Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
search » research (Expand Search)
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
search » research (Expand Search)
-
561
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Therefore, for this paper multiple machine learning algorithms are investigated to predict system failure based on vehicle trips information as well as maintenance management historical data including preventive maintenance and corrective maintenance. …”
Get full text
-
562
The Assessment and Allocation of Public Private Partnership Risks in the UAE
Published 2022Get full text
doctoralThesis -
563
Online dynamic ensemble deep random vector functional link neural network for forecasting
Published 2023“…Then, an online learning algorithm is designed to learn the edRVFL. Finally, an online dynamic ensemble method, which can measure the change in the distribution, is proposed for aggregating all layers’ outputs. …”
-
564
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
Published 2022“…This study proposes an analytical method based on sequential quadratic programming (SQP) methodology coupled with a mean value analysis (MVA) algorithm to solve this NP-Hard problem. …”
-
565
Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT)
Published 2015“…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
566
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
Published 2022“…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …”
Get full text
Get full text
Get full text
masterThesis -
567
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
Published 2019“…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
-
568
Tracking and repairing damaged healthcare databases using the matrix
Published 2015“…The algorithm is based on data dependency and uses a single matrix. …”
Get full text
Get full text
Get full text
Get full text
article -
569
Optimal supercharge scheduling of electric vehicles
Published 2018“…The distributed game-theoretical approach recorded promising results especially when compared to the well-known shortest job first scheduling algorithm. Further, unlike the other approaches, which normally are centralized and suited for offline scheduling, the game-based method is suited for online scheduling since it played at anytime a batch of EVs requests charging services. …”
Get full text
Get full text
Get full text
Get full text
article -
570
Low Cost Autopilot Design Using Fuzzy Supervisory Control
Published 2005Get full text
doctoralThesis -
571
Information Warfare
Published 2015“…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
572
LDSVM: Leukemia Cancer Classification Using Machine Learning
Published 2022“…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …”
-
573
Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature
Published 2022“…MethodsA systematic review of cases of extremity ischemia and necrosis after envenomation by marine cnidarians was performed to clarify what is and what is not known about management and outcomes, to draw conclusions about how best to manage these rare presentations, and to establish an evidence-based algorithm. …”
Get full text
Get full text
Get full text
article -
574
From Collatz Conjecture to chaos and hash function
Published 2023“…In the proposed method, the chaotic variables are governed by cryptographic keys, crucial in generating data sequences. …”
-
575
Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St...
Published 2024“…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. …”
-
576
Predicting Calcein Release from Ultrasound-Targeted Liposomes: A Comparative Analysis of Random Forest and Support Vector Machine
Published 2024“…The type of algorithm employed to predict drug release from liposomes plays an important role in affecting the accuracy. …”
Get full text
article -
577
Decision-level Gait Fusion for Human Identification at a Distance
Published 2014Get full text
doctoralThesis -
578
Benchmark on a large cohort for sleep-wake classification with machine learning techniques
Published 2019“…However, the largest experiments conducted to date, have had only hundreds of participants. In this work, we processed the data of the recently published Multi-Ethnic Study of Atherosclerosis (MESA) Sleep study to have both PSG and actigraphy data synchronized. …”
-
579
Improving Rule Set Based Software Quality Prediction
Published 2003Get full text
Get full text
article -
580
An Iterative Heuristic for State Justi�cation in Sequential Automatic Test Pattern Generation
Published 2001“…In this work, we adopt a hybrid approach for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justifcation sequences vector by vector. …”
Get full text
article