Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
element based » event based (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
element based » event based (Expand Search)
-
81
GENETIC SCHEDULING OF TASK GRAPHS
Published 2020“…The problem of assigning tasks to processing elements as a combinatorital optimization is formulated, and a heuristic based on a genetic algorithm is presented. …”
Get full text
article -
82
An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services
Published 2018“…Further, 414 automatic questions are tested on the QA algorithm using two methods, semantics-based and keyword-based. …”
Get full text
-
83
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
Published 2008“…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
Get full text
Get full text
Get full text
article -
84
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Therefore, for this paper multiple machine learning algorithms are investigated to predict system failure based on vehicle trips information as well as maintenance management historical data including preventive maintenance and corrective maintenance. …”
Get full text
-
85
Left Ventricular Wall Motion Estimation by Active Polynomials for Acute Myocardial Infarction Detection
Published 2020“…The so-called HMC-QU database will serve as the benchmark for the forthcoming relevant studies. The results over HMC-QU dataset show that the proposed approach can achieve 87.94% accuracy, 92.86% sensitivity and 87.64% precision in MI detection even though the echo quality is quite poor and the temporal resolution is low.…”
-
86
Nitrofurantoin-induced pulmonary toxicity
Published 2016“…Using clinical judgment and the algorithm of Naranjo, it was determined that nitrofurantoin use was the probable cause of the patient's lung injury. …”
Get full text
Get full text
Get full text
Get full text
article -
87
Multi-UAV-Enabled Mobile Edge Computing IoT Systems: Joint Association and Resource Allocation Framework
Published 2024Get full text
doctoralThesis -
88
A simplified sliding‐mode control method for multi‐level transformerless DVR
Published 2022“…The studied T-type inverter-based TDVR topology offers an alternative solution to the existing DVR topologies. …”
-
89
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
Published 2022“…</p> <h2>Conclusion</h2> <p> Genetic algorithms can be used along with finite element analysis and zigzag cutouts to tune the band gap of plates subjected to base-excitations. …”
-
90
Applications of artificial intelligence in ultrasound imaging for carpal-tunnel syndrome diagnosis: a scoping review
Published 2025“…Editorials, expert opinions, conference papers, dataset publications, and studies that did not have a clear clinical application of the AI algorithm were excluded.…”
-
91
-
92
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
Published 2024“…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …”
-
93
Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis
Published 2024“…<h3>Objectives</h3><p dir="ltr">To investigate the association between birth weight to placental weight (BW/PW) ratio, and echocardiographic left ventricle (LV) morphology at birth, while accounting for other relevant perinatal factors.</p><h3>Methods</h3><p dir="ltr">A prospective cohort study was conducted on neonates at NewYork-Presbyterian Brooklyn Methodist Hospital from 2014 to 2018, categorized by their BW/PW percentile. …”
-
94
Efficient unified Montgomery inversion with multi-bit shifting
Published 2005“…Since the existing algorithms based on the extended Euclidean algorithm do not permit a fast software implementation, projective co-ordinates, which eliminate almost all of the inversion operations from the curve arithmetic, are preferred. …”
Get full text
Get full text
article -
95
Multidimensional Gains for Stochastic Approximation
Published 2019“…Necessary and sufficient conditions for M≥ N algorithms are presented pertaining to algorithm stability and convergence of the estimate error covariance matrix. …”
Get full text
Get full text
Get full text
Get full text
article -
96
A Multi-Channel Convolutional Neural Network approach to automate the citation screening process
Published 2021“…The citation screening process aims to identify the relevant primary studies fairly and with high rigor using selection criteria. …”
-
97
Communications in electronic textile systems
Published 2017“…A new algorithm based on token grid schemes is presented that takes advantage of the e-textile physical configuration.…”
Get full text
Get full text
Get full text
conferenceObject -
98
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
Published 2021“…<h3>Background</h3><p dir="ltr">Shortly after the emergence of COVID-19, researchers rapidly mobilized to study numerous aspects of the disease such as its evolution, clinical manifestations, effects, treatments, and vaccinations. …”
-
99
Oversampling techniques for imbalanced data in regression
Published 2024“…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
-
100
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”