Search alternatives:
making algorithm » cosine algorithm (Expand Search)
means algorithm » search algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
data making » data mining (Expand Search)
element » elements (Expand Search)
making algorithm » cosine algorithm (Expand Search)
means algorithm » search algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
data making » data mining (Expand Search)
element » elements (Expand Search)
-
161
Using artificial bee colony to optimize software quality estimation models. (c2015)
Published 2016“…We validate our technique on data describing maintainability and reliability of classes in an Object-Oriented system. …”
Get full text
Get full text
masterThesis -
162
Deep Learning in Smart Grid Technology: A Review of Recent Advancements and Future Prospects
Published 2021“…This ongoing transition undergoes rapid changes, requiring a plethora of advanced methodologies to process the big data generated by various units. In this context, SG stands tied very closely to Deep Learning (DL) as an emerging technology for creating a more decentralized and intelligent energy paradigm while integrating high intelligence in supervisory and operational decision-making. …”
-
163
DASSI: differential architecture search for splice identification from DNA sequences
Published 2022“…<h2>Background</h2> <p>The data explosion caused by unprecedented advancements in the field of genomics is constantly challenging the conventional methods used in the interpretation of the human genome. …”
-
164
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
Published 2022“…Implications are that toxicity trigger detection algorithms can leverage generic approaches but must also tailor detections to specific communities.…”
-
165
Developing a UAE-Based Disputes Prediction Model using Machine Learning
Published 2022Get full text
doctoralThesis -
166
-
167
Resilience analytics: coverage and robustness in multi-modal transportation networks
Published 2018“…A future goal is to use this experience to make projections for a fast growing city like Doha.…”
-
168
PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning
Published 2022“…<p dir="ltr">Physical-layer security is regaining traction in the research community, due to the performance boost introduced by deep learning classification algorithms. This is particularly true for sender authentication in wireless communications via radio fingerprinting. …”
-
169
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
Published 2023“…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …”
-
170
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
171
Prediction the performance of multistage moving bed biological process using artificial neural network (ANN)
Published 2020“…<p dir="ltr">Complexity, uncertainty, and high dynamic nature of nutrient removal through biological processes (BPs) makes it difficult to model and control these processes, forcing designers to rely on approximations, probabilities, and assumptions. …”
-
172
A Fusion-Based Approach for Skin Cancer Detection Combining Clinical Images, Dermoscopic Images, and Metadata
Published 2025Get full text
doctoralThesis -
173
CEAP
Published 2016“…To reduce the overhead of the proposed detection model and make it feasible for the resource-constrained nodes, we reduce the size of the training dataset by (1) restricting the data collection, storage, and analysis to concern only a set of specialized nodes (i.e., Multi-Point Relays) that are responsible for forwarding packets on behalf of their clusters; and (2) migrating only few tuples (i.e., support vectors) from one detection iteration to another. …”
Get full text
Get full text
Get full text
Get full text
article -
174
Dynamic single node failure recovery in distributed storage systems
Published 2017“…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
Get full text
Get full text
Get full text
Get full text
article -
175
-
176
Efficient Seismic Volume Compression using the Lifting Scheme
Published 2000“…In addition, the lifting scheme offers: 1) a dramatic reduction of the required auxiliary memory, 2) an efficient combination with parallel rendering algorithms to perform arbitrary surface and volume rendering for interactive visualization, and 3) an easy integration in the parallel I/O seismic data loading routines. …”
Get full text
article -
177
Machine Learning Model for a Sustainable Drilling Process
Published 2023Get full text
doctoralThesis -
178
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
Get full text
-
179
Predicting insulin dosage for diabetic patients to reach optimal glucose levels. (c2012)
Published 2012Get full text
Get full text
masterThesis -
180
A fine-grained XML structural comparison approach
Published 2007“…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject