يعرض 821 - 840 نتائج من 892 نتيجة بحث عن '(((( develop based algorithm ) OR ( element per algorithm ))) OR ( data using algorithm ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 821
  2. 822

    Sentiment Analysis of Dialectal Speech: Unveiling Emotions through Deep Learning Models حسب EZZELDIN, KHALED MOHAMED KHALED

    منشور في 2024
    "…Dialect Speech Sentiment Analysis is an evolutional field where machine learning algorithms are utilized to detect emotions in spoken language. …"
    احصل على النص الكامل
  3. 823
  4. 824

    Legal and Ethical Considerations of Artificial Intelligence for Residents in Post-Acute and Long-Term Care حسب Barry Solaiman (19160614)

    منشور في 2024
    "…Third, privacy rules concerning data use may undermine developers’ ability to train accurate AI systems, limiting their usefulness in PA-LTC contexts. …"
  5. 825
  6. 826

    PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits حسب Hind Almerekhi (7434776)

    منشور في 2022
    "…This procedure entailed using our large-scale dataset to refine toxicity triggers' definition and build a trigger detection dataset using 991,806 conversation threads from the top 100 communities on Reddit. …"
  7. 827

    FoGMatch حسب Arisdakessian, Sarhad

    منشور في 2019
    "…To address this problem, we propose in this paper a multi-criteria intelligent IoT scheduling approach in fog computing environments using matching game theory. Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  8. 828
  9. 829

    Role of authentication factors in Fin-tech mobile transaction security حسب Habib Ullah Khan (12024579)

    منشور في 2023
    "…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…"
  10. 830
  11. 831

    Copy number variations in the genome of the Qatari population حسب Khalid A. Fakhro (3158862)

    منشور في 2015
    "…We present the first high-resolution copy number variation (CNV) map for a Gulf Arab population, using a hybrid approach that integrates array genotyping intensity data and next-generation sequencing reads to call CNVs in the Qatari population. …"
  12. 832
  13. 833

    Full-fledged semantic indexing and querying model designed for seamless integration in legacy RDBMS حسب Tekli, Joe

    منشور في 2018
    "…In the past decade, there has been an increasing need for semantic-aware data search and indexing in textual (structured and NoSQL) databases, as full-text search systems became available to non-experts where users have no knowledge about the data being searched and often formulate query keywords which are different from those used by the authors in indexing relevant documents, thus producing noisy and sometimes irrelevant results. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 834

    Single-Cell Transcriptome Analysis Highlights a Role for Neutrophils and Inflammatory Macrophages in the Pathogenesis of Severe COVID-19 حسب Hibah Shaath (5599658)

    منشور في 2020
    "…Herein, we employed iterative clustering and guide-gene selection 2 (ICGS2) as well as uniform manifold approximation and projection (UMAP) dimensionality reduction computational algorithms to decipher the complex immune and cellular composition of BAL, using publicly available datasets from a total of 68,873 single cells derived from two healthy subjects, three patients with mild COVID-19, and five patients with severe COVID-19. …"
  15. 835
  16. 836

    User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations حسب Abbas, Nadine Fawaz

    منشور في 2017
    "…Due to the complexity of the problem, we design sub-optimal hierarchical tree-based algorithms for real-time operation taking into account realistic constraints. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  17. 837
  18. 838

    Comprehensive whole genome sequence analyses yields novel genetic and structural insights for Intellectual Disability حسب Farah R. Zahir (18892108)

    منشور في 2017
    "…The <i>de novo</i> assembly resulted in unmasking hidden genome instability that was missed by standard re-alignment based algorithms. We also interrogated regulatory sequence variation for known and hypothesized ID genes and present useful strategies for WGS data analyses for non-coding variation.…"
  19. 839

    Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings حسب Ahmad Yaser Alhaddad (7017434)

    منشور في 2022
    "…Experiments with features showed that acceleration data were the most contributing factor on the prediction compared to gyroscope data and that combined data of raw and extracted features provided a better overall performance. …"
  20. 840