Showing 121 - 140 results of 179 for search '(((( complement maya algorithm ) OR ( relevant data algorithm ))) OR ( level modeling algorithm ))', query time: 0.11s Refine Results
  1. 121
  2. 122

    Tailoring motivational health messages for smoking cessation using an mHealth recommender system integrated with an electronic health record: a study protocol by Santiago Hors-Fraile (5950823)

    Published 2018
    “…Health recommender systems are information-filtering algorithms that can choose the most relevant health-related items—for instance, motivational messages aimed at smoking cessation—for each user based on his or her profile. …”
  3. 123
  4. 124

    An automated temporal partitioning and loop fission approach for FPGA based reconfigurable synthesis of DSP applications by Ouaiss, I.

    Published 2017
    “…We present an automated temporal partitioning and loop transformation approach for developing dynamically reconfigurable designs starting from behavior level specifications. An Integer Linear Programming (ILP) model is formulated to achieve near-optimal latency designs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 125

    Full-fledged semantic indexing and querying model designed for seamless integration in legacy RDBMS by Tekli, Joe

    Published 2018
    “…In the past decade, there has been an increasing need for semantic-aware data search and indexing in textual (structured and NoSQL) databases, as full-text search systems became available to non-experts where users have no knowledge about the data being searched and often formulate query keywords which are different from those used by the authors in indexing relevant documents, thus producing noisy and sometimes irrelevant results. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  6. 126

    Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer by Andrea Remo (447375)

    Published 2015
    “…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …”
  7. 127

    Joint BS Assignment and End-to-End Scheduling for Wireless Cellular Networks with Heterogeneous Services by Saad, Walid

    Published 2010
    “…Moreover, we extend the system model to include heterogeneous services with varying quality parameters. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 128
  9. 129

    A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis by Alaa Abd-Alrazaq (17430900)

    Published 2021
    “…Publishers should avoid noise in the data by developing a way to trace the evolution of individual publications and unique authors.…”
  10. 130
  11. 131

    Data redundancy management for leaf-edges in connected environments by Mansour, Elio

    Published 2022
    “…To address these limitations, we propose here DRMF: Data Redundancy Management for leaF-edges allowing to identify and remove data redundancies in connected environments at the device level. DRMF considers both static and mobile edge devices, and provides two algorithms for temporal and spatio-temporal redundancy detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 132

    A simple approach for testing web service based applications by Tarhini, Abbas

    Published 2005
    “…In our technique, a web application and its composed components are specified by a two-level abstract model. The web application is represented as Task Precedence Graph (TPG) and the behavior of the composed components is represented as a Timed Labeled Transition System (TLTS). …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 133

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
    Get full text
  14. 134

    SemIndex+: A semantic indexing scheme for structured, unstructured, and partly structured data by Tekli, Joe

    Published 2018
    “…Various weighting functions and a parallelized search algorithm have been developed for that purpose and are presented here. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  15. 135

    Oversampling techniques for imbalanced data in regression by Samir Brahim Belhaouari (9427347)

    Published 2024
    “…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
  16. 136

    Blockchain-Based Decentralized Architecture for Software Version Control by Muhammad Hammad (17541570)

    Published 2023
    “…<p dir="ltr">Version control is an important component of configuration management, and most enterprise-level software uses different tools and technologies to manage the software version control such as CVS, Subversion, or Perforce. …”
  17. 137

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
    Get full text
    Get full text
  18. 138

    Role of authentication factors in Fin-tech mobile transaction security by Habib Ullah Khan (12024579)

    Published 2023
    “…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
  19. 139

    Novel biomarkers for potential risk stratification of drug induced liver injury (DILI) by Mohammed Ibn-Mas’ud Danjuma (13192169)

    Published 2019
    “…</p><h3>Methods:</h3><p dir="ltr">We explored PUBMED and all other relevant databases for scientific studies that explored potential utility of novel biomarkers of DILI, and subsequently carried out a narrative synthesis of this data. …”
  20. 140

    Vehicular-OBUs-As-On-Demand-Fogs by Sami, Hani

    Published 2020
    “…For instance, real-time vehicular applications require fast processing of the vast amount of generated data by vehicles in order to maintain service availability and reachability while driving. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article