بدائل البحث:
making algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data making » data mining (توسيع البحث)
develop » developed (توسيع البحث)
mould » could (توسيع البحث), would (توسيع البحث), mold (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data making » data mining (توسيع البحث)
develop » developed (توسيع البحث)
mould » could (توسيع البحث), would (توسيع البحث), mold (توسيع البحث)
-
121
DASSI: differential architecture search for splice identification from DNA sequences
منشور في 2022"…<h2>Background</h2> <p>The data explosion caused by unprecedented advancements in the field of genomics is constantly challenging the conventional methods used in the interpretation of the human genome. …"
-
122
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
منشور في 2022"…Implications are that toxicity trigger detection algorithms can leverage generic approaches but must also tailor detections to specific communities.…"
-
123
Developing a UAE-Based Disputes Prediction Model using Machine Learning
منشور في 2022احصل على النص الكامل
doctoralThesis -
124
Resilience analytics: coverage and robustness in multi-modal transportation networks
منشور في 2018"…A future goal is to use this experience to make projections for a fast growing city like Doha.…"
-
125
PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning
منشور في 2022"…<p dir="ltr">Physical-layer security is regaining traction in the research community, due to the performance boost introduced by deep learning classification algorithms. This is particularly true for sender authentication in wireless communications via radio fingerprinting. …"
-
126
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
منشور في 2023"…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …"
-
127
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
128
Prediction the performance of multistage moving bed biological process using artificial neural network (ANN)
منشور في 2020"…<p dir="ltr">Complexity, uncertainty, and high dynamic nature of nutrient removal through biological processes (BPs) makes it difficult to model and control these processes, forcing designers to rely on approximations, probabilities, and assumptions. …"
-
129
-
130
CEAP
منشور في 2016"…To reduce the overhead of the proposed detection model and make it feasible for the resource-constrained nodes, we reduce the size of the training dataset by (1) restricting the data collection, storage, and analysis to concern only a set of specialized nodes (i.e., Multi-Point Relays) that are responsible for forwarding packets on behalf of their clusters; and (2) migrating only few tuples (i.e., support vectors) from one detection iteration to another. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
131
-
132
Machine Learning Model for a Sustainable Drilling Process
منشور في 2023احصل على النص الكامل
doctoralThesis -
133
Deepfakes Signatures Detection in the Handcrafted Features Space
منشور في 2023"…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
احصل على النص الكامل
-
134
-
135
A fine-grained XML structural comparison approach
منشور في 2007"…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
136
Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review
منشور في 2022"…WDs coupled with artificial intelligence (AI) algorithms show promise to help understand and conclude meaningful information from the gathered data and provide advanced and clinically meaningful analytics.…"
-
137
An efficient cache replacement strategy for the hybrid cache consistency approach
منشور في 2010"…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
138
-
139
CubeSat Communication Subsystems: A Review of On-Board Transceiver Architectures, Protocols, and Performance
منشور في 2023"…The reliability, performance, data rate, and power consumption of the reviewed systems are critically compared and evaluated to understand the limitations of existing CubeSat transceivers and identify directions of future developments. …"
-
140
An XML Document Comparison Framework
منشور في 2001"…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article