Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
data making » data mining (Expand Search)
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
data making » data mining (Expand Search)
-
321
Modelling of pollutant transport in compound open channels
Published 1998“…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
Get full text
Get full text
masterThesis -
322
Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations
Published 2025“…<p>Human behavior significantly impacts domestic energy consumption, making it essential to monitor and improve these consumption patterns. …”
-
323
A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks
Published 2025“…Deep reinforcement learning (DRL) offers a data-driven alternative that couples perception with sequential decision-making. …”
-
324
Modeling and Bias-Robust Estimation of the Acoustic Release of Chemotherapeutics from Liposomes
Published 2019“…Optimality is guaranteed by accurately identifying the underlying statistical noise characteristics in experimental data. The estimator also quantifies the bias in the release, exhibited by the experimental data. …”
Get full text
article -
325
Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review
Published 2022“…WDs coupled with artificial intelligence (AI) algorithms show promise to help understand and conclude meaningful information from the gathered data and provide advanced and clinically meaningful analytics.…”
-
326
Anomaly Detection Based Framework for Profile Monitoring
Published 2023Get full text
doctoralThesis -
327
Reconstruction and simulation of neocortical microcircuitry
Published 2015“…The reconstruction uses cellular and synaptic organizing principles to algorithmically reconstruct detailed anatomy and physiology from sparse experimental data. …”
Get full text
Get full text
Get full text
Get full text
article -
328
Anonymizing multimedia documents
Published 2016“…We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
Get full text
Get full text
Get full text
Get full text
article -
329
-
330
SemIndex: Semantic-Aware Inverted Index
Published 2017“…We provide here a new approach, called SemIndex, that extends the standard inverted index by constructing a tight coupling inverted index graph that combines two main resources: a general purpose semantic network, and a standard inverted index on a collection of textual data. We also provide an extended query model and related processing algorithms with the help of SemIndex. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
331
Integration of Textural and Material Information into BIM Using Spectrometry and Infrared Sensing
Published 2015Get full text
doctoralThesis -
332
Using machine learning to support students’ academic decisions
Published 2019“…This approach uses other students’ grades to make a prediction. This research tests and compares the performance of Decision Trees, Random Forests, Gradient-Boosted trees, and Deep Learning machine learning regression algorithms to predict student GPA. …”
Get full text
-
333
-
334
Development of a deep learning-based group contribution framework for targeted design of ionic liquids
Published 2024“…This computational framework can expedite and improve the process of finding desirable molecular structures of IL via accurate property predictions in a data-driven manner. …”
-
335
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…Both GPS and UAVN/FANET use open network channels for data broadcasting, which are exposed to several threats, thus making security risky and challenging. …”
-
336
Decomposition-based wind power forecasting models and their boundary issue: An in-depth review and comprehensive discussion on potential solutions
Published 2022“…However, existing studies usually utilize future data during the decomposition process and therefore cannot be appropriately employed for real-world applications, due to the inaccessibility of future data. …”
-
337
Artificial intelligence based anomaly detection of energy consumption in buildings: A review, current trends and new perspectives
Published 2021“…<p dir="ltr">Enormous amounts of data are being produced everyday by sub-meters and smart sensors installed in residential buildings. …”
-
338
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2020“…The performed experiments show that 60% of flow packets are a good compromise that ensures high performance in the least processing time. The results of the conducted experiments indicate that random forest outperforms other algorithms achieving a maximum accuracy of 98.5% and an F-score of 0.932. …”
Get full text
article -
339
A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns
Published 2023“…Statistical analysis showed that the selected features for liquids' and pipe's properties using the BGWOPSO algorithm were adequate to attain superior performance for both models. …”
-
340
Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE
Published 2023“…An integrated approach, featuring the application of advanced image processing techniques and geospatial analysis using machine learning, was adopted to characterise the site while automating the process and investigating its applicability. …”
Get full text