بدائل البحث:
modelling algorithm » scheduling algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
element finding » filament winding (توسيع البحث)
يعرض 681 - 700 نتائج من 732 نتيجة بحث عن '(((( data using algorithm ) OR ( data modelling algorithm ))) OR ( element finding algorithm ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 681

    Precision nutrition: A systematic literature review حسب Daniel Kirk (17302798)

    منشور في 2021
    "…Therefore, we carried out a Systematic Literature Review (SLR) to provide an overview of where and how machine learning has been used in Precision Nutrition from various aspects, what such machine learning models use as input features, what the availability status of the data used in the literature is, and how the models are evaluated. …"
  2. 682

    Machine Learning–Based Approach for Identifying Research Gaps: COVID-19 as a Case Study حسب Alaa Abd-alrazaq (17058018)

    منشور في 2024
    "…Furthermore, future studies could evaluate more efficient modeling algorithms, especially those combining topic modeling with statistical uncertainty quantification, such as conformal prediction.…"
  3. 683

    Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants حسب Surbhi Choudhary (21633701)

    منشور في 2024
    "…It also provides implications for tech-managers and algorithm designers to build effective voice technology for superior user experience.…"
  4. 684

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review حسب Yasir Ali (799969)

    منشور في 2023
    "…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …"
  5. 685
  6. 686

    Legal and Ethical Considerations of Artificial Intelligence for Residents in Post-Acute and Long-Term Care حسب Barry Solaiman (19160614)

    منشور في 2024
    "…Third, privacy rules concerning data use may undermine developers’ ability to train accurate AI systems, limiting their usefulness in PA-LTC contexts. …"
  7. 687
  8. 688

    FoGMatch حسب Arisdakessian, Sarhad

    منشور في 2019
    "…To address this problem, we propose in this paper a multi-criteria intelligent IoT scheduling approach in fog computing environments using matching game theory. Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  9. 689
  10. 690

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices حسب Neder Karmous (19743430)

    منشور في 2024
    "…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
  11. 691

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study حسب Muhammad Atif Butt (10849980)

    منشور في 2023
    "…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …"
  12. 692

    Role of authentication factors in Fin-tech mobile transaction security حسب Habib Ullah Khan (12024579)

    منشور في 2023
    "…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…"
  13. 693

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions حسب Abdulmalik Alwarafy (17984104)

    منشور في 2022
    "…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …"
  14. 694

    Integrative toxicogenomics: Advancing precision medicine and toxicology through artificial intelligence and OMICs technology حسب Ajay Vikram Singh (204056)

    منشور في 2023
    "…As personalized medicine and toxicogenomics involve huge data processing, AI can expedite this process by providing powerful data processing, analysis, and interpretation algorithms. …"
  15. 695

    Copy number variations in the genome of the Qatari population حسب Khalid A. Fakhro (3158862)

    منشور في 2015
    "…We present the first high-resolution copy number variation (CNV) map for a Gulf Arab population, using a hybrid approach that integrates array genotyping intensity data and next-generation sequencing reads to call CNVs in the Qatari population. …"
  16. 696
  17. 697

    Single-Cell Transcriptome Analysis Highlights a Role for Neutrophils and Inflammatory Macrophages in the Pathogenesis of Severe COVID-19 حسب Hibah Shaath (5599658)

    منشور في 2020
    "…Herein, we employed iterative clustering and guide-gene selection 2 (ICGS2) as well as uniform manifold approximation and projection (UMAP) dimensionality reduction computational algorithms to decipher the complex immune and cellular composition of BAL, using publicly available datasets from a total of 68,873 single cells derived from two healthy subjects, three patients with mild COVID-19, and five patients with severe COVID-19. …"
  18. 698

    User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations حسب Abbas, Nadine Fawaz

    منشور في 2017
    "…Due to the complexity of the problem, we design sub-optimal hierarchical tree-based algorithms for real-time operation taking into account realistic constraints. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  19. 699

    Comprehensive whole genome sequence analyses yields novel genetic and structural insights for Intellectual Disability حسب Farah R. Zahir (18892108)

    منشور في 2017
    "…The <i>de novo</i> assembly resulted in unmasking hidden genome instability that was missed by standard re-alignment based algorithms. We also interrogated regulatory sequence variation for known and hypothesized ID genes and present useful strategies for WGS data analyses for non-coding variation.…"
  20. 700