Showing 121 - 140 results of 141 for search '(( elements data algorithm ) OR ((( data mining algorithm ) OR ( defined using algorithm ))))', query time: 0.10s Refine Results
  1. 121

    Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2012
    “…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 122

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…Finally, we explore the viability and the relevance of our propositions by applying the defined approach for systematic security hardening to develop case studies.…”
    Get full text
    Get full text
    Get full text
    article
  3. 123

    Crown Structures for Vertex Cover Kernelization by Abu-Khzam, Faisal N.

    Published 2007
    “…Crown structures in a graph are defined and shown to be useful in kernelization algorithms for the classic vertex cover problem. …”
    Get full text
    Get full text
    Get full text
    article
  4. 124

    A new minimum curvator multi-step method for unconstrained optimization by Obeid, Samir

    Published 1998
    “…In this paper, we carry on with a similar idea and define a rational model with a free parameter. Our derivation of the new algorithm is based on determining some value of the parameter that minimizes the curvature in some chosen metric. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 125

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study by Masurkar, Faeez

    Published 2022
    “…Fifth, it is also observed that the actuation and sensing position plays a crucial role in receiving the time-domain data with a sufficient SNR and the one that is easy to analyze and interpret. …”
    Get full text
  6. 126

    Data Redundancy Management in Connected Environments by Mansour, Elio

    Published 2020
    “…Connected environments are typically defined as physical infrastructures (e.g., building) equipped with sensors that produce and exchange raw data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 127

    A geographic information system method to generate long term regional solar radiation resource maps: enhancing decision-making by Sachin Jain (19161721)

    Published 2024
    “…The regression-kriging algorithm and its variants are used to calibrate satellite data, through interpolation of ground solar radiation data. …”
  8. 128
  9. 129

    Next-generation energy systems for sustainable smart cities: Roles of transfer learning by Yassine Himeur (14158821)

    Published 2022
    “…These algorithms might not perform as expected, take much time in training, or do not have enough input data to generalize well. …”
  10. 130

    Control of cardiac alternans by mechanical and electrical feedback by Yapari, Felicia

    Published 2014
    “…The coupled model includes the active stress which defines the mechanical properties of the tissue and is utilized in the feedback algorithm as an independent input from the pacing based controller realization in alternans annihilation. …”
    Get full text
    article
  11. 131

    Precision nutrition: A systematic literature review by Daniel Kirk (17302798)

    Published 2021
    “…Four machine learning tasks are seen in the form of regression, classification, recommendation and clustering, with most of these utilizing a supervised approach. In total, 30 algorithms were used, with 19 appearing more than once. …”
  12. 132

    Computational evluation of protein energy functions by Mansour, Nashat

    Published 2014
    “…A protein is characterized by its 3D structure, which defines its biological function. Proteins fold into 3D structures in a way that leads to low-energy state. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 133

    THE FUTURE OF MEDICINE, healthcare innovation through precision medicine: policy case study of Qatar by M. Walid Qoronfleh (14153088)

    Published 2020
    “…Consequently, the big data revolution has provided an opportunity to apply artificial intelligence and machine learning algorithms to mine such a vast data set. …”
  14. 134
  15. 135
  16. 136

    Applications of artificial intelligence in emergency and critical care diagnostics: a systematic review and meta-analysis by Jithin Kalathikudiyil Sreedharan (18268894)

    Published 2024
    “…<h3>Introduction</h3><p dir="ltr">Artificial intelligence has come to be the highlight in almost all fields of science. It uses various models and algorithms to detect patterns and specific findings to diagnose a disease with utmost accuracy. …”
  17. 137
  18. 138

    Reconstruction and simulation of neocortical microcircuitry by Khazen, Georges

    Published 2015
    “…We present a first-draft digital reconstruction of the microcircuitry of somatosensory cortex of juvenile rat. The reconstruction uses cellular and synaptic organizing principles to algorithmically reconstruct detailed anatomy and physiology from sparse experimental data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  19. 139

    What are artificial intelligence literacy and competency? A comprehensive framework to support them by Thomas K.F., Chiu

    Published 2024
    “…We also identify five effective learning experiences to foster abilities and confidences, and suggest five future research directions: prompt engineering, data literacy, algorithmic literacy, self-reflective mindset, and empirical research.…”
    Get full text
    Get full text
    Get full text
    article
  20. 140

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review by Yasir Ali (799969)

    Published 2023
    “…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …”