Search alternatives:
method algorithm » mould algorithm (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
-
761
-
762
Precision nutrition: A systematic literature review
Published 2021“…Therefore, we carried out a Systematic Literature Review (SLR) to provide an overview of where and how machine learning has been used in Precision Nutrition from various aspects, what such machine learning models use as input features, what the availability status of the data used in the literature is, and how the models are evaluated. …”
-
763
-
764
Reliability and fault tolerance based topological optimization of computer networks - part II: iterative techniques
Published 2003“…We consider fault-tolerance to be an important network design aspect. We consider the use of three iterative techniques, namely tabu search, simulated annealing, and genetic algorithms, in solving the multiobjective topological optimization network design problem. …”
Get full text
Get full text
article -
765
On sensor selection in mobile devices based on energy, application accuracy, and context metrics
Published 2013“…We use this algorithm to build a sensor selection model to choose among location sensors. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
766
Failure-Rate Prediction for De Havilland Dash-8 Tires Employing Neural-Network Technique
Published 2006“…An artificial neural-network model for predicting the failure rate of De Havilland Dash-8 airplane tires utilizing the two-layered feedforward back-propagation algorithm as a learning rule is developed. …”
Get full text
article -
767
Soft Sensor for NOx Emission using Dynamical Neural Network
Published 2020“…Neural network model is trained using real data logs of an industrial boiler. …”
Get full text
article -
768
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …”
Get full text
-
769
FoGMatch
Published 2019“…This results in an unfair situation wherein the needs of one of the parties are ignored in the scheduling process. To address this problem, we propose in this paper a multi-criteria intelligent IoT scheduling approach in fog computing environments using matching game theory. …”
Get full text
Get full text
Get full text
masterThesis -
770
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
Get full text
Get full text
Get full text
Get full text
article -
771
-
772
Artificial Intelligence–Driven Serious Games in Health Care: Scoping Review
Published 2022“…Accuracy was the most commonly used metric for evaluating the performance of AI models.</p><h3>Conclusions</h3><p dir="ltr">The last decade witnessed an increase in the development of AI-driven serious games for health care purposes, targeting various health conditions, and leveraging multiple AI algorithms; this rising trend is expected to continue for years to come. …”
-
773
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …”
Get full text
-
774
Topology and parameter estimation in power systems through inverter-based broadband stimulations
Published 2015“…This study describes a method for identifying parameters associated with the power system model. In particular, the proposed algorithm in this study addresses the line parameter and topology identification task in the scope of state estimation. …”
Get full text
Get full text
Get full text
Get full text
article -
775
Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases
Published 2024“…To guarantee a safe and successful deployment in clinical practice, the use of AI in cardiology must be done with a thorough understanding of the algorithms and their limits. …”
-
776
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks
Published 2022“…In this paper, we propose data-driven machine learning (ML) schemes to efficiently solve these problems in wireless LAN (WLAN) networks. …”
-
777
Cost-Benefit Analysis of Genotype-Guided Interruption Days in Warfarin Pre-Procedural Management
Published 2023“…From the hospital's perspective, a cost-benefit analysis was conducted based on a 1-year decision-analytic follow-up model of the economic implications of using a pharmacogenetic algorithm vs standard of care in pre-operative warfarin management in the Hamad Medical Corporation, Qatar. …”
-
778
Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements
Published 2020“…A model is proposed to identify the parameters of a class of stochastic nonlinearsystems. …”
Get full text
article -
779
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
Published 2000“…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
Get full text
Get full text
Get full text
article -
780
Combinatorial method for bandwidth selection in wind speed kernel density estimation
Published 2019“…This goal calls for devising probabilistic models with adaptive algorithms that accurately fit wind speed distributions. …”
Get full text