Search alternatives:
processing algorithm » processing algorithms (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
text » test (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
text » test (Expand Search)
element » elements (Expand Search)
-
301
Next-generation energy systems for sustainable smart cities: Roles of transfer learning
Published 2022“…Next, an in-depth analysis is carried out to identify the pros and cons of current techniques and discuss unsolved issues. Moving on, two case studies illustrating the use of TL for (i) energy prediction with mobility data and (ii) load forecasting in sports facilities are presented. …”
-
302
Machine learning for predicting outcomes of transcatheter aortic valve implantation: A systematic review
Published 2025“…Most of the included studies focused on mortality prediction, utilizing datasets of varying sizes and diverse ML algorithms. …”
-
303
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
Published 2023“…Therefore, a systematic approach is presented to unfold the efforts and approaches of ANNs towards the security challenges of IoT. …”
-
304
An Introduction to the Special Issue “Protein Glycation in Food, Nutrition, Health and Disease”
Published 2022“…We also introduced to the conference the “Doha Glycation declaration”—an outline of areas of glycation research which will likely be fruitful to pursue to future studies, which gained widespread support. In this editorial, we give a brief introduction to this Special Issue, the development of glycation research, the papers presented, and the declaration. …”
-
305
A Comprehensive Review of Digital Twin Technology in Building Energy Consumption Forecasting
Published 2024“…The digitalization of building energy forecasting systems, enhanced by Energy Digital Twin technology alongside IoT devices and advanced data-driven algorithms, offers substantial improvements in energy management and optimization, servicing, maintenance, and energy-efficient design. …”
-
306
HVAC system attack detection dataset
Published 2021“…It aims to promote and support the research in the field of cybersecurity of HVAC systems in smart buildings by facilitating the validation of attack detection and mitigation strategies, benchmarking the performance of different data-driven algorithms, and studying the impact of attacks on the HVAC system.…”
-
307
The use of multi-task learning in cybersecurity applications: a systematic literature review
Published 2024“…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …”
-
308
Artificial intelligence in respiratory care
Published 2024“…Despite barriers, the current decade is witnessing an increased utility of AI into diverse specialities of the medical field to enhance precision medicine, predict diagnosis, therapeutic results, and prognosis; this includes respiratory medicine, critical care, and in their allied specialties. AI algorithms are widely studied in areas like mechanical ventilation, sleep medicine, lung ultrasound, and pulmonary function diagnostics and the results are found to be promising. …”
-
309
The unified effect of data encoding, ansatz expressibility and entanglement on the trainability of HQNNs
Published 2023“…One of the prominent challenges lies in the presence of barren plateaus (BP) in QML algorithms, particularly in quantum neural networks (QNNs). …”
-
310
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
Published 2025“…An innovative Intrusion Detection System (IDS), IntruSafe, has been studied, developed, and presented in this paper that combines Fully Connected Convolutional Neural Network (FCNN) and Long Short-Term Memory (LSTM) to protect the IoMT network from malicious signals. …”