بدائل البحث:
learning algorithm » learning algorithms (توسيع البحث)
models algorithm » mould algorithm (توسيع البحث), deer algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
learning algorithm » learning algorithms (توسيع البحث)
models algorithm » mould algorithm (توسيع البحث), deer algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
-
681
Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System
منشور في 2025"…The proposed methodology not only ensures the protection of biometric data in storage but also facilitates secure data retrieval for authentication purposes. …"
-
682
-
683
SemIndex: Semantic-Aware Inverted Index
منشور في 2017"…We provide here a new approach, called SemIndex, that extends the standard inverted index by constructing a tight coupling inverted index graph that combines two main resources: a general purpose semantic network, and a standard inverted index on a collection of textual data. We also provide an extended query model and related processing algorithms with the help of SemIndex. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
684
Decision-level fusion for single-view gait recognition with various carrying and clothing conditions
منشور في 2017"…Gait samples are fed into the MPCA and MPCALDA algorithms using a novel tensor-based form of the gait images. …"
احصل على النص الكامل
article -
685
Machine Learning–Based Approach for Identifying Research Gaps: COVID-19 as a Case Study
منشور في 2024"…Furthermore, future studies could evaluate more efficient modeling algorithms, especially those combining topic modeling with statistical uncertainty quantification, such as conformal prediction.…"
-
686
-
687
Legal and Ethical Considerations of Artificial Intelligence for Residents in Post-Acute and Long-Term Care
منشور في 2024"…Third, privacy rules concerning data use may undermine developers’ ability to train accurate AI systems, limiting their usefulness in PA-LTC contexts. …"
-
688
Accelerating Blockchain Transaction Verification With Parallel Computing
منشور في 2024احصل على النص الكامل
doctoralThesis -
689
FoGMatch
منشور في 2019"…To address this problem, we propose in this paper a multi-criteria intelligent IoT scheduling approach in fog computing environments using matching game theory. Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
690
AUS-UAV HILS Setup of Dynamic Flight Path Planning
منشور في 2006احصل على النص الكامل
doctoralThesis -
691
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
منشور في 2023"…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …"
-
692
Role of authentication factors in Fin-tech mobile transaction security
منشور في 2023"…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…"
-
693
Copy number variations in the genome of the Qatari population
منشور في 2015"…We present the first high-resolution copy number variation (CNV) map for a Gulf Arab population, using a hybrid approach that integrates array genotyping intensity data and next-generation sequencing reads to call CNVs in the Qatari population. …"
-
694
-
695
Single-Cell Transcriptome Analysis Highlights a Role for Neutrophils and Inflammatory Macrophages in the Pathogenesis of Severe COVID-19
منشور في 2020"…Herein, we employed iterative clustering and guide-gene selection 2 (ICGS2) as well as uniform manifold approximation and projection (UMAP) dimensionality reduction computational algorithms to decipher the complex immune and cellular composition of BAL, using publicly available datasets from a total of 68,873 single cells derived from two healthy subjects, three patients with mild COVID-19, and five patients with severe COVID-19. …"
-
696
User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations
منشور في 2017"…Due to the complexity of the problem, we design sub-optimal hierarchical tree-based algorithms for real-time operation taking into account realistic constraints. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
697
Comprehensive whole genome sequence analyses yields novel genetic and structural insights for Intellectual Disability
منشور في 2017"…The <i>de novo</i> assembly resulted in unmasking hidden genome instability that was missed by standard re-alignment based algorithms. We also interrogated regulatory sequence variation for known and hypothesized ID genes and present useful strategies for WGS data analyses for non-coding variation.…"
-
698
-
699
Next-generation energy systems for sustainable smart cities: Roles of transfer learning
منشور في 2022"…These algorithms might not perform as expected, take much time in training, or do not have enough input data to generalize well. …"
-
700
A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks
منشور في 2025"…This review synthesizes evidence from more than 500 peer-reviewed studies published between 2020 and 2026, mapping DRL applications across distributed generation, transmission, distribution, energy storage systems, energy markets, local energy management, grid security, and data privacy. We present a structured taxonomy covering value-based, policy-based, actor-critic, model-based, and advanced multi-agent and multi-objective approaches, and link algorithms to tasks such as dispatch, microgrid coordination, real-time pricing, load balancing, and demand–response. …"