Search alternatives:
method algorithm » mould algorithm (Expand Search)
taking algorithm » cosine algorithm (Expand Search)
Showing 441 - 460 results of 537 for search '(( elements method algorithm ) OR ((( cases taking algorithm ) OR ( based method algorithm ))))', query time: 0.11s Refine Results
  1. 441

    Automated quantification of penile curvature using artificial intelligence by Tariq O. Abbas (11247771)

    Published 2022
    “…<h3>Objective</h3><p dir="ltr">To develop and validate an artificial intelligence (AI)-based algorithm for capturing automated measurements of Penile curvature (PC) based on 2-dimensional images.…”
  2. 442

    Exploring new horizons in neuroscience disease detection through innovative visual signal analysis by Nisreen Said Amer (17984077)

    Published 2024
    “…Our study demonstrates the effectiveness of the FBFT method, achieving impressive accuracies across multiple brain disorders using CNN-based classification. …”
  3. 443

    Control of cardiac alternans by mechanical and electrical feedback by Yapari, Felicia

    Published 2014
    “…The coupled model includes the active stress which defines the mechanical properties of the tissue and is utilized in the feedback algorithm as an independent input from the pacing based controller realization in alternans annihilation. …”
    Get full text
    article
  4. 444

    Fuzzy controllers design using space-filling curves by Elshafei-Ahmed, M.

    Published 1998
    “…We present a clustering technique for fuzzy rules based on Hilbert space-filling curves (SFC). SFC scans an n-dimensional space and reduces it to a curve, i.e. a one-dimensional line. …”
    Get full text
    Get full text
    article
  5. 445

    Fuzzy Controllers Design Using Space-Filling Curves by Elshafei-Ahmed, M

    Published 2020
    “…The paper introduces first the Hilber Space-filling curves, and outlines algorithms for clustering and adaptive clustering which demonstrate the SFC efficient self-organizing features. …”
    Get full text
    article
  6. 446

    Using Fractional Bernoulli Wavelets for Solving Fractional Diffusion Wave Equations with Initial and Boundary Conditions by Sahlan, Monireh Nosrati

    Published 2021
    “…The implementation of algorithms exposes high accuracy of the presented numerical method. …”
    Get full text
    article
  7. 447

    Artificial Intelligence in Predicting Cardiac Arrest: Scoping Review by Asma Alamgir (18288895)

    Published 2021
    “…Machine learning models were the most prominent branch of AI used in the prediction of cardiac arrest in the studies (38/47, 81%), and the most used algorithm was the neural network (23/47, 49%). K-fold cross-validation was the most used algorithm evaluation tool reported in the studies (24/47, 51%).…”
  8. 448
  9. 449

    Efficient XML Structural Similarity Detection using Sub-tree Commonalities by Tekli, Joe

    Published 2007
    “…In this paper, we provide an improved comparison method to deal with such resemblances. Our approach is based on the concept of tree edit distance, introducing the notion of commonality between sub-trees. …”
    Get full text
    Get full text
    conferenceObject
  10. 450

    Fine-grain watermarking for intellectual property protection by Stefano Giovanni Rizzo (18615112)

    Published 2019
    “…The core method is based on homoglyph characters substitution for latin symbols and whitespaces. …”
  11. 451

    A fine-grained XML structural comparison approach by Tekli, Joe

    Published 2007
    “…Our approach consists of two main algorithms for discovering the structural commonality between sub-trees and computing tree-based edit operations costs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 452

    An XML Document Comparison Framework by Tekli, Joe

    Published 2001
    “…A prototype has been developed to evaluate the optimality and performance of our method. Results demonstrate higher comparison accuracy with respect to alternative XML comparison methods, while timing experiments reflect the significant impact of semantic similarity assessment on overall system performance.…”
    Get full text
    Get full text
    Get full text
    article
  13. 453
  14. 454

    A new approach and faster exact methods for the maximum common subgraph problem by Abu-Khzam, Faisal N.

    Published 2017
    “…A detailed analysis shows that the proposed algorithm requires O((m+1)n) time, which is a superior worst-case bound to those known for previously-analyzed algorithms in the setting of the MCS problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 455
  16. 456

    Developing a framework for using face recognition in transit payment transactions by HABEH, ORABI MOHAMMAD ABDULLAH

    Published 2021
    “…This solution considers an effective cost-based solution. The second solution is proposed based on implementing a dedicated full HD face recognition stereo camera system on top of each metro gate and integrate it with the recommended “Banking Payment Context- Account Based Ticketing System” by using the MFcoface face recognition method which results from the systematic literature review and experts’ outcomes. …”
    Get full text
  17. 457

    Failure recovery in wireless content distribution networks with device-to-device cooperation by Sharafeddine, Sanaa

    Published 2017
    “…We present low complexity effective algorithms based on clustering and tree construction methods in order to address three different types of dynamic node behavior, namely new devices joining the network, existing devices leaving the network, and existing devices moving locally within the network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 458

    A modified coronavirus herd immunity optimizer for capacitated vehicle routing problem by Abu Zitar, Raed

    Published 2021
    “…Due to the complex nature of the capacitated vehicle routingproblem, metaheuristic optimization algorithms are widely used for tackling this type of challenge.Coronavirus Herd Immunity Optimizer (CHIO) is a recent metaheuristic population-based algorithm thatmimics the COVID-19 herd immunity treatment strategy. …”
    Get full text
  19. 459
  20. 460

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare by Haraty, Ramzi A.

    Published 2007
    “…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
    Get full text
    Get full text
    Get full text
    article