Search alternatives:
using function » using fusion (Expand Search)
algorithm sma » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm goa (Expand Search)
using function » using fusion (Expand Search)
algorithm sma » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm goa (Expand Search)
-
281
FoGMatch
Published 2019“…To address this problem, we propose in this paper a multi-criteria intelligent IoT scheduling approach in fog computing environments using matching game theory. Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …”
Get full text
Get full text
Get full text
masterThesis -
282
Condenser capacity and hyperbolic perimeterImage 1
Published 2021“…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
Get full text
Get full text
Get full text
article -
283
Condenser capacity and hyperbolic perimeter
Published 2022“…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
-
284
H.264/AVC to HEVC Video Transcoder Based on Dynamic Thresholding and Content Modeling
Published 2014“…Then, two types of mode mapping algorithms are proposed. In the first solution, a single H.264/AVC coding parameter is used to determine the outgoing HEVC partitions using dynamic thresholding. …”
Get full text
article -
285
Scalable Multimedia Streaming in Wireless Networks with Device-to-Device Cooperation
Published 2016“…We demonstrate the functionality of the proposed system on Android devices using heterogeneous networks (cellular/WiFi/WiFi-Direct) and show the formation of multiple clusters to allow for scalable operation. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
286
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …”
Get full text
Get full text
Get full text
Get full text
article -
287
Common weaving approach in mainstream languages for software security hardening
Published 2013“…GIMPLE weaving accompanied by a common aspect-oriented language (1) allows security experts providing security solutions using this common language, (2) lets developers focus on the main functionality of programs by relieving them from the burden of security issues, (3) unifies the matching and the weaving processes for mainstream languages, and (4) facilitates introducing new security features in AOP languages. …”
Get full text
Get full text
Get full text
article -
288
Integrated whole transcriptome and small RNA analysis revealed multiple regulatory networks in colorectal cancer
Published 2021“…Computational analyses using Ingenuity Pathway Analysis (IPA) identified multiple activated signaling networks in CRC, including ERBB2, RABL6, FOXM1, and NFKB networks, while functional annotation highlighted activation of cell proliferation and migration as the hallmark of CRC. …”
-
289
Copy number variations in the genome of the Qatari population
Published 2015“…The four call-sets were integrated to identify high confidence CNV regions, which were subsequently annotated for putative functional effect and compared to public databases of CNVs in other populations. …”
-
290
Single-Cell Transcriptome Analysis Highlights a Role for Neutrophils and Inflammatory Macrophages in the Pathogenesis of Severe COVID-19
Published 2020“…Herein, we employed iterative clustering and guide-gene selection 2 (ICGS2) as well as uniform manifold approximation and projection (UMAP) dimensionality reduction computational algorithms to decipher the complex immune and cellular composition of BAL, using publicly available datasets from a total of 68,873 single cells derived from two healthy subjects, three patients with mild COVID-19, and five patients with severe COVID-19. …”
-
291
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
Published 2024“…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …”
-
292
The architecture of a highly reconfigurable RISC dataflow array processor
Published 2020“…The array can be programmed to execute arbitrary algorithms in both static and dynamic manner. The processor array is modelled at the behavioural level in VHDl. …”
Get full text
article -
293
-
294
DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins
Published 2025“…Unlike standard machine learning approaches such as PCA, LDA, SVM, RF, GBM etc, DeepRaman functions independently, requiring no human interaction, and can be used to much smaller datasets than traditional CNNs. …”
Get full text
Get full text
Get full text
article -
295
Single-Cell Transcriptome Analysis Revealed Heterogeneity and Identified Novel Therapeutic Targets for Breast Cancer Subtypes
Published 2023“…Mechanistically, targeted depletion of ENO1 and FDPS halted TNBC cell proliferation, colony formation, and organoid tumor growth under 3-dimensional conditions and increased cell death, suggesting their potential use as novel therapeutic targets for TNBC. Differential expression and gene set enrichment analysis in TNBC revealed enrichment in the cycle and mitosis functional categories in FDPShigh, while ENO1high was associated with numerous functional categories, including cell cycle, glycolysis, and ATP metabolic processes. …”