Search alternatives:
method algorithm » mould algorithm (Expand Search)
taking algorithm » cosine algorithm (Expand Search)
Showing 461 - 480 results of 537 for search '(( elements method algorithm ) OR ((( cases taking algorithm ) OR ( based method algorithm ))))', query time: 0.11s Refine Results
  1. 461

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…In the first approach, we prove them according to the rules and algorithms provided in this paper. In the second approach, we accommodate Kniesel's discipline that ensures that security solutions specified by our approach are applied at all and only the required points in source code, taking into consideration weaving interactions and interferences. …”
    Get full text
    Get full text
    Get full text
    article
  2. 462

    Tailoring motivational health messages for smoking cessation using an mHealth recommender system integrated with an electronic health record: a study protocol by Santiago Hors-Fraile (5950823)

    Published 2018
    “…Health recommender systems are information-filtering algorithms that can choose the most relevant health-related items—for instance, motivational messages aimed at smoking cessation—for each user based on his or her profile. …”
  3. 463

    Prediction of Multiple Clinical Complications in Cancer Patients to Ensure Hospital Preparedness and Improved Cancer Care by Regina Padmanabhan (14231606)

    Published 2022
    “…Other highlights are (1) a novel set of easily available features for the prediction of the aforementioned clinical complications and (2) the use of data augmentation methods and model-scoring-based hyperparameter tuning to address the problem of class disproportionality, a common challenge in medical datasets and often the reason behind poor event prediction rate of various predictive models reported so far. …”
  4. 464
  5. 465

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  6. 466
  7. 467

    Single-channel speech denoising by masking the colored spectrograms by Sania Gul (18272227)

    Published 2025
    “…Similarly, it offers an improvement of 1 % in STOI and a reduction of 33 and 200 times, respectively, in network size and training epochs when compared to a complex variational U-Net-based model. Also, with comparable PESQ, the proposed system offers almost 2 % improvement in STOI, and a 2 times reduction in network size and 100 times reduction in training epochs, when compared to a lightweight system using automatic dimension reduction of network layers by a structured pruning method.…”
  8. 468
  9. 469

    MoveSchedule by Zouein, Pierette

    Published 1995
    “…The resource levels describe different methods or crew-sizes for performing the activity. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  10. 470

    Automated systems for diagnosis of dysgraphia in children: a survey and novel framework by Jayakanth Kunhoth (14158908)

    Published 2024
    “…This work discusses the data collection method, important handwriting features, and machine learning algorithms employed in the literature for the diagnosis of dysgraphia. …”
  11. 471

    DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins by Samir Brahim, Belhaouari

    Published 2025
    “…ConclusionWe present the effectiveness of DeepRaman, an innovative architecture inspired by the Progressive Fourier Transform and integrated with the scalogram transformation method, in classifying raw SERS Raman spectral data from biological specimens with unparalleled accuracy relative to conventional machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  12. 472

    DASSI: differential architecture search for splice identification from DNA sequences by Shabir Moosa (14153316)

    Published 2022
    “…The benchmarking experiments of execution time and precision on architecture search and evaluation process showed better performance on recently available GPUs making it feasible to adopt architecture search based methods on large datasets.</p> <h2>Conclusions</h2> <p>We proposed the use of differential architecture search method (DASSI) to perform SS classification on raw DNA sequences, and discovered new neural network models with low number of tunable parameters and competitive performance compared with manually engineered architectures. …”
  13. 473

    Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE by SHWEDEH, FATEN

    Published 2018
    “…We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …”
    Get full text
  14. 474

    Gene-specific machine learning model to predict the pathogenicity of BRCA2 variants by Mohannad N. Khandakji (13885434)

    Published 2022
    “…Local, gene-specific information have been shown to aid variant pathogenicity prediction; therefore, our aim was to develop a BRCA2-specific machine learning model to predict pathogenicity of all types of BRCA2 variants.</p><p><br></p><h3>Methods</h3><p dir="ltr">We developed an XGBoost-based machine learning model to predict pathogenicity of BRCA2 variants. …”
  15. 475

    Designing Cellular Mobile Networks Using Non{Deterministic Iterative Heuristics by Sait, Sadiq M.

    Published 2020
    “…Hence, a randomized, heuristic algorithm, such as Simulated Evolution is used in this work to optimize the transmission costs in cellular networks. …”
    Get full text
    article
  16. 476

    Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer by Andrea Remo (447375)

    Published 2015
    “…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …”
  17. 477

    LDSVM: Leukemia Cancer Classification Using Machine Learning by Abdul Karim (417009)

    Published 2022
    “…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …”
  18. 478
  19. 479

    The political economy of AI: a content analysis of ChatGPT outputs and anti-Palestinian media bias by King, Gretchen

    Published 2026
    “…A theoretical framework for analysing digital Orientalism is advanced through a historicisation of media imperialism, the military–industrial–communications complex and the political economy of AI in occupied Palestine. Grounded in research-based teaching methods, and employing a mixed-method content and frequency analysis and comparison of ChatGPT outputs in English and Arabic, this article expands research on AI biases, algorithmic oppression and digital divides within the context of digital Orientalism and anti-Palestinianism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 480

    Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network by Monzure-Khoda Kazi (17191207)

    Published 2024
    “…These algorithms include random forest (RF) classification and artificial neural networks (ANN). …”