Search alternatives:
learning algorithm » learning algorithms (Expand Search)
means algorithm » search algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data learning » deep learning (Expand Search)
learning algorithm » learning algorithms (Expand Search)
means algorithm » search algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data learning » deep learning (Expand Search)
-
581
Innovative mobile E-healthcare systems
Published 2016“…Caching is one of the key methods in distributed computing environments to improve the performance of data retrieval. To find which item in the cache can be evicted and replaced, cache replacement algorithms are used. …”
Get full text
Get full text
Get full text
Get full text
article -
582
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
Published 2022“…Implications are that toxicity trigger detection algorithms can leverage generic approaches but must also tailor detections to specific communities.…”
-
583
Final exams scheduling for univeristies. (c2001)
Published 2001Get full text
Get full text
masterThesis -
584
Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation
Published 2022“…At low power usage, the proposed method could achieve a PSNR gain of up to 1.5 dB over SoftCast and even a 1.789 dB gain over a distortion-resource algorithm, using less than 1.4% of the bandwidth.</p><h2>Other Information</h2><p dir="ltr">Published in: Applied Sciences<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3390/app12105047" target="_blank">https://dx.doi.org/10.3390/app12105047</a></p>…”
-
585
-
586
Regression Testing of Database Applications
Published 2002“…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …”
Get full text
Get full text
Get full text
article -
587
Exploratory risk prediction of type II diabetes with isolation forests and novel biomarkers
Published 2024“…In particular, Isolation Forest (iForest) was applied as an anomaly detection algorithm to address class imbalance. iForest was trained on the control group data to detect cases of high risk for T2DM development as outliers. …”
Get full text
-
588
Applications of fast fourier transform in the integrity evaluation of deep foundations
Published 2016“…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …”
Get full text
Get full text
Get full text
Get full text
article -
589
Query acceleration in distributed database systems
Published 2001“…Perhaps one of the more important algorithms is the AHY algorithm using semi-joins that is implemented by Apers, Hevner and Yao in [1]. …”
Get full text
Get full text
Get full text
article -
590
Three approaches to modelling heating and evaporation of monocomponent droplets
Published 2024“…It is shown that the algorithm for the third approach predicts values which are close to the experimental data.…”
-
591
Adaptive controlled superconducting magnetic energy storage devices for performance enhancement of wind energy systems
Published 2023“…The proposed algorithm is an enhanced version of the CMPN by adding the sub-band filtering algorithm effect. …”
Get full text
Get full text
Get full text
article -
592
Cross entropy error function in neural networks
Published 2002“…To forecast gasoline consumption (GC), the ANN uses previous GC data and its determinants in a training data set. …”
Get full text
Get full text
Get full text
conferenceObject -
593
Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations
Published 2007“…The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …”
Get full text
Get full text
article -
594
Diagnostic performance of artificial intelligence in detecting and subtyping pediatric medulloblastoma from histopathological images: A systematic review
Published 2025“…</p><h3>Conclusion</h3><p dir="ltr">AI algorithms show promise in detecting and subtyping medulloblastomas, but the findings are limited by overreliance on one dataset, small sample sizes, limited study numbers, and lack of meta-analysis Future research should develop larger, more diverse datasets and explore advanced approaches like deep learning and foundation models. …”
-
595
Predicting insulin dosage for diabetic patients to reach optimal glucose levels. (c2012)
Published 2012Get full text
Get full text
masterThesis -
596
A Novel Internal Model Control Scheme for Adaptive Tracking of Nonlinear Dynamic Plants
Published 2006“…The U-model utilizes only past data for plant modelling and standard root solving algorithm for control law formulation. …”
Get full text
Get full text
article -
597
Information warfare
Published 2017“…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
Get full text
Get full text
Get full text
Get full text
article -
598
Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles
Published 2017“…The proposed algorithms are initially deployed in a simulation environment, and then the experimental data sets are fed into the algorithms to validate their performance. …”
Get full text
article -
599
On end-to-end scheduling in wireless cellular networks
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
600
Design and development of an embedded controller for roboticmanipulator
Published 1998“…Mohseni's Proposed Algorithm, MPA, has been incorporated into the embedded controller to reduce the computational efforts and to obtain a close-to-optimal control law. …”
Get full text
Get full text
article