بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
deer algorithm » search algorithm (توسيع البحث)
element based » event based (توسيع البحث)
level using » level fusion (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
deer algorithm » search algorithm (توسيع البحث)
element based » event based (توسيع البحث)
level using » level fusion (توسيع البحث)
-
241
Scrambled Prime Key Encryption
منشور في 2018"…To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
242
Towards Multimedia Fragmentation
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
243
Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review
منشور في 2022"…Wearable devices (WDs) make use of sensors historically reserved for hospital settings. …"
-
244
Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases
منشور في 2024"…To guarantee a safe and successful deployment in clinical practice, the use of AI in cardiology must be done with a thorough understanding of the algorithms and their limits. …"
-
245
Peripheral inflammatory and metabolic markers as potential biomarkers in treatment-resistant schizophrenia: Insights from a Qatari Cohort
منشور في 2024"…Key measurements included complete blood count, lipid panel, HbA1c, and ferritin levels. Our findings indicated elevated body mass index (BMI) and triglyceride (TG) levels in both patient groups compared to controls. …"
-
246
Data Redundancy Management in Connected Environments
منشور في 2020"…To address these limitations, we propose a framework for data redundancy management at the device level, denoted DRMF. We describe its modules, and clustering-based algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
247
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
منشور في 2024"…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …"
-
248
Triage decisions for ICU admission
منشور في 2016"…The team made recommendations and concluded that triage should be led by intensivists considering input from nurses, emergency medicine professionals, hospitalists, surgeons, and allied professionals. Triage algorithms and protocols can be useful but can never supplant the role of skilled intensivists basing their decisions on input from multidisciplinary teams. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
249
Data redundancy management for leaf-edges in connected environments
منشور في 2022"…To address these limitations, we propose here DRMF: Data Redundancy Management for leaF-edges allowing to identify and remove data redundancies in connected environments at the device level. DRMF considers both static and mobile edge devices, and provides two algorithms for temporal and spatio-temporal redundancy detection. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
250
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
article -
251
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
احصل على النص الكامل
article -
252
Optimising Nurse–Patient Assignments: The Impact of Machine Learning Model on Care Dynamics—Discursive Paper
منشور في 2025"…</p><h3>Methods</h3><p dir="ltr">A discursive approach was used to optimise nurse–patient assignments and the impact of ML models. …"
-
253
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
منشور في 2023"…Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
254
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
منشور في 2023"…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …"
-
255
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
منشور في 2021"…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …"
احصل على النص الكامل
-
256
Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling
منشور في 2022"…A Stochastic Discrete Simulation-Based Multi-Objective Optimization (SDSMO) model is developed and linked to clustering algorithms using an iterative sequential approach. The experimental results indicate the positive effect of clustering similar appointments on the performance measures and the computational time. …"
-
257
Approximate XML structure validation technical report
منشور في 2014"…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
258
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
منشور في 2006"…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …"
احصل على النص الكامل
masterThesis -
259
Optimal Dispatch of Mobile Energy Storage Unit to Support EV Charging Stations
منشور في 2021احصل على النص الكامل
doctoralThesis -
260
On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity
منشور في 2020"…Simulation results are presented for both parts of the thesis to illustrate the effectiveness of the proposed solutions and algorithms in comparison with optimal solutions and baseline algorithms.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis