Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
current modeling » agent modeling (Expand Search), event modeling (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
current modeling » agent modeling (Expand Search), event modeling (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
101
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …”
Get full text
Get full text
Get full text
Get full text
article -
102
On the complexity of multi-parameterized cluster editing
Published 2017“…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
Get full text
Get full text
Get full text
Get full text
article -
103
Automated quantification of penile curvature using artificial intelligence
Published 2022“…<h3>Objective</h3><p dir="ltr">To develop and validate an artificial intelligence (AI)-based algorithm for capturing automated measurements of Penile curvature (PC) based on 2-dimensional images.…”
-
104
Defense against adversarial attacks: robust and efficient compressed optimized neural networks
Published 2024“…This enhancement significantly fortifies the model's resistance to adversarial attacks by introducing complexity into attackers' attempts to anticipate the model's prediction integration process. …”
-
105
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
Published 2021“…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …”
-
106
CEAP
Published 2016“…Nonetheless, the applicability of the current detection mechanisms in the deployed vehicular networks is hindered by two main challenges imposed by the special characteristics of VANETs. …”
Get full text
Get full text
Get full text
Get full text
article -
107
-
108
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
Published 2021“…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). Three anatomically-realistic human leg models based on magnetic resonance imaging reconstructions were created. …”
Get full text
article -
109
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. The evaluation results of the proposed solution were compared to the results of standard solutions under different cyberattack scenarios using quantitative research methods involving computing simulations, emulation experiments, and analytical modeling. …”
Get full text
-
110
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Fifth, it is also observed that the actuation and sensing position plays a crucial role in receiving the time-domain data with a sufficient SNR and the one that is easy to analyze and interpret. …”
Get full text
-
111
-
112
Optimal Routing and Scheduling in E-commerce Logistics using Crowdsourcing Strategies
Published 2017Get full text
doctoralThesis -
113
Developing an online hate classifier for multiple social media platforms
Published 2020“…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”
-
114
Estimation of power grid topology parameters through pilot signals
Published 2016“…The measured data is evaluated through correlation, and a weighed least-square algorithm, applied to the network’s dynamic model, estimates those unknown parameters and provides an accurate snapshot of the power network topology. …”
Get full text
Get full text
Get full text
conferenceObject -
115
Identification of phantom movements with an ensemble learning approach
Published 2022“…In the current study, we utilized ensemble learning algorithms for the recognition and classification of phantom movements of the different amputation levels of the upper and lower extremity. …”
-
116
Proactive machine learning-based solution for advanced manageability of multi-persona mobile computing
Published 2019“…A dynamic programming algorithm is advocated to find the adequate strategies. …”
Get full text
Get full text
Get full text
Get full text
article -
117
Precision nutrition: A systematic literature review
Published 2021“…As such, recent research has applied machine learning algorithms, tools, and techniques in precision nutrition for different purposes. …”
-
118
-
119
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
120
Predicting Cardiovascular Disease in Patients with Machine Learning and Feature Engineering Techniques
Published 2022“…Heart disease can be caused by a range of factors, including a sedentary lifestyle, stress, alcohol, cigarette intake, and so on. The current prediction algorithms focus on forecasting the illness label though the likelihood of getting the condition is still unknown. …”
Get full text
Get full text