Search alternatives:
method algorithm » mould algorithm (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
system models » system modeling (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
system models » system modeling (Expand Search)
element » elements (Expand Search)
-
521
Transformations for Variants of the Travelling Salesman Problem and Applications
Published 2017Get full text
doctoralThesis -
522
Data Endowment as a Digital Waqf: An Islamic Ethical Framework for AI Development
Published 2025“…<p dir="ltr">In the era of artificial intelligence (AI), data is often called the new oil—an essential asset for training algorithms and fueling intelligent systems. However, the ethical considerations surrounding this data’s ownership, use, and benefits remain contentious. …”
-
523
SemIndex: Semantic-Aware Inverted Index
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
524
From Collatz Conjecture to chaos and hash function
Published 2023“…The primary goal of this research is to develop a robust and efficient chaos-based hash function that addresses the requirements of cryptographic systems. By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. …”
-
525
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. The evaluation results of the proposed solution were compared to the results of standard solutions under different cyberattack scenarios using quantitative research methods involving computing simulations, emulation experiments, and analytical modeling. …”
Get full text
-
526
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
Published 2023“…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …”