بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
system » systems (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
system » systems (توسيع البحث)
-
881
THE FUTURE OF MEDICINE, healthcare innovation through precision medicine: policy case study of Qatar
منشور في 2020"…Consequently, the big data revolution has provided an opportunity to apply artificial intelligence and machine learning algorithms to mine such a vast data set. …"
-
882
Design and Analysis of Secure Digital Twin Architecture
منشور في 2022احصل على النص الكامل
doctoralThesis -
883
-
884
Copy number variations in the genome of the Qatari population
منشور في 2015"…Genotyping intensities and genome sequencing data from 97 Qataris were analyzed with four different algorithms and integrated to discover 16,660 high confidence CNV regions (CNVRs) in the total population, affecting ~28 Mb in the median Qatari genome. …"
-
885
-
886
Cyberbullying Detection Model for Arabic Text Using Deep Learning
منشور في 2023"…Therefore, in this study, we conduct a performance evaluation and comparison for various DL algorithms (LSTM, GRU, LSTM-ATT, CNN-BLSTM, CNN-LSTM and LSTM-TCN) on different datasets of Arabic cyberbullying to obtain more precise and dependable findings. …"
احصل على النص الكامل
-
887
Face Flow: Constrained Optical Flow Framework for Faces
منشور في 2020احصل على النص الكامل
doctoralThesis -
888
FoGMatch
منشور في 2019"…To address this problem, we propose in this paper a multi-criteria intelligent IoT scheduling approach in fog computing environments using matching game theory. Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
889
Full-fledged semantic indexing and querying model designed for seamless integration in legacy RDBMS
منشور في 2018"…In the past decade, there has been an increasing need for semantic-aware data search and indexing in textual (structured and NoSQL) databases, as full-text search systems became available to non-experts where users have no knowledge about the data being searched and often formulate query keywords which are different from those used by the authors in indexing relevant documents, thus producing noisy and sometimes irrelevant results. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
890
-
891
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
منشور في 2023"…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …"
-
892
Reconstruction and simulation of neocortical microcircuitry
منشور في 2015"…The reconstruction uses cellular and synaptic organizing principles to algorithmically reconstruct detailed anatomy and physiology from sparse experimental data. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
893
Diagnostic test accuracy of AI-assisted mammography for breast imaging: a narrative review
منشور في 2025"…This review focuses on the diagnostic accuracy of AI-assisted mammography, synthesizing findings from studies across different clinical settings and algorithms. …"
-
894
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
منشور في 2021"…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …"
احصل على النص الكامل
-
895
Data mining approach to predict student's selection of program majors
منشور في 2019"…This study presents an approach to design and deploy a data mining project that can be used as a basis for developing systems to enable the selection of student majors.…"
احصل على النص الكامل
-
896
-
897
Cyberbullying Detection Model for Arabic Text Using Deep Learning
منشور في 2023"…Therefore, in this study, we conduct a performance evaluation and comparison for various DL algorithms (LSTM, GRU, LSTM-ATT, CNN-BLSTM, CNN-LSTM and LSTM-TCN) on different datasets of Arabic cyberbullying to obtain more precise and dependable findings. …"
احصل على النص الكامل
احصل على النص الكامل
-
898
Sentiment Analysis of Dialectal Speech: Unveiling Emotions through Deep Learning Models
منشور في 2024"…Additionally, the GRU-CNN hybrid model attained a notable accuracy of 90%. These findings establish the robustness and effectiveness of hybrid architectures in enhancing emotion recognition accuracy in Arabic speech data, presenting a novel approach for Arabic dialect sentiment analysis.…"
احصل على النص الكامل
-
899
-
900
Investigating the Use of Machine Learning Models to Understand the Drugs Permeability Across Placenta
منشور في 2023"…Based on publicly available datasets, several machine learning models are comprehensively analysed across different fingerprints and toolkits to find the best suitable models. Several dataset analysis models are utilised to study the data diversity. …"