Search alternatives:
learning algorithm » learning algorithms (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 661 - 680 results of 727 for search '(((( data using algorithm ) OR ( data models algorithm ))) OR ( elements learning algorithm ))', query time: 0.11s Refine Results
  1. 661
  2. 662
  3. 663

    Unlocking new frontiers in epilepsy through AI: From seizure prediction to personalized medicine by Majd A. AbuAlrob (22392505)

    Published 2025
    “…Ethical considerations, such as safeguarding patient privacy, ensuring data security, and mitigating algorithmic bias, underscore the importance of responsible AI integration. …”
  4. 664

    An XML Document Comparison Framework by Tekli, Joe

    Published 2001
    “…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
    Get full text
    Get full text
    Get full text
    article
  5. 665

    A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics by Tekli, Joe

    Published 2011
    “…XML similarity evaluation has become a central issue in the database and information communities, its applications ranging over document clustering, version control, data integration and ranked retrieval. Various algorithms for comparing hierarchically structured data, XML documents in particular, have been proposed in the literature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  6. 666

    Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks by Abbas, Nadine

    Published 2018
    “…Traffic offloading via device-to-device communications is expected to play a major role to meet the exponential data traffic growth in wireless networks. In this work, we focus on the problem of user capacity maximization in ultra dense heterogeneous networks with device-to-device cooperation, where a large number of users in a given geographical area request common data content, such as video on demand streaming, with strict quality of service guarantees. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 667

    Dataset built for Arabic Sentiment Analysis by AL MUKHAITI, AYESHA JUMAA SALEM

    Published 2016
    “…Key stages of the framework takes three dimensions. We followed an Algorithm which involves Data Acquisition stage, Filtering Stage and Annotation Stage. …”
    Get full text
  8. 668

    Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer by Hibah Shaath (5599658)

    Published 2021
    “…The Marker Finder algorithm identified the lncRNA transcript panel most associated with each molecular subtype and the receiver operating characteristic (ROC) analysis was used to validate the diagnostic potential (area under the curve (AUC) of ≥8.0 and p value < 0.0001). …”
  9. 669

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 670
  11. 671
  12. 672

    Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks by Mohammed Almehdhar (22046597)

    Published 2024
    “…Our systematic review covers a range of AI algorithms, including traditional ML, and advanced neural network models, such as Transformers, illustrating their effectiveness in IDS applications within IVNs. …”
  13. 673
  14. 674

    Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects by ALKAABI, ABDULLA

    Published 2023
    “…Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …”
    Get full text
  15. 675
  16. 676

    Dynamic single node failure recovery in distributed storage systems by Itani, M.

    Published 2017
    “…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  17. 677

    Deepfakes Signatures Detection in the Handcrafted Features Space by Hamadene, Assia

    Published 2023
    “…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
    Get full text
  18. 678
  19. 679
  20. 680

    Axes-Based Encryption Key by Haidar, Imane

    Published 2018
    “…For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject