Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search)
data scheduling » task scheduling (Expand Search), ahead scheduling (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search)
data scheduling » task scheduling (Expand Search), ahead scheduling (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
101
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
Get full text
Get full text
-
102
Optimising Nurse–Patient Assignments: The Impact of Machine Learning Model on Care Dynamics—Discursive Paper
Published 2025“…Future research should focus on refining algorithms, ensuring real‐time adaptability, addressing ethical considerations, evaluating long‐term patient outcomes, fostering cooperative systems, and integrating relevant data and policies within the healthcare framework.…”
-
103
Role of authentication factors in Fin-tech mobile transaction security
Published 2023“…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
-
104
Novel biomarkers for potential risk stratification of drug induced liver injury (DILI)
Published 2019“…</p><h3>Methods:</h3><p dir="ltr">We explored PUBMED and all other relevant databases for scientific studies that explored potential utility of novel biomarkers of DILI, and subsequently carried out a narrative synthesis of this data. …”
-
105
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …”
Get full text
-
106
Vehicular-OBUs-As-On-Demand-Fogs
Published 2020“…For instance, real-time vehicular applications require fast processing of the vast amount of generated data by vehicles in order to maintain service availability and reachability while driving. …”
Get full text
Get full text
Get full text
Get full text
article -
107
Machine learning for predicting outcomes of transcatheter aortic valve implantation: A systematic review
Published 2025“…Once the studies that meet the inclusion criteria were identified, data from these studies were retrieved and were further examined. 17 parameters relevant to TAVI outcomes were carefully identified for assessing the quality of the included studies. …”
Get full text
Get full text
Get full text
article -
108
Machine learning for predicting outcomes of transcatheter aortic valve implantation: A systematic review
Published 2025“…Once the studies that meet the inclusion criteria were identified, data from these studies were retrieved and were further examined. 17 parameters relevant to TAVI outcomes were carefully identified for assessing the quality of the included studies. …”
-
109
UML-based regression testing for OO software
Published 2010“…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …”
Get full text
Get full text
Get full text
article -
110
Assessment of Inventory and Transportation Collaboration in a Logistics Marketplace
Published 2020Get full text
doctoralThesis -
111
Dynamic multiple node failure recovery in distributed storage systems
Published 2018“…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …”
Get full text
Get full text
Get full text
Get full text
article -
112
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…Both GPS and UAVN/FANET use open network channels for data broadcasting, which are exposed to several threats, thus making security risky and challenging. …”
-
113
Machine Learning–Based Approach for Identifying Research Gaps: COVID-19 as a Case Study
Published 2024“…</p><h3>Methods</h3><p dir="ltr">We conducted an analysis to identify research gaps in COVID-19 literature using the COVID-19 Open Research (CORD-19) data set, which comprises 1,121,433 papers related to the COVID-19 pandemic. …”
-
114
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
Get full text
Get full text
Get full text
article -
115
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
Get full text
Get full text
Get full text
article