Search alternatives:
would algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
defined » designed (Expand Search)
would algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
defined » designed (Expand Search)
-
81
Tailoring motivational health messages for smoking cessation using an mHealth recommender system integrated with an electronic health record: a study protocol
Published 2018“…</p><h3>Discussion</h3><p dir="ltr">This study will explore whether a health recommender system algorithm integrated with an electronic health record can predict which tailored motivational health messages patients would prefer and consider to be of a good quality, encouraging them to engage with the system. …”
-
82
A Terrain classification system for coseismic landslide hazard analysis: Lebanon, a case study
Published 2014“…Terrain classification was modeled after the work of Iwahashi and Pike (2007), which has been shown to relate to engineering properties of the landscape (eg Vs 30, Yong et al., 2012) using slope, curvature, and roughness. In this work topographic slope, calculated using Ritter’s algorithm (1987) is used to demarcate landslide failure modes. …”
Get full text
Get full text
Get full text
conferenceObject -
83
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
Published 2023“…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
-
84
An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems
Published 2024“…Feature selection (FS) is the activity of defining the most contributing feature subset among all used features to improve the superiority of datasets with a large number of dimensions by selecting significant features and eliminating redundant and irrelevant ones. …”
Get full text
-
85
AGEomics Biomarkers and Machine Learning—Realizing the Potential of Protein Glycation in Clinical Diagnostics
Published 2022“…AGEomics biomarkers have been used in diagnostic algorithms using machine learning methods. …”
-
86
-
87
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
Published 2006“…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …”
Get full text
masterThesis -
88
A hybrid approach for XML similarity
Published 2007“…Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
89
Corrosion Monitoring Technologies for Reinforced Concrete Structures: A Review
Published 2023“…Irrespective of the adopted processes for corrosion monitoring, it was concluded that none of these methods represent an optimum solution by itself, where employing a combination of multiple systems is one way of optimizing its results. New technology, algorithms, data processing, and AI are new approaches to improving corrosion monitoring processes. …”
Get full text
-
90
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …”
Get full text
Get full text
Get full text
Get full text
article -
91
On the complexity of multi-parameterized cluster editing
Published 2017“…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
Get full text
Get full text
Get full text
Get full text
article -
92
Genetic Fuzzimetric Technique (GFT)
Published 2012“…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
93
Common weaving approach in mainstream languages for software security hardening
Published 2013“…Finally, we explore the viability and the relevance of our propositions by applying the defined approach for systematic security hardening to develop case studies.…”
Get full text
Get full text
Get full text
article -
94
Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE
Published 2023“…SAR data were complemented with very high-resolution Worldview-3 multispectral images (0.31 m panchromatic, 1.24 m VNIR) to obtain a visual assessment of the study area and its land cover features. …”
Get full text
-
95
-
96
Automatic Recognition of Poets for Arabic Poetry using Deep Learning Techniques (LSTM and Bi-LSTM)
Published 2024“…LSTM has proven its capability for sequential data analysis in many different languages. Our reported results have shown promising classification accuracy with an average of 92.35%. …”
Get full text
-
97
Crown Structures for Vertex Cover Kernelization
Published 2007“…Crown structures in a graph are defined and shown to be useful in kernelization algorithms for the classic vertex cover problem. …”
Get full text
Get full text
Get full text
article -
98
A new minimum curvator multi-step method for unconstrained optimization
Published 1998“…In this paper, we carry on with a similar idea and define a rational model with a free parameter. Our derivation of the new algorithm is based on determining some value of the parameter that minimizes the curvature in some chosen metric. …”
Get full text
Get full text
Get full text
conferenceObject -
99
Towards secure and trusted AI in healthcare: A systematic review of emerging innovations and ethical challenges
Published 2025“…Still, challenges in adversarial attacks, algorithmic bias, and variable regulatory frameworks remain strong. …”
-
100