بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
deer algorithm » search algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث)
models using » model using (توسيع البحث)
complement » implement (توسيع البحث), complementary (توسيع البحث)
element » elements (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
deer algorithm » search algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث)
models using » model using (توسيع البحث)
complement » implement (توسيع البحث), complementary (توسيع البحث)
element » elements (توسيع البحث)
-
641
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
منشور في 2023"…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
642
Improving the security of SNMP in wireless networks
منشور في 2017"…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). Symmetric cryptography is used for encryption and one-way cryptography is used for authentication. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
643
Robustness evaluation of real-Time Protocols
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
644
Computational evluation of protein energy functions
منشور في 2014"…Our findings show that the CHARMM energy model tends to be more appropriate for ab initio computational techniques that predict protein structures. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
645
-
646
Estimation of power grid topology parameters through pilot signals
منشور في 2016احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
647
-
648
A machine learning approach for localization in cellular environments
منشور في 2018"…The proposed approach only assumes knowledge of RSS fingerprints of the environment, and does not require knowledge of the cellular base transceiver station (BTS) locations, nor uses any RSS mathematical model. The proposed localization scheme integrates a weighted K-nearest neighbor (WKNN) and a multilayer neural network. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
649
-
650
The architecture of a highly reconfigurable RISC dataflow array processor
منشور في 2020"…This processor forms an element of a processor array which possess the features of both static and dynamic dataflow models. The array can be programmed to execute arbitrary algorithms in both static and dynamic manner. …"
احصل على النص الكامل
article -
651
-
652
Wearable Artificial Intelligence for Anxiety and Depression: Scoping Review
منشور في 2023"…The most frequently used data set from open sources was Depresjon. The most commonly used algorithm was random forest, followed by support vector machine.…"
-
653
Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis
منشور في 2024"…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…"
-
654
Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis
منشور في 2023"…Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
655
Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis
منشور في 2023"…<p>Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
-
656
-
657
A pragmatic approach for testing robustness on real-time component based systems
منشور في 2005"…Each tester is dedicated to test a single SUT component. A test execution algorithm with an approach to handle testers coordination and execution delay is presented. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
658
Integration of nonparametric fuzzy classification with an evolutionary-developmental framework to perform music sentiment-based analysis and composition
منشور في 2019"…Unlike existing solutions, MUSEC is: (i) a hybrid crossover between supervised learning (SL, to learn sentiments from music) and evolutionary computation (for music composition, MC), where SL serves at the fitness function of MC to compose music that expresses target sentiments, (ii) extensible in the panel of emotions it can convey, producing pieces that reflect a target crisp sentiment (e.g., love) or a collection of fuzzy sentiments (e.g., 65% happy, 20% sad, and 15% angry), compared with crisp-only or two-dimensional (valence/arousal) sentiment models used in existing solutions, (iii) adopts the evolutionary-developmental model, using an extensive set of specially designed music-theoretic mutation operators (trille, staccato, repeat, compress, etc.), stochastically orchestrated to add atomic (individual chord-level) and thematic (chord pattern-level) variability to the composed polyphonic pieces, compared with traditional evolutionary solutions producing monophonic and non-thematic music. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
659
Deep Neural Networks for Electromagnetic Inverse Scattering Problems in Microwave Imaging
منشور في 2023احصل على النص الكامل
doctoralThesis -
660
Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer
منشور في 2015"…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …"