Search alternatives:
testing algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 701 - 720 results of 834 for search '(( elements method algorithm ) OR ((( data using algorithm ) OR ( from testing algorithm ))))', query time: 0.11s Refine Results
  1. 701

    Adaptive Federated Learning Architecture To Mitigate Non-IID Through Multi-Objective GA-Based Efficient Client Selection by Ajaj, Mohamad

    Published 2024
    “…In this paper, we propose a novel approach that incorporates genetic algorithms with an enhanced client selection strategy, utilizing client metadata rather than raw data. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  2. 702
  3. 703

    Multi-Modal Emotion Aware System Based on Fusion of Speech and Brain Information by M. Ghoniem, Rania

    Published 2019
    “…For classifying unimodal data of either speech or EEG, a hybrid fuzzy c-means-genetic algorithm-neural network model is proposed, where its fitness function finds the optimal fuzzy cluster number reducing the classification error. …”
    Get full text
    Get full text
  4. 704

    A Biologicaly Inspired Decision Model for Multivariable Genetic- Fuzzy-AHP System by Kouatli, Issam

    Published 2016
    “…This paper describes a hybridized intelligent algorithm as a tuning mechanism for one type of Genetic Fuzzy system termed the Genetic Fuzzimetric Technique (GFT). …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 705

    Prediction of Multiple Clinical Complications in Cancer Patients to Ensure Hospital Preparedness and Improved Cancer Care by Regina Padmanabhan (14231606)

    Published 2022
    “…Hence, for predicting three critical clinical complications, such as sepsis, the presence of multidrug-resistant organisms, and mortality, from the data available from medical records, we used 1166 febrile neutropenia episodes reported in 513 patients. …”
  6. 706

    Joint computing, communication and cost-aware task offloading in D2D-enabled Het-MEC by Abbas, Nadine

    Published 2022
    “…Furthermore, we propose a low-complexity algorithm that generates high performance results and can be applied for large-scale networks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 707
  8. 708
  9. 709

    Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects by ALKAABI, ABDULLA

    Published 2023
    “…Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …”
    Get full text
  10. 710

    Mobile hospitals routing for prioritized patients by Tarhini, Abbas

    Published 2017
    “…This paper implements and tests an intelligent variable neighbourhood search algorithm for MHRP. …”
    Get full text
    Get full text
    conferenceObject
  11. 711
  12. 712

    Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis by Ashraf Gad (17040114)

    Published 2024
    “…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…”
  13. 713
  14. 714
  15. 715
  16. 716

    Dynamic single node failure recovery in distributed storage systems by Itani, M.

    Published 2017
    “…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  17. 717

    Deepfakes Signatures Detection in the Handcrafted Features Space by Hamadene, Assia

    Published 2023
    “…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
    Get full text
  18. 718

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
  19. 719
  20. 720