Search alternatives:
case scheduling » task scheduling (Expand Search), ahead scheduling (Expand Search)
each algorithm » search algorithm (Expand Search), jaya algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
case scheduling » task scheduling (Expand Search), ahead scheduling (Expand Search)
each algorithm » search algorithm (Expand Search), jaya algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
121
-
122
Single-Cell Transcriptome Analysis Revealed Heterogeneity and Identified Novel Therapeutic Targets for Breast Cancer Subtypes
Published 2023“…Taken together, our data are the first to unravel the unique gene signatures and to identify novel dependencies and therapeutic vulnerabilities for each BC molecular subtype, thus setting the foundation for the future development of more effective targeted therapies for BC.…”
-
123
Large-scale annotation dataset for fetal head biometry in ultrasound images
Published 2023“…Its detailed annotations, broad compatibility, and ethical compliance make it a highly reusable and adaptable tool for the development of algorithms aimed at improving maternal and Fetal health.…”
-
124
Corrosion Monitoring Technologies for Reinforced Concrete Structures: A Review
Published 2023“…However, it needs further development and research.…”
Get full text
-
125
Legal and Ethical Considerations of Artificial Intelligence for Residents in Post-Acute and Long-Term Care
Published 2024“…Third, privacy rules concerning data use may undermine developers’ ability to train accurate AI systems, limiting their usefulness in PA-LTC contexts. …”
-
126
-
127
A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity
Published 2025“…We examine cutting-edge AI methodologies and principal models across many domains, including machine learning algorithms, deep learning architectures, natural language processing techniques, and anomaly detection algorithms, emphasizing their distinct contributions to enhancing security. …”
-
128
Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining
Published 2021“…The Software Development Life Cycle (SDLC) methodology is adopted to build the framework. …”
Get full text
-
129
An Enhanced Approach for Solar PV Hosting Capacity Analysis in Distribution Networks
Published 2022“…The developed algorithms were tested on the IEEE 123 bus network, and their results were compared. …”
-
130
Reactive transport in porous media: a review of recent mathematical efforts in modeling geochemical reactions in petroleum subsurface reservoirs
Published 2021“…In the hydrology community, reactive transport is well developed where the main research focuses on studying the movement of groundwater and contaminants in aquifers, and quantifying the effect of chemical reactions between the rocks and water. …”
-
131
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
Published 2023“…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
-
132
-
133
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…This issue of security risk can be minimized conspicuously by developing a robust authentication scheme for IoD deployment military drones. …”
-
134
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…This practice has spread substantially due to rapid technological development and has gained significant attention in several domains involving data exchange, such as e-commerce, digital marketing, social media platforms, and others. …”
Get full text
-
135
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
Get full text
Get full text
Get full text
Get full text
article