بدائل البحث:
algorithm a » algorithm fa (توسيع البحث), algorithms a (توسيع البحث), algorithm _ (توسيع البحث)
a function » _ functional (توسيع البحث)
algorithm a » algorithm fa (توسيع البحث), algorithms a (توسيع البحث), algorithm _ (توسيع البحث)
a function » _ functional (توسيع البحث)
-
341
Condenser capacity and hyperbolic perimeter
منشور في 2022"…Especially, we apply domain functionals to study the capacities of condensers (,) where is a simply connected domain in the complex plane and is a compact subset of . …"
-
342
Deploying model obfuscation: towards the privacy of decision-making models on shared platforms
منشور في 2024"…Privacy and security of data and models are fundamental necessities that must be satisfied for this protocol's proper functioning. To this end, we propose a conceptual and algorithmic framework of a model obfuscation scheme. …"
احصل على النص الكامل
احصل على النص الكامل
-
343
Scalable Multimedia Streaming in Wireless Networks with Device-to-Device Cooperation
منشور في 2016"…This is particularly applicable to use cases such as delivering real-time multimedia content to fans watching a soccer game in a stadium or to participants attending a major conference in a large auditorium. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
344
DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins
منشور في 2025"…BackgroundBacterial endotoxin, a lipopolysaccharide exuded by bacteria during their growth and infection process, serves as a valuable biomarker for bacterial identification. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
345
IoT-Based Sustainable Parking Lot
منشور في 2023"…The access control system employs a combination of vehicle detection and plate recognition algorithms to identify and authenticate vehicles entering and exiting the parking lot. …"
احصل على النص الكامل
article -
346
Common weaving approach in mainstream languages for software security hardening
منشور في 2013"…GIMPLE weaving accompanied by a common aspect-oriented language (1) allows security experts providing security solutions using this common language, (2) lets developers focus on the main functionality of programs by relieving them from the burden of security issues, (3) unifies the matching and the weaving processes for mainstream languages, and (4) facilitates introducing new security features in AOP languages. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
347
FoGMatch
منشور في 2019"…Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
348
Intelligent Bilateral Client Selection in Federated Learning Using Game Theory
منشور في 2022"…Our solution involves designing (1) preference functions for the client IoT devices and federated servers to allow them to rank each other according to several factors such as accuracy and price, (2) intelligent matching algorithms that take into account the preferences of both parties in their design, and (3) bootstrapping technique that capitalizes on the collaboration of multiple federated servers in order to assign initial accuracy value for the new connected IoT devices. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis