بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
-
441
-
442
-
443
-
444
Don't understand a measure? Learn it: Structured Prediction for Coreference Resolution optimizing its measures
منشور في 2017"…Especially in the loss-augmented setting, the need of finding the max-violating constraint has severely limited the expressivity of effective loss functions. In this paper, we trade off exact computation for enabling the use and study of more complex loss functions for coreference resolution. …"
-
445
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
منشور في 2024"…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
-
446
Deep Learning-Based Fault Diagnosis of Photovoltaic Systems: A Comprehensive Review and Enhancement Prospects
منشور في 2021"…Recently, due to the enhancement of computing capabilities, the increase of the big data use, and the development of effective algorithms, the deep learning (DL) tool has witnessed a great success in data science. …"
-
447
Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning
منشور في 2025"…Finally, key research gaps and future directions for effective PGP are outlined. This paper provides PS researchers with a bird’s eye view of the current state of mainstream PGP implementations. …"
-
448
-
449
Full-fledged semantic indexing and querying model designed for seamless integration in legacy RDBMS
منشور في 2018"…Results highlight both the effectiveness and scalability of our approach.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
450
Blood-Based Proteomic Profiling Identifies Potential Biomarker Candidates and Pathogenic Pathways in Dementia
منشور في 2023"…There was also the dysregulation of 153 plasma proteins in individuals with dementia compared with those with MCI, and machine learning algorithms identified 8 biomarkers that classified dementia from MCI with an AUC of 0.87 ± 0.07. …"
-
451
Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings
منشور في 2022"…We examine the effects of adding different combinations of raw data and extracted features acquired from two sensors on the performance and speed of prediction. …"
-
452
What are artificial intelligence literacy and competency? A comprehensive framework to support them
منشور في 2024"…We also identify five effective learning experiences to foster abilities and confidences, and suggest five future research directions: prompt engineering, data literacy, algorithmic literacy, self-reflective mindset, and empirical research.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
453
A Comprehensive Review of Digital Twin Technology in Building Energy Consumption Forecasting
منشور في 2024"…<p dir="ltr">With the global rise in urban populations, energy consumption in buildings has become a critical issue, now accounting for about 30% of total global energy use. Developing powerful energy forecasting systems is challenging due to frequent fluctuations in energy demand. …"
-
454
Predicting the Heats of Fusion of Ionic Liquids via Group Contribution Modeling and Machine Learning
منشور في 2022احصل على النص الكامل
doctoralThesis -
455
Fine-grain watermarking for intellectual property protection
منشور في 2019"…In particular, the embedding and extraction algorithms allow to continuously protect the watermark through the whole document in a fine-grain fashion. …"
-
456
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
منشور في 2023"…Secondly, to illustrate the gravity of these issues, we present a case study on the task of human facial emotion recognition (FER) based on AffectNet dataset, where we analyze the effects of widely used input quantization on the security, robustness, fairness, and trustworthiness of an EML model. …"
-
457
-
458
Network-based identification of key master regulators associated with an immune-silent cancer phenotype
منشور في 2021"…Defining mechanisms associated with immune evasion is imperative to refine stratification algorithms, to guide treatment decisions and to identify candidates for immune-targeted therapy. …"
-
459
A residual-accelerated Jacobian method for rapid convergence in reservoir simulation
منشور في 2025"…<p dir="ltr">Reservoir simulation requires efficient algorithms for complex, nonlinear systems. We introduce a Residual–Accelerated Jacobian (RAJ) for fully implicit reservoir simulation. …"
-
460
Single-Cell Transcriptome Analysis Revealed Heterogeneity and Identified Novel Therapeutic Targets for Breast Cancer Subtypes
منشور في 2023"…In the current study, we employed computational algorithms to decipher the cellular composition of estrogen receptor-positive (ER<sup>+</sup>), HER2<sup>+</sup>, ER<sup>+</sup>HER2<sup>+</sup>, and triple-negative BC (TNBC) subtypes from a total of 49,899 single cells’ publicly available transcriptomic data derived from 26 BC patients. …"