Search alternatives:
making algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
work algorithm » swarm algorithm (Expand Search), rd algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
element » elements (Expand Search)
making algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
work algorithm » swarm algorithm (Expand Search), rd algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
element » elements (Expand Search)
-
261
Building power consumption datasets: Survey, taxonomy and future directions
Published 2020“…Accordingly, a novel visualization strategy based on using power consumption micro-moments has been presented along with an example of deploying machine learning algorithms to classify the micro-moment classes and identify anomalous power usage.…”
-
262
Design and Development of a Synergetic Controller for a Permanent Magnet Synchronous Motor Drive System
Published 2017Get full text
doctoralThesis -
263
Predicting Compression Modes and Split Decisions for HEVC Video Coding Using Machine Learning Techniques
Published 2017Get full text
doctoralThesis -
264
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
Get full text
Get full text
Get full text
Get full text
article -
265
An efficient cache replacement strategy for the hybrid cache consistency approach
Published 2010“…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. …”
Get full text
Get full text
Get full text
article -
266
After generative AI : preparing faculty to transform education, learning, and pedagogy
Published 2025“…Going beyond basic explanations, Hardey and Aad provide practical insights and implementation strategies that recognize the concerns and ethical challenges related to GAI, such as bias in algorithms, privacy issues, and the need for inclusivity. …”
Get full text
Get full text
Get full text
Get full text
bookPart -
267
-
268
-
269
Enhancing e-learning through AI: advanced techniques for optimizing student performance
Published 2024“…AI algorithms, known for their cognitive ability and capacity to learn, adapt, and make decisions, are employed to analyze and forecast student performance, thereby improving educational quality and outcomes. …”
-
270
-
271
LDSVM: Leukemia Cancer Classification Using Machine Learning
Published 2022“…Moreover, a Synthetic minority oversampling technique (SMOTE) and Principal compenent analysis (PCA) approaches were implemented. This makes the records generalized and evaluates the outcomes well. …”
-
272
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
Published 2023“…Therefore, a systematic approach is presented to unfold the efforts and approaches of ANNs towards the security challenges of IoT. …”
-
273
Various Faults Classification of Industrial Application of Induction Motors Using Supervised Machine Learning: A Comprehensive Review
Published 2025“…This paper presents a comprehensive review of recent techniques proposed in the literature for bearing, stator winding and broken rotor bar faults with machine learning algorithms focused on fault detection for numerous faults. …”
-
274
Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases
Published 2024“…These AI algorithms are effective non-invasive biomarkers for cardiovascular illnesses because they can identify subtle patterns and signals in the ECG that may not be readily apparent to human interpreters. …”
-
275
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
Published 2023“…However, despite the significant impact of AI design on human interests, the security and trustworthiness of edge AI applications are not foolproof and ethicalneither foolproof nor ethical; Moreover, social norms are often ignored duringin the design, implementation, and deployment of edge AI systems. In this paper, we make the following two contributions: Firstly, we analyze the application of edge AI through a human-centric perspective. …”
-
276
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…Finally, study limitations and recommendations for future works represented the research outcomes and contributions.…”
Get full text