Search alternatives:
processing algorithm » processing algorithms (Expand Search)
would algorithm » mould algorithm (Expand Search)
processing algorithm » processing algorithms (Expand Search)
would algorithm » mould algorithm (Expand Search)
-
541
Artificial Intelligence–Driven Serious Games in Health Care: Scoping Review
Published 2022“…A narrative approach was used for data synthesis.</p><h3>Results</h3><p dir="ltr">The search process returned 1470 records. …”
-
542
Framework for rapid design and optimisation of immersive battery cooling system
Published 2025“…A conjugate heat transfer model for a 3S2P pouch cell module (20 Ah LiFePO₄) is developed and validated against experimental data (< 2% error). The CFD model of a battery module is developed to train an ultra-fast metamodel for battery geometry optimisation. …”
-
543
Autopilot Design and Commercial Autopilot Evaluation Using Flybarless Helicopter
Published 2014Get full text
doctoralThesis -
544
Just-in-time defect prediction for mobile applications: using shallow or deep learning?
Published 2023“…In this research, we evaluate the performance of traditional machine learning algorithms and data sampling techniques for JITDP problems and compare the model performance with the performance of a DL-based prediction model. …”
-
545
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
Published 2023“…Moreover, the prevalent cloud-based nature of these systems introduces elevated cybersecurity risks and substantial data transmission overheads. …”
-
546
-
547
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
Get full text
-
548
Combinatorial method for bandwidth selection in wind speed kernel density estimation
Published 2019“…This goal calls for devising probabilistic models with adaptive algorithms that accurately fit wind speed distributions. …”
Get full text
-
549
Role of authentication factors in Fin-tech mobile transaction security
Published 2023“…<p dir="ltr">Fin-Tech is the merging of finance and technology, to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech is concerned. …”
-
550
A fine-grained XML structural comparison approach
Published 2007“…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
551
Predicting the Heats of Fusion of Ionic Liquids via Group Contribution Modeling and Machine Learning
Published 2022Get full text
doctoralThesis -
552
Automated systems for diagnosis of dysgraphia in children: a survey and novel framework
Published 2024“…This work discusses the data collection method, important handwriting features, and machine learning algorithms employed in the literature for the diagnosis of dysgraphia. …”
-
553
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
Published 2007“…Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
conferenceObject -
554
-
555
-
556
An efficient cache replacement strategy for the hybrid cache consistency approach
Published 2010“…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. In this thesis, we proposed a new cache replacement strategy, the Least Unified Value strategy (LUV) to replace the Least Recently Used (LRU) that SACCS was based on. …”
Get full text
Get full text
Get full text
article -
557
Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations
Published 2025“…To address this challenge, this study aims to optimize household energy consumption while preserving data privacy by proposing an innovative two-stage Federated Learning (FL) framework that delivers real-time micro-moment-based recommendations. …”
-
558
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
Published 2023“…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …”
-
559
Scatter search technique for exam timetabling
Published 2011“…We evaluate our suggested technique on real-world university data and compare our results with the registrar’s manual timetable in addition to the timetables of other heuristic optimization algorithms. …”
Get full text
Get full text
Get full text
article -
560
Multimodal feature fusion and ensemble learning for non-intrusive occupancy monitoring using smart meters
Published 2025“…In this study, we introduce the multimodal feature fusion for non-intrusive occupancy monitoring (MMF-NIOM) framework, which leverages both classical and deep machine learning algorithms to achieve state-of-the-art occupancy detection performance using smart meter data. …”