بدائل البحث:
making algorithm » cosine algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data making » data mining (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data making » data mining (توسيع البحث)
-
681
Optimising Nurse–Patient Assignments: The Impact of Machine Learning Model on Care Dynamics—Discursive Paper
منشور في 2025"…Future research should focus on refining algorithms, ensuring real‐time adaptability, addressing ethical considerations, evaluating long‐term patient outcomes, fostering cooperative systems, and integrating relevant data and policies within the healthcare framework.…"
-
682
Iterative Methods for the Solution of a Steady State Biofilter Model
منشور في 2017احصل على النص الكامل
doctoralThesis -
683
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks
منشور في 2022"…In this paper, we propose data-driven machine learning (ML) schemes to efficiently solve these problems in wireless LAN (WLAN) networks. …"
-
684
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
منشور في 2017احصل على النص الكامل
doctoralThesis -
685
Automatic White Blood Cell Differential Classification
منشور في 2005احصل على النص الكامل
doctoralThesis -
686
-
687
Applying urban parametric design optimisation processes to a hot climate: Case study of the UAE
منشور في 2014"…In recent times architects and designers have gained control over the design process by using parametric design to produce an original sustainable design that interacts with the project's environment, climatic and sustainable constraints. …"
احصل على النص الكامل
-
688
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
منشور في 2023"…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …"
-
689
Accelerating Blockchain Transaction Verification With Parallel Computing
منشور في 2024احصل على النص الكامل
doctoralThesis -
690
Artificial Intelligence and Machine Learning Applications in Sudden Cardiac Arrest Prediction and Management: A Comprehensive Review
منشور في 2023"…There’s a significant focus on the integration of AI and ML in prehospital emergency care, particularly in using ML algorithms for predicting outcomes in COVID-19 patients and enhancing the recognition of out-of-hospital cardiac arrest (OHCA). …"
-
691
Diagnostic performance of artificial intelligence in detecting and subtyping pediatric medulloblastoma from histopathological images: A systematic review
منشور في 2025"…<h3>Background </h3><p dir="ltr">Medulloblastoma is the most prevalent malignant brain tumor in children, requiring timely and precise diagnosis to improve clinical outcomes. …"
-
692
A decentralized load balancing approach for parallel search-tree optimization
منشور في 2017"…We tackle the problems of efficiency and scalability by combining a fully decentralized dynamic load balancing strategy with special implementation techniques for exact graph algorithms. As a case-study, we use our framework to implement parallel algorithms for the VERTEX COVER and DOMINATING SET problems. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
693
Central schemes for ideal magnetohydrodynamics
منشور في 2007احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
694
-
695
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
منشور في 2023"…<div><p>Internet of Things (IoT) driven systems have been sharply growing in the recent times but this evolution is hampered by cybersecurity threats like spoofing, denial of service (DoS), distributed denial of service (DDoS) attacks, intrusions, malwares, authentication problems or other fatal attacks. …"
-
696
Fine-grain watermarking for intellectual property protection
منشور في 2019"…In particular, the embedding and extraction algorithms allow to continuously protect the watermark through the whole document in a fine-grain fashion. …"