Search alternatives:
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
-
701
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
Published 2001“…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
Get full text
article -
702
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
Published 2001“…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
Get full text
Get full text
article -
703
-
704
SemIndex: Semantic-Aware Inverted Index
Published 2017“…We provide here a new approach, called SemIndex, that extends the standard inverted index by constructing a tight coupling inverted index graph that combines two main resources: a general purpose semantic network, and a standard inverted index on a collection of textual data. We also provide an extended query model and related processing algorithms with the help of SemIndex. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
705
Decision-level fusion for single-view gait recognition with various carrying and clothing conditions
Published 2017“…Gait samples are fed into the MPCA and MPCALDA algorithms using a novel tensor-based form of the gait images. …”
Get full text
article -
706
Approximate XML structure validation based on document–grammar tree similarity
Published 2015“…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
Get full text
Get full text
Get full text
Get full text
article -
707
Approximate XML structure validation technical report
Published 2014“…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
Get full text
Get full text
Get full text
article -
708
Machine Learning–Based Approach for Identifying Research Gaps: COVID-19 as a Case Study
Published 2024“…Furthermore, future studies could evaluate more efficient modeling algorithms, especially those combining topic modeling with statistical uncertainty quantification, such as conformal prediction.…”
-
709
-
710
Legal and Ethical Considerations of Artificial Intelligence for Residents in Post-Acute and Long-Term Care
Published 2024“…Third, privacy rules concerning data use may undermine developers’ ability to train accurate AI systems, limiting their usefulness in PA-LTC contexts. …”
-
711
Accelerating Blockchain Transaction Verification With Parallel Computing
Published 2024Get full text
doctoralThesis -
712
FoGMatch
Published 2019“…To address this problem, we propose in this paper a multi-criteria intelligent IoT scheduling approach in fog computing environments using matching game theory. Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …”
Get full text
Get full text
Get full text
masterThesis -
713
-
714
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
Published 2023“…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …”
-
715
Role of authentication factors in Fin-tech mobile transaction security
Published 2023“…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
-
716
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
-
717
Copy number variations in the genome of the Qatari population
Published 2015“…We present the first high-resolution copy number variation (CNV) map for a Gulf Arab population, using a hybrid approach that integrates array genotyping intensity data and next-generation sequencing reads to call CNVs in the Qatari population. …”
-
718
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
719
Single-Cell Transcriptome Analysis Highlights a Role for Neutrophils and Inflammatory Macrophages in the Pathogenesis of Severe COVID-19
Published 2020“…Herein, we employed iterative clustering and guide-gene selection 2 (ICGS2) as well as uniform manifold approximation and projection (UMAP) dimensionality reduction computational algorithms to decipher the complex immune and cellular composition of BAL, using publicly available datasets from a total of 68,873 single cells derived from two healthy subjects, three patients with mild COVID-19, and five patients with severe COVID-19. …”
-
720
User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations
Published 2017“…Due to the complexity of the problem, we design sub-optimal hierarchical tree-based algorithms for real-time operation taking into account realistic constraints. …”
Get full text
Get full text
Get full text
masterThesis