بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
model algorithm » mould algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
model algorithm » mould algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
521
Condenser capacity and hyperbolic perimeterImage 1
منشور في 2021"…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
522
Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer
منشور في 2015"…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …"
-
523
Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations
منشور في 2025"…To address this challenge, this study aims to optimize household energy consumption while preserving data privacy by proposing an innovative two-stage Federated Learning (FL) framework that delivers real-time micro-moment-based recommendations. Leveraging FL enables efficient model training across diverse end-user applications while preserving data privacy. …"
-
524
MLMRS-Net: Electroencephalography (EEG) motion artifacts removal using a multi-layer multi-resolution spatially pooled 1D signal reconstruction network
منشور في 2022"…Because the diagnosis of many neurological diseases is heavily reliant on clean EEG data, it is critical to eliminate motion artifacts from motion-corrupted EEG signals using reliable and robust algorithms. Although a few deep learning-based models have been proposed for the removal of ocular, muscle, and cardiac artifacts from EEG data to the best of our knowledge, there is no attempt has been made in removing motion artifacts from motion-corrupted EEG signals: In this paper, a novel 1D convolutional neural network (CNN) called multi-layer multi-resolution spatially pooled (MLMRS) network for signal reconstruction is proposed for EEG motion artifact removal. …"
-
525
-
526
Uplink Noma in UAV-Assisted IoT Networks
منشور في 2022"…The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
527
Condenser capacity and hyperbolic perimeter
منشور في 2022"…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …"
-
528
The Role of Machine Learning in Diagnosing Bipolar Disorder: Scoping Review
منشور في 2021"…We identified different machine learning models used in the selected studies, including classification models (18, 55%), regression models (5, 16%), model-based clustering methods (2, 6%), natural language processing (1, 3%), clustering algorithms (1, 3%), and deep learning–based models (3, 9%). …"
-
529
Intelligent Bilateral Client Selection in Federated Learning Using Game Theory
منشور في 2022"…Based on our simulation findings, our strategy surpasses the VanillaF selection approach in terms of maximizing both the revenues of the client devices and accuracy of the global federated learning model.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
530
A comparative analysis to forecast carbon dioxide emissions
منشور في 2022"…Based on multivariate time series prediction, four deep learning algorithms are analyzed in this work, those are convolution neural network (CNN), CNN long short-term memory (CNN–LSTM), long short-term memory (LSTM), and dense neural network (DNN). …"
-
531
SemIndex: Semantic-Aware Inverted Index
منشور في 2017"…We also provide an extended query model and related processing algorithms with the help of SemIndex. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
532
Multi-Agent Meta Reinforcement Learning for Reliable and Low-Latency Distributed Inference in Resource-Constrained UAV Swarms
منشور في 2025"…Our approach is tested on CNN networks and benchmarked against state-of-the-art conventional reinforcement learning algorithms. Extensive simulations show that our model outperforms competitive methods by around 29% in terms of latency and around 23% in terms of transmission power improvements while delivering results comparable to the traditional LDTP optimization solution by around 9% in terms of latency.…"
-
533
Decision-level Gait Fusion for Human Identification at a Distance
منشور في 2014احصل على النص الكامل
doctoralThesis -
534
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
منشور في 2008"…Up to now, most of the numerical works dealing with the modeling of the isothermal EHL problem were based on a weak coupling resolution of the Reynolds and elasticity equations (semi-system approach). …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
535
Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks
منشور في 2018"…We also propose efficient sub-optimal hierarchical tree-based algorithms that operate in real time with dynamic and fast solutions for ultra dense networks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
536
Cyberbullying Detection in Arabic Text using Deep Learning
منشور في 2023"…As a result of the models’ evaluation, a hybrid DL model is proposed that combines the best characteristics of the baseline models CNN, BLSTM and GRU for identifying cyberbullying. …"
احصل على النص الكامل
-
537
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
منشور في 2021"…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …"
-
538
A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass
منشور في 2025"…By synthesizing findings across various data sources and model architectures, we offer critical insights into the selection of context-aware algorithms and identify key research gaps, an essential step for advancing the reliability and applicability of AI-driven seagrass conservation efforts.…"
-
539
Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis
منشور في 2023"…Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
540
Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis
منشور في 2023"…<p>Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"