بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
data making » data mining (توسيع البحث)
element » elements (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
data making » data mining (توسيع البحث)
element » elements (توسيع البحث)
-
261
Sentiment Analysis for Arabic Social media Movie Reviews Using Deep Learning
منشور في 2022"…For sentiment analysis, pre-processing is a crucial step in the data preparation process. …"
احصل على النص الكامل
-
262
Shuffled Linear Regression with Erroneous Observations
منشور في 2019"…Existing methods are either applicable only to data with limited observation errors, work only for partially shuffled data, sensitive to initialization, and/or work only with small dimensions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
263
High-order parametrization of the hypergeometric-Meijer approximants
منشور في 2023"…<p>In this work, we introduce an extension to the hypergeometric algorithm we developed before for the resummation of divergent series.The extension overcome the time-consuming problem we face in the parametrization process of the hypergeometric approximants. …"
-
264
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
265
FoGMatch
منشور في 2019"…In this context, the notion of fog computing has been projected to furnish data analytics and decision-making closer to the IoT devices. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
266
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…<p>The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …"
-
267
Deep Learning in Smart Grid Technology: A Review of Recent Advancements and Future Prospects
منشور في 2021"…This ongoing transition undergoes rapid changes, requiring a plethora of advanced methodologies to process the big data generated by various units. In this context, SG stands tied very closely to Deep Learning (DL) as an emerging technology for creating a more decentralized and intelligent energy paradigm while integrating high intelligence in supervisory and operational decision-making. …"
-
268
Using artificial bee colony to optimize software quality estimation models. (c2015)
منشور في 2016"…We validate our technique on data describing maintainability and reliability of classes in an Object-Oriented system. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
269
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
منشور في 2022"…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
270
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
منشور في 2023"…The semantically augmented XML data tree is processed for structural node clustering, based on semantic query concepts (i.e., key-concepts), in order to identify and rank candidate answer sub-trees containing related occurrences of query key-concepts. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
271
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
منشور في 2019"…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …"
-
272
The Role of Artificial Intelligence in Decoding Speech from EEG Signals: A Scoping Review
منشور في 2022"…The study selection process was carried out in three phases: study identification, study selection, and data extraction. …"
-
273
Topology and parameter estimation in power systems through inverter-based broadband stimulations
منشور في 2015"…Broadband stimulation signals are injected from distributed generators and their effects are measured at various locations in the grid. To process and evaluate this data, a novel aggregation method based on weighed least squares will be proposed in this study. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
274
Scrambled Prime Key Encryption
منشور في 2018"…To enhance data security different cryptographic algorithms are used. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
275
-
276
From Collatz Conjecture to chaos and hash function
منشور في 2023"…This paper aims to introduce a novel approach to addressing current security challenges by utilizing our generalized Collatz process to create a chaos-based hash function. By leveraging the unpredictable behaviour of the Collatz sequence, the proposed hash function aims to enhance ergodicity and entropy properties, thereby making it well-suited for cryptographic applications. …"
-
277
Benchmark on a large cohort for sleep-wake classification with machine learning techniques
منشور في 2019"…However, the largest experiments conducted to date, have had only hundreds of participants. In this work, we processed the data of the recently published Multi-Ethnic Study of Atherosclerosis (MESA) Sleep study to have both PSG and actigraphy data synchronized. …"
-
278
An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems
منشور في 2024"…Feature selection (FS) is the activity of defining the most contributing feature subset among all used features to improve the superiority of datasets with a large number of dimensions by selecting significant features and eliminating redundant and irrelevant ones. Therefore, this process can be seen as an optimization process. The primary goals of feature selection are to decrease the number of dimensions and enhance classification accuracy in many domains, such as text classification, large-scale data analysis, and pattern recognition. …"
احصل على النص الكامل
-
279
A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass
منشور في 2025"…By synthesizing findings across various data sources and model architectures, we offer critical insights into the selection of context-aware algorithms and identify key research gaps, an essential step for advancing the reliability and applicability of AI-driven seagrass conservation efforts.…"
-
280
Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations
منشور في 2007"…This paper presents the design and implementation of an elliptic curve cryptographic core to realize point scalar multiplication operations used for the GF(p) elliptic curve encryption/decryption and the elliptic curve digital signature algorithm (ECDSA). The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …"
احصل على النص الكامل
احصل على النص الكامل
article