Search alternatives:
processing algorithm » processing algorithms (Expand Search)
learning algorithm » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
a learning » _ learning (Expand Search)
processing algorithm » processing algorithms (Expand Search)
learning algorithm » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
a learning » _ learning (Expand Search)
-
701
Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network
Published 2024“…The ultimate target is to develop a robust multi-modal machine learning method to predict the optimum geometry (i.e., hexagonal ring angle) and suitable in-plane crushing arrangements of the hexagonal ring system for targeted crashworthiness parameters. …”
-
702
Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings
Published 2022“…In this study, we evaluate the performance of five machine learning techniques in characterizing five possible undesired interactions between a child and a social robot. …”
-
703
LungVision: X-ray Imagery Classification for On-Edge Diagnosis Applications
Published 2024Get full text
article -
704
Building power consumption datasets: Survey, taxonomy and future directions
Published 2020“…Accordingly, a novel visualization strategy based on using power consumption micro-moments has been presented along with an example of deploying machine learning algorithms to classify the micro-moment classes and identify anomalous power usage.…”
-
705
AI-Based Methods for Predicting Required Insulin Doses for Diabetic Patients
Published 2015“…The performance of the three algorithms is evaluated on a data set found in the public UCMI repository.…”
Get full text
Get full text
article -
706
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
Published 2011“…The proposed scheme monitors the signal strength level during the file transfer process and compresses data blocks on-the-fly only whenever energy reduction gain is expected. …”
Get full text
Get full text
Get full text
article -
707
Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects
Published 2023“…The situation may cause concern and trepidation about integrating AI technologies and lack understanding of their optimal deployment and operation. Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …”
Get full text
-
708
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
709
Dynamic single node failure recovery in distributed storage systems
Published 2017“…We selected fractional repetition coding due to its simple repair mechanism that minimizes the repair and disk access bandwidths together with the property of un-coded repair process. To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …”
Get full text
Get full text
Get full text
Get full text
article -
710
Unsupervised outlier detection in multidimensional data
Published 2022“…Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. In order to detect the anomalies in a dataset in an unsupervised manner, some novel statistical techniques are proposed in this paper. …”
-
711
ISSP
Published 2017“…Many decision-support tools were developed to assist planners in space scheduling but these were limited to providing the user with a platform that ties spatial and temporal data in the project and left it up to the user to decide on positions of resources and schedule adjustments to solve spatial conflicts that may arise in the process of constructing site layouts over time.The ISSP system, presented here, provides a graphical user-interactive interface with underlying layout and scheduling algorithms that construct feasible layout and schedule solutions under 2-dimensional spatial constraints between resources. …”
Get full text
Get full text
Get full text
conferenceObject -
712
The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation
Published 2007“…We particularly discuss multimedia primary horizontal fragmentation and focus on semantic-based textual predicates implication required as a pre-process in current fragmentation algorithms in order to partition multimedia data efficiently. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
713
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
Published 2022“…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …”
-
714
Depthwise Separable Convolutions and Variational Dropout within the context of YOLOv3
Published 2020“…Deep learning algorithms have demonstrated remarkable performance in many sectors and have become one of the main foundations of modern computer-vision solutions. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
715
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
Get full text
-
716
On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity
Published 2020“…We de ne the constraints of the problem, model it as a Markov Decision Process, and propose a reinforcement learning-based solution to optimize the UAV trajectory. …”
Get full text
Get full text
Get full text
masterThesis -
717
Energy-Efficient VoI-Aware UAV-Assisted Data Collection in Wireless Sensor Networks
Published 2025“…Operating unmanned aerial vehicles (UAVs) for data collection is a promising approach across various practical domains, offering flexibility in challenging environments to facilitate data collection within sensor networks (SNs). …”
Get full text
Get full text
Get full text
masterThesis -
718
Towards Multimedia Fragmentation
Published 2006“…Database fragmentation is a process for reducing irrelevant data accesses by grouping data frequently accessed together in dedicated segments. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
719
Exploring new horizons in neuroscience disease detection through innovative visual signal analysis
Published 2024“…To address this, our study focuses on visualizing complex EEG signals in a format easily understandable by medical professionals and deep learning algorithms. …”
-
720
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
Published 2022“…</p><h2>Other Information</h2> <p> Published in: Data and Information Management<br> License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.dim.2022.100019" target="_blank">https://dx.doi.org/10.1016/j.dim.2022.100019</a></p>…”