294

    Rigorous Phase Equilibrium Calculation Methods for Strong Electrolyte Solutions: The Isothermal Flash by Ilias K. Nikolaidis (9217172)

    Published 2022
    “…The calculations are performed with the electrolyte Statistical Associating Fluid Theory with the Mie potential of variable range (eSAFT-VR Mie) equation of state but the proposed methods are general and could be used with any other thermodynamic model.</p><h2>Other Information</h2><p dir="ltr">Published in: Fluid Phase Equilibria<br>License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.fluid.2022.113441" target="_blank">https://dx.doi.org/10.1016/j.fluid.2022.113441</a></p>…”
  15. 295

    A Parallel Genetic Algorithm for the Geometrically Constrained Site Layout Problem with Unequal-Size Facilities by Zouein, Pierrette P.

    Published 2010
    “…Parallel genetic algorithms techniques have been used in a variety of computer engineering and science areas. …”
    Get full text
    Get full text
    Get full text
    article
  16. 296

    Machine Learning-Driven Prediction of Corrosion Inhibitor Efficiency: Emerging Algorithms, Challenges, and Future Outlooks by Najam Us Sahar Riyaz (22927843)

    Published 2025
    “…At the same time, virtual sample augmentation and genetic algorithm feature selection elevate sparse data performance, raising k-nearest neighbor models from R<sup>2</sup> = 0.05 to 0.99 in a representative thiophene set. …”
  17. 297

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group by Iqtadar Hussain (14147850)

    Published 2023
    “…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
  18. 298

    Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images by Ahila A (18394806)

    Published 2022
    “…Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. However, these schemes have limitations like slow convergence and longer training time. …”
  19. 299

    Fuzzy Logic Adaptive Crow Search Algorithm for MPPT of a Partially Shaded Photovoltaic System by Mohamed Ali Zeddini (22047920)

    Published 2024
    “…Three distinct situations are used to validate the efficacy and speed of the proposed FL-CSA through numerical modeling and experimental testing. …”
  20. 300

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare by Haraty, Ramzi A.

    Published 2007
    “…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
    Get full text
    Get full text
    Get full text
    article