بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
system » systems (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
system » systems (توسيع البحث)
-
801
Enhanced Deep Belief Network Based on Ensemble Learning and Tree-Structured of Parzen Estimators: An Optimal Photovoltaic Power Forecasting Method
منشور في 2021"…The hyper-parameters of the proposed stacking ensemble are carefully tuned using the tree-structured of parzen estimators algorithm to achieve top-notch predictive performance. …"
-
802
Humanizing AI in medical training: ethical framework for responsible design
منشور في 2023"…The transparency pillar highlights the crucial role of maintaining the explainabilty of AI algorithms, while the fairness and justice pillar emphasizes on addressing biases in healthcare data and designing models that prioritize equitable medical training outcomes. …"
-
803
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
منشور في 2023"…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …"
-
804
Blockchain-Based Decentralized Architecture for Software Version Control
منشور في 2023"…In this study, we present the BDA-SCV architecture for implementing a version control system in blockchain technology. Our proposed approach would replace the necessity for a centralized system, with a decentralized approach implemented in the blockchain using distributed file storage, for which we will use the InterPlanetary File System (IPFS), which is a distributed file system. …"
-
805
Virtual topologies for massively parallel computations. (c2015)
منشور في 2015احصل على النص الكامل
احصل على النص الكامل
masterThesis -
806
-
807
Benchmark on a large cohort for sleep-wake classification with machine learning techniques
منشور في 2019"…We identified among the traditional algorithms, two approaches that perform better than the algorithm implemented by the actigraphy device used in the MESA Sleep experiments. …"
-
808
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks
منشور في 2023"…An optimal resource allocation scheme is proposed with two scenarios including a guaranteed fairness level and minimum data rate among eMBB users. In addition, a knapsack-inspired punctured resource allocation algorithm is proposed where the users’ channel qualities of both services are considered at each time slot leading to the most suitable Resource Block (RB) selection for puncturing in a way that minimizes the negative impact on eMBB performance. …"
-
809
Severity-Based Prioritized Processing of Packets with Application in VANETs
منشور في 2019"…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …"
-
810
Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings
منشور في 2022"…Experiments with features showed that acceleration data were the most contributing factor on the prediction compared to gyroscope data and that combined data of raw and extracted features provided a better overall performance. …"
-
811
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
-
812
-
813
A novel few shot learning derived architecture for long-term HbA1c prediction
منشور في 2024"…Short-term CGM time-series data are processed using both novel image transformation approaches, as well as using conventional signal processing methods. …"
-
814
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
منشور في 2020"…<p>The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …"
-
815
-
816
An Enhanced MPPT Approach Based on CUSA for Grid-Integrated Hybrid Electric Vehicle Charging Station
منشور في 2024"…Therefore, this manuscript proposes a renewable energy-powered EV charging station featuring a combination of solar energy, standby battery systems, sophisticated control techniques such as neural network-integrated grids, the enhanced Cuckoo Search Algorithm for Maximum Power Point Tracking, and the Proportional-Integral-Derivative controller. …"
-
817
Diagnostic performance of artificial intelligence in detecting and subtyping pediatric medulloblastoma from histopathological images: A systematic review
منشور في 2025"…Two reviewers independently conducted study selection, data extraction, and risk of bias assessment. Results were synthesized narratively. …"
-
818
Legal and Ethical Considerations of Artificial Intelligence for Residents in Post-Acute and Long-Term Care
منشور في 2024"…Third, privacy rules concerning data use may undermine developers’ ability to train accurate AI systems, limiting their usefulness in PA-LTC contexts. …"
-
819
A multi-pretraining U-Net architecture for semantic segmentation
منشور في 2025"…For the validation of the proposed model, we used data from 21,000 cell nuclei at a resolution of 1000 by 1000 pixels. …"
-
820
Optimising Nurse–Patient Assignments: The Impact of Machine Learning Model on Care Dynamics—Discursive Paper
منشور في 2025"…Future research should focus on refining algorithms, ensuring real‐time adaptability, addressing ethical considerations, evaluating long‐term patient outcomes, fostering cooperative systems, and integrating relevant data and policies within the healthcare framework.…"