Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
forest algorithm » firefly algorithm (Expand Search)
data modeling » data models (Expand Search), spatial modeling (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
forest algorithm » firefly algorithm (Expand Search)
data modeling » data models (Expand Search), spatial modeling (Expand Search)
-
401
Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis
Published 2024“…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…”
-
402
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
Published 2021“…Publishers should avoid noise in the data by developing a way to trace the evolution of individual publications and unique authors.…”
-
403
Adaptive Federated Learning Architecture To Mitigate Non-IID Through Multi-Objective GA-Based Efficient Client Selection
Published 2024“…Existing solutions still have several constraints leading to suboptimal model performance and slow convergence. In this paper, we propose a novel approach that incorporates genetic algorithms with an enhanced client selection strategy, utilizing client metadata rather than raw data. …”
Get full text
Get full text
Get full text
masterThesis -
404
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
Published 2011“…However, the computational as well as memory access requirements of compression algorithms could consume more energy than simply transmitting data uncompressed. …”
Get full text
Get full text
Get full text
article -
405
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …”
Get full text
-
406
Sentiment Analysis for Arabic Social media Movie Reviews Using Deep Learning
Published 2022“…The two movies are Wahed Tani which translates to (someone else) and Amahom which translate to (their uncle), Three datasets were employed, and several categorization models were compared across them. Prior to performing sentiment analysis, it is necessary to prepare the data so that it may be used to train machine learning (ML) algorithms. …”
Get full text
-
407
-
408
Multi-Classifier Tree With Transient Features for Drift Compensation in Electronic Nose
Published 2020“…These electronic instruments rely on Machine Learning (ML) algorithms for recognizing the sensed odors. The effect of long-term drift influences the performance of ML algorithms and the models those are trained on drift free data fail to perform on the drifted data. …”
-
409
Integrative toxicogenomics: Advancing precision medicine and toxicology through artificial intelligence and OMICs technology
Published 2023“…As personalized medicine and toxicogenomics involve huge data processing, AI can expedite this process by providing powerful data processing, analysis, and interpretation algorithms. …”
-
410
Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings
Published 2022“…Testing the best model with data acquired from children performing interactions with toys produced a promising performance for the shake and throw behaviours. …”
-
411
Artificial Intelligence for Skin Cancer Detection: Scoping Review
Published 2021“…Overall, studies that used smaller data sets reported higher accuracy.</p><h3>Conclusions</h3><p dir="ltr">This paper examined multiple AI-based skin cancer detection models. …”
-
412
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
Published 2022“…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …”
-
413
-
414
A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks
Published 2025“…This review synthesizes evidence from more than 500 peer-reviewed studies published between 2020 and 2026, mapping DRL applications across distributed generation, transmission, distribution, energy storage systems, energy markets, local energy management, grid security, and data privacy. We present a structured taxonomy covering value-based, policy-based, actor-critic, model-based, and advanced multi-agent and multi-objective approaches, and link algorithms to tasks such as dispatch, microgrid coordination, real-time pricing, load balancing, and demand–response. …”
-
415
A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass
Published 2025“…By synthesizing findings across various data sources and model architectures, we offer critical insights into the selection of context-aware algorithms and identify key research gaps, an essential step for advancing the reliability and applicability of AI-driven seagrass conservation efforts.…”
-
416
A Machine Learning Approach to Predicting Diabetes Complications
Published 2021Get full text
doctoralThesis -
417
Video surveillance using deep transfer learning and deep domain adaptation: Towards better generalization
Published 2023“…While artificial intelligence (AI) smooths the path of computers to think like humans, machine learning (ML) and deep learning (DL) pave the way more, even by adding training and learning components. DL algorithms require data labeling and high-performance computers to effectively analyze and understand surveillance data recorded from fixed or mobile cameras installed in indoor or outdoor environments. …”
-
418
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
-
419
Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations
Published 2025“…Leveraging FL enables efficient model training across diverse end-user applications while preserving data privacy. …”
-
420