Search alternatives:
method algorithm » mould algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
format » formal (Expand Search)
method algorithm » mould algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
format » formal (Expand Search)
-
181
Prediction the performance of multistage moving bed biological process using artificial neural network (ANN)
Published 2020“…<p dir="ltr">Complexity, uncertainty, and high dynamic nature of nutrient removal through biological processes (BPs) makes it difficult to model and control these processes, forcing designers to rely on approximations, probabilities, and assumptions. …”
-
182
Learning Spatiotemporal Latent Factors of Traffic via Regularized Tensor Factorization: Imputing Missing Values and Forecasting
Published 2019“…The learned factors, with a graph-based temporal dependency, are then used in an autoregressive algorithm to predict the future state of the road network with a large horizon. …”
-
183
DASSI: differential architecture search for splice identification from DNA sequences
Published 2022“…The benchmarking experiments of execution time and precision on architecture search and evaluation process showed better performance on recently available GPUs making it feasible to adopt architecture search based methods on large datasets.…”
-
184
-
185
Machine Learning Model for a Sustainable Drilling Process
Published 2023Get full text
doctoralThesis -
186
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
Published 2022“…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …”
-
187
-
188
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
Published 2007“…Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
conferenceObject -
189
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
Published 2007“…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
Get full text
Get full text
Get full text
article -
190
Single-Cell Transcriptome Analysis Revealed Heterogeneity and Identified Novel Therapeutic Targets for Breast Cancer Subtypes
Published 2023“…In the current study, we employed computational algorithms to decipher the cellular composition of estrogen receptor-positive (ER<sup>+</sup>), HER2<sup>+</sup>, ER<sup>+</sup>HER2<sup>+</sup>, and triple-negative BC (TNBC) subtypes from a total of 49,899 single cells’ publicly available transcriptomic data derived from 26 BC patients. …”
-
191
A data envelopment analysis model for opinion leaders’ identification in social networks
Published 2024“…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”
-
192
Exploring new horizons in neuroscience disease detection through innovative visual signal analysis
Published 2024“…Electroencephalogram (EEG) analysis is crucial for diagnosing brain disorders, but it can be challenging for medical practitioners to interpret complex EEG signals and make accurate diagnoses. To address this, our study focuses on visualizing complex EEG signals in a format easily understandable by medical professionals and deep learning algorithms. …”
-
193
Scatter search technique for exam timetabling
Published 2011“…This approach is based on maintaining and evolving a population of solutions. …”
Get full text
Get full text
Get full text
article -
194
Reconstruction and simulation of neocortical microcircuitry
Published 2015“…The reconstruction uses cellular and synaptic organizing principles to algorithmically reconstruct detailed anatomy and physiology from sparse experimental data. …”
Get full text
Get full text
Get full text
Get full text
article -
195
LDSVM: Leukemia Cancer Classification Using Machine Learning
Published 2022“…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …”
-
196
-
197
-
198
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
Published 2023“…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …”
-
199
An efficient cache replacement strategy for the hybrid cache consistency approach
Published 2010“…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. …”
Get full text
Get full text
Get full text
article -
200