Search alternatives:
processing algorithm » processing algorithms (Expand Search)
would algorithm » mould algorithm (Expand Search)
Showing 541 - 560 results of 600 for search '(( elements would algorithm ) OR ((( data based algorithm ) OR ( data processing algorithm ))))', query time: 0.11s Refine Results
  1. 541

    Artificial Intelligence–Driven Serious Games in Health Care: Scoping Review by Alaa Abd-alrazaq (17058018)

    Published 2022
    “…A narrative approach was used for data synthesis.</p><h3>Results</h3><p dir="ltr">The search process returned 1470 records. …”
  2. 542

    Framework for rapid design and optimisation of immersive battery cooling system by Ali Almshahy (23544823)

    Published 2025
    “…A conjugate heat transfer model for a 3S2P pouch cell module (20 Ah LiFePO₄) is developed and validated against experimental data (< 2% error). The CFD model of a battery module is developed to train an ultra-fast metamodel for battery geometry optimisation. …”
  3. 543
  4. 544

    Just-in-time defect prediction for mobile applications: using shallow or deep learning? by Raymon van Dinter (10521952)

    Published 2023
    “…In this research, we evaluate the performance of traditional machine learning algorithms and data sampling techniques for JITDP problems and compare the model performance with the performance of a DL-based prediction model. …”
  5. 545

    Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort by Sergio Márquez-Sánchez (19437985)

    Published 2023
    “…Moreover, the prevalent cloud-based nature of these systems introduces elevated cybersecurity risks and substantial data transmission overheads. …”
  6. 546
  7. 547

    Deepfakes Signatures Detection in the Handcrafted Features Space by Hamadene, Assia

    Published 2023
    “…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
    Get full text
  8. 548

    Combinatorial method for bandwidth selection in wind speed kernel density estimation by El Dakkak, Omar

    Published 2019
    “…This goal calls for devising probabilistic models with adaptive algorithms that accurately fit wind speed distributions. …”
    Get full text
  9. 549

    Role of authentication factors in Fin-tech mobile transaction security by Habib Ullah Khan (12024579)

    Published 2023
    “…<p dir="ltr">Fin-Tech is the merging of finance and technology, to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech is concerned. …”
  10. 550

    A fine-grained XML structural comparison approach by Tekli, Joe

    Published 2007
    “…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 551
  12. 552

    Automated systems for diagnosis of dysgraphia in children: a survey and novel framework by Jayakanth Kunhoth (14158908)

    Published 2024
    “…This work discusses the data collection method, important handwriting features, and machine learning algorithms employed in the literature for the diagnosis of dysgraphia. …”
  13. 553

    Efficient XML Structural Similarity Detection using Sub-tree Commonalities by Tekli, Joe

    Published 2007
    “…Various algorithms for comparing hierarchically structured data, e.g. …”
    Get full text
    Get full text
    conferenceObject
  14. 554
  15. 555
  16. 556

    An efficient cache replacement strategy for the hybrid cache consistency approach by Haraty, Ramzi A.

    Published 2010
    “…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. In this thesis, we proposed a new cache replacement strategy, the Least Unified Value strategy (LUV) to replace the Least Recently Used (LRU) that SACCS was based on. …”
    Get full text
    Get full text
    Get full text
    article
  17. 557

    Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations by Md Mosarrof Hossen (21399056)

    Published 2025
    “…To address this challenge, this study aims to optimize household energy consumption while preserving data privacy by proposing an innovative two-stage Federated Learning (FL) framework that delivers real-time micro-moment-based recommendations. …”
  18. 558

    Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images by Rehan Raza (17019105)

    Published 2023
    “…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …”
  19. 559

    Scatter search technique for exam timetabling by Mansour, Nashat

    Published 2011
    “…We evaluate our suggested technique on real-world university data and compare our results with the registrar’s manual timetable in addition to the timetables of other heuristic optimization algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  20. 560

    Multimodal feature fusion and ensemble learning for non-intrusive occupancy monitoring using smart meters by Sakib Mahmud (15302404)

    Published 2025
    “…In this study, we introduce the multimodal feature fusion for non-intrusive occupancy monitoring (MMF-NIOM) framework, which leverages both classical and deep machine learning algorithms to achieve state-of-the-art occupancy detection performance using smart meter data. …”