Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
search » research (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
search » research (Expand Search)
-
161
Nonlinear Friction Identification of A Linear Voice Coil DC Motor
Published 2015Get full text
doctoralThesis -
162
Single-Cell Transcriptome Analysis Highlights a Role for Neutrophils and Inflammatory Macrophages in the Pathogenesis of Severe COVID-19
Published 2020“…Herein, we employed iterative clustering and guide-gene selection 2 (ICGS2) as well as uniform manifold approximation and projection (UMAP) dimensionality reduction computational algorithms to decipher the complex immune and cellular composition of BAL, using publicly available datasets from a total of 68,873 single cells derived from two healthy subjects, three patients with mild COVID-19, and five patients with severe COVID-19. …”
-
163
Machine learning for predicting outcomes of transcatheter aortic valve implantation: A systematic review
Published 2025“…Most of the included studies focused on mortality prediction, utilizing datasets of varying sizes and diverse ML algorithms. The most employed ML algorithms were random forest, logistics regression, and gradient boosting. …”
Get full text
Get full text
Get full text
article -
164
Precision nutrition: A systematic literature review
Published 2021“…As such, recent research has applied machine learning algorithms, tools, and techniques in precision nutrition for different purposes. …”
-
165
Prediction the performance of multistage moving bed biological process using artificial neural network (ANN)
Published 2020“…<p dir="ltr">Complexity, uncertainty, and high dynamic nature of nutrient removal through biological processes (BPs) makes it difficult to model and control these processes, forcing designers to rely on approximations, probabilities, and assumptions. …”
-
166
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
167
Machine learning for predicting outcomes of transcatheter aortic valve implantation: A systematic review
Published 2025“…Most of the included studies focused on mortality prediction, utilizing datasets of varying sizes and diverse ML algorithms. The most employed ML algorithms were random forest, logistics regression, and gradient boosting. …”
-
168
UML-based regression testing for OO software
Published 2010“…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …”
Get full text
Get full text
Get full text
article -
169
Assessment of Inventory and Transportation Collaboration in a Logistics Marketplace
Published 2020Get full text
doctoralThesis -
170
Dynamic multiple node failure recovery in distributed storage systems
Published 2018“…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …”
Get full text
Get full text
Get full text
Get full text
article -
171
A fine-grained XML structural comparison approach
Published 2007“…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
172
A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks
Published 2025“…<p>The energy internet (EI) is evolving toward decentralized, data-rich, and time-critical operation, where legacy optimization often fails to meet complexity, scalability, and real-time constraints. …”
-
173
Unlocking new frontiers in epilepsy through AI: From seizure prediction to personalized medicine
Published 2025“…Ethical considerations, such as safeguarding patient privacy, ensuring data security, and mitigating algorithmic bias, underscore the importance of responsible AI integration. …”
-
174
Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks
Published 2018“…We generate results as a function of a wide range of system parameters, and demonstrate that the proposed algorithms achieve near-optimal performance with notably low time complexity.…”
Get full text
Get full text
Get full text
Get full text
article -
175
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …”
Get full text
-
176
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
Published 2007“…Developing efficient techniques for comparing XML-based documents becomes essential in the database and information retrieval communities. Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
conferenceObject -
177
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
Get full text
-
178
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
Get full text
Get full text
-
179
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
Published 2017Get full text
doctoralThesis -
180
User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations
Published 2017“…We formulate the problem as an optimization that aims at maximizing the number of served users while maintaining target quality of service using device-to-device cooperation, in-device caching, and intelligent channel allocation. Due to the complexity of the problem, we design sub-optimal hierarchical tree-based algorithms for real-time operation taking into account realistic constraints. …”
Get full text
Get full text
Get full text
masterThesis