Showing 541 - 560 results of 601 for search '(( elements could algorithm ) OR ((( data based algorithm ) OR ( data processing algorithm ))))*', query time: 0.10s Refine Results
  1. 541
  2. 542

    Artificial Intelligence–Driven Serious Games in Health Care: Scoping Review by Alaa Abd-alrazaq (17058018)

    Published 2022
    “…A narrative approach was used for data synthesis.</p><h3>Results</h3><p dir="ltr">The search process returned 1470 records. …”
  3. 543

    Framework for rapid design and optimisation of immersive battery cooling system by Ali Almshahy (23544823)

    Published 2025
    “…A conjugate heat transfer model for a 3S2P pouch cell module (20 Ah LiFePO₄) is developed and validated against experimental data (< 2% error). The CFD model of a battery module is developed to train an ultra-fast metamodel for battery geometry optimisation. …”
  4. 544
  5. 545

    Just-in-time defect prediction for mobile applications: using shallow or deep learning? by Raymon van Dinter (10521952)

    Published 2023
    “…In this research, we evaluate the performance of traditional machine learning algorithms and data sampling techniques for JITDP problems and compare the model performance with the performance of a DL-based prediction model. …”
  6. 546

    Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort by Sergio Márquez-Sánchez (19437985)

    Published 2023
    “…Moreover, the prevalent cloud-based nature of these systems introduces elevated cybersecurity risks and substantial data transmission overheads. …”
  7. 547
  8. 548

    Deepfakes Signatures Detection in the Handcrafted Features Space by Hamadene, Assia

    Published 2023
    “…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
    Get full text
  9. 549

    Combinatorial method for bandwidth selection in wind speed kernel density estimation by El Dakkak, Omar

    Published 2019
    “…This goal calls for devising probabilistic models with adaptive algorithms that accurately fit wind speed distributions. …”
    Get full text
  10. 550

    Role of authentication factors in Fin-tech mobile transaction security by Habib Ullah Khan (12024579)

    Published 2023
    “…<p dir="ltr">Fin-Tech is the merging of finance and technology, to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech is concerned. …”
  11. 551

    A fine-grained XML structural comparison approach by Tekli, Joe

    Published 2007
    “…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 552
  13. 553

    Automated systems for diagnosis of dysgraphia in children: a survey and novel framework by Jayakanth Kunhoth (14158908)

    Published 2024
    “…This work discusses the data collection method, important handwriting features, and machine learning algorithms employed in the literature for the diagnosis of dysgraphia. …”
  14. 554

    Efficient XML Structural Similarity Detection using Sub-tree Commonalities by Tekli, Joe

    Published 2007
    “…Various algorithms for comparing hierarchically structured data, e.g. …”
    Get full text
    Get full text
    conferenceObject
  15. 555
  16. 556
  17. 557

    An efficient cache replacement strategy for the hybrid cache consistency approach by Haraty, Ramzi A.

    Published 2010
    “…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. In this thesis, we proposed a new cache replacement strategy, the Least Unified Value strategy (LUV) to replace the Least Recently Used (LRU) that SACCS was based on. …”
    Get full text
    Get full text
    Get full text
    article
  18. 558

    Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations by Md Mosarrof Hossen (21399056)

    Published 2025
    “…To address this challenge, this study aims to optimize household energy consumption while preserving data privacy by proposing an innovative two-stage Federated Learning (FL) framework that delivers real-time micro-moment-based recommendations. …”
  19. 559

    Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images by Rehan Raza (17019105)

    Published 2023
    “…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …”
  20. 560

    Scatter search technique for exam timetabling by Mansour, Nashat

    Published 2011
    “…We evaluate our suggested technique on real-world university data and compare our results with the registrar’s manual timetable in addition to the timetables of other heuristic optimization algorithms. …”
    Get full text
    Get full text
    Get full text
    article