بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
levels using » cells using (توسيع البحث)
complement » implement (توسيع البحث), complementary (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
levels using » cells using (توسيع البحث)
complement » implement (توسيع البحث), complementary (توسيع البحث)
-
401
Towards Multimedia Fragmentation
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
402
Next-generation energy systems for sustainable smart cities: Roles of transfer learning
منشور في 2022"…Next, an in-depth analysis is carried out to identify the pros and cons of current techniques and discuss unsolved issues. Moving on, two case studies illustrating the use of TL for (i) energy prediction with mobility data and (ii) load forecasting in sports facilities are presented. …"
-
403
Data Redundancy Management in Connected Environments
منشور في 2020"…To address these limitations, we propose a framework for data redundancy management at the device level, denoted DRMF. We describe its modules, and clustering-based algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
404
A Novel Deep Learning Technique for Detecting Emotional Impact in Online Education
منشور في 2022"…Emotional intelligence is the automatic detection of human emotions using various intelligent methods. Several studies have been conducted on emotional intelligence, and only a few have been adopted in education. …"
احصل على النص الكامل
-
405
Machine learning for predicting outcomes of transcatheter aortic valve implantation: A systematic review
منشور في 2025"…Most of the included studies focused on mortality prediction, utilizing datasets of varying sizes and diverse ML algorithms. …"
-
406
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
منشور في 2023"…Therefore, a systematic approach is presented to unfold the efforts and approaches of ANNs towards the security challenges of IoT. …"
-
407
An Introduction to the Special Issue “Protein Glycation in Food, Nutrition, Health and Disease”
منشور في 2022"…We also introduced to the conference the “Doha Glycation declaration”—an outline of areas of glycation research which will likely be fruitful to pursue to future studies, which gained widespread support. In this editorial, we give a brief introduction to this Special Issue, the development of glycation research, the papers presented, and the declaration. …"
-
408
Triage decisions for ICU admission
منشور في 2016"…The team made recommendations and concluded that triage should be led by intensivists considering input from nurses, emergency medicine professionals, hospitalists, surgeons, and allied professionals. Triage algorithms and protocols can be useful but can never supplant the role of skilled intensivists basing their decisions on input from multidisciplinary teams. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
409
Data redundancy management for leaf-edges in connected environments
منشور في 2022"…To address these limitations, we propose here DRMF: Data Redundancy Management for leaF-edges allowing to identify and remove data redundancies in connected environments at the device level. DRMF considers both static and mobile edge devices, and provides two algorithms for temporal and spatio-temporal redundancy detection. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
410
A Comprehensive Review of Digital Twin Technology in Building Energy Consumption Forecasting
منشور في 2024"…The digitalization of building energy forecasting systems, enhanced by Energy Digital Twin technology alongside IoT devices and advanced data-driven algorithms, offers substantial improvements in energy management and optimization, servicing, maintenance, and energy-efficient design. …"
-
411
HVAC system attack detection dataset
منشور في 2021"…It aims to promote and support the research in the field of cybersecurity of HVAC systems in smart buildings by facilitating the validation of attack detection and mitigation strategies, benchmarking the performance of different data-driven algorithms, and studying the impact of attacks on the HVAC system.…"
-
412
The use of multi-task learning in cybersecurity applications: a systematic literature review
منشور في 2024"…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …"
-
413
Artificial intelligence in respiratory care
منشور في 2024"…Despite barriers, the current decade is witnessing an increased utility of AI into diverse specialities of the medical field to enhance precision medicine, predict diagnosis, therapeutic results, and prognosis; this includes respiratory medicine, critical care, and in their allied specialties. AI algorithms are widely studied in areas like mechanical ventilation, sleep medicine, lung ultrasound, and pulmonary function diagnostics and the results are found to be promising. …"
-
414
Optimising Nurse–Patient Assignments: The Impact of Machine Learning Model on Care Dynamics—Discursive Paper
منشور في 2025"…</p><h3>Methods</h3><p dir="ltr">A discursive approach was used to optimise nurse–patient assignments and the impact of ML models. …"
-
415
The unified effect of data encoding, ansatz expressibility and entanglement on the trainability of HQNNs
منشور في 2023"…One of the prominent challenges lies in the presence of barren plateaus (BP) in QML algorithms, particularly in quantum neural networks (QNNs). …"
-
416
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
منشور في 2025"…An innovative Intrusion Detection System (IDS), IntruSafe, has been studied, developed, and presented in this paper that combines Fully Connected Convolutional Neural Network (FCNN) and Long Short-Term Memory (LSTM) to protect the IoMT network from malicious signals. …"