Search alternatives:
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
661
Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks
Published 2018“…Traffic offloading via device-to-device communications is expected to play a major role to meet the exponential data traffic growth in wireless networks. In this work, we focus on the problem of user capacity maximization in ultra dense heterogeneous networks with device-to-device cooperation, where a large number of users in a given geographical area request common data content, such as video on demand streaming, with strict quality of service guarantees. …”
Get full text
Get full text
Get full text
Get full text
article -
662
Dataset built for Arabic Sentiment Analysis
Published 2016“…Key stages of the framework takes three dimensions. We followed an Algorithm which involves Data Acquisition stage, Filtering Stage and Annotation Stage. …”
Get full text
-
663
Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer
Published 2021“…The Marker Finder algorithm identified the lncRNA transcript panel most associated with each molecular subtype and the receiver operating characteristic (ROC) analysis was used to validate the diagnostic potential (area under the curve (AUC) of ≥8.0 and p value < 0.0001). …”
-
664
-
665
-
666
Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks
Published 2024“…Our systematic review covers a range of AI algorithms, including traditional ML, and advanced neural network models, such as Transformers, illustrating their effectiveness in IDS applications within IVNs. …”
-
667
-
668
Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects
Published 2023“…Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …”
Get full text
-
669
A Navigation and Control System for a Robot in Indoor/Outdoor Environments
Published 2016Get full text
doctoralThesis -
670
Dynamic single node failure recovery in distributed storage systems
Published 2017“…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
Get full text
Get full text
Get full text
Get full text
article -
671
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
Get full text
-
672
Nonlinear Friction Identification of A Linear Voice Coil DC Motor
Published 2015Get full text
doctoralThesis -
673
-
674
Axes-Based Encryption Key
Published 2018“…For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
675
Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System
Published 2025“…The proposed methodology not only ensures the protection of biometric data in storage but also facilitates secure data retrieval for authentication purposes. …”
-
676
-
677
SemIndex: Semantic-Aware Inverted Index
Published 2017“…We provide here a new approach, called SemIndex, that extends the standard inverted index by constructing a tight coupling inverted index graph that combines two main resources: a general purpose semantic network, and a standard inverted index on a collection of textual data. We also provide an extended query model and related processing algorithms with the help of SemIndex. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
678
Decision-level fusion for single-view gait recognition with various carrying and clothing conditions
Published 2017“…Gait samples are fed into the MPCA and MPCALDA algorithms using a novel tensor-based form of the gait images. …”
Get full text
article -
679
Machine Learning–Based Approach for Identifying Research Gaps: COVID-19 as a Case Study
Published 2024“…Furthermore, future studies could evaluate more efficient modeling algorithms, especially those combining topic modeling with statistical uncertainty quantification, such as conformal prediction.…”
-
680