Search alternatives:
processing algorithm » processing algorithms (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
system » systems (Expand Search)
processing algorithm » processing algorithms (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
system » systems (Expand Search)
-
661
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. The evaluation results of the proposed solution were compared to the results of standard solutions under different cyberattack scenarios using quantitative research methods involving computing simulations, emulation experiments, and analytical modeling. …”
Get full text
-
662
Single-channel speech denoising by masking the colored spectrograms
Published 2025“…Similarly, it offers an improvement of 1 % in STOI and a reduction of 33 and 200 times, respectively, in network size and training epochs when compared to a complex variational U-Net-based model. Also, with comparable PESQ, the proposed system offers almost 2 % improvement in STOI, and a 2 times reduction in network size and 100 times reduction in training epochs, when compared to a lightweight system using automatic dimension reduction of network layers by a structured pruning method.…”
-
663
Detection of statistically significant network changes in complex biological networks
Published 2017“…Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…”
-
664
Four quadrant robust quick response optimally efficient inverterfed induction motor drive
Published 1989“…An optimal efficiency calculator provides optimum flux and torque producing current, while a supervisory control eliminates the intricate boot-strap effect of the flux-torque loop. A model reference-based adaptive speed controller guarantees quick speed response and robustness of the drive system. …”
Get full text
Get full text
article -
665
An Auction-Based Scheduling Approach for Minimizing Latency in Fog Computing Using 5G Infrastructure
Published 2020Get full text
doctoralThesis -
666
An intelligent approach to predicting the effect of nanoparticle mixture ratio, concentration and temperature on thermal conductivity of hybrid nanofluids
Published 2020“…A polynomial correlation model, the adaptive neuro-fuzzy inference system model and an artificial neural network model optimised with three different learning algorithms. …”
-
667
Predicting and Interpreting Student Performance Using Machine Learning in Blended Learning Environments in a Jordanian School Context
Published 0024“…These platforms enhance academic performance by fostering collaborative learning environments and generating extensive data from every user interaction. Machine learning algorithms can process large and complex datasets to identify patterns and trends that may not be immediately apparent. …”
Get full text
-
668
Towards Multimedia Fragmentation
Published 2006“…Database fragmentation is a process for reducing irrelevant data accesses by grouping data frequently accessed together in dedicated segments. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
669
A Novel Deep Learning Technique for Detecting Emotional Impact in Online Education
Published 2022“…As part of this work, two deep learning models are compared according to their performance. …”
Get full text
-
670
-
671
Accelerating Blockchain Transaction Verification With Parallel Computing
Published 2024Get full text
doctoralThesis -
672
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …”
Get full text
-
673
From Collatz Conjecture to chaos and hash function
Published 2023“…The primary goal of this research is to develop a robust and efficient chaos-based hash function that addresses the requirements of cryptographic systems. By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. …”
-
674
Single-Cell Transcriptome Analysis Revealed Heterogeneity and Identified Novel Therapeutic Targets for Breast Cancer Subtypes
Published 2023“…In the current study, we employed computational algorithms to decipher the cellular composition of estrogen receptor-positive (ER<sup>+</sup>), HER2<sup>+</sup>, ER<sup>+</sup>HER2<sup>+</sup>, and triple-negative BC (TNBC) subtypes from a total of 49,899 single cells’ publicly available transcriptomic data derived from 26 BC patients. …”
-
675
Optimal Planning of Distributed Generators and Shunt Capacitors in Isolated Microgrids With Nonlinear Loads
Published 2020“…The intermittent natures of loads and renewable DGs are modelled probabilistically. The effectiveness of the proposed planning approach has been validated using the PG&E 69-bus system, and the followings are observed: 1) the significance of applying suitable fundamental-power-flow and harmonic-power-flow algorithms for isolated microgrids, and 2) the possibility of avoiding a severe voltage distortion by utilizing an appropriate planning method and only small increase in the cost.…”
Get full text
article -
676
THE FUTURE OF MEDICINE, healthcare innovation through precision medicine: policy case study of Qatar
Published 2020“…Consequently, the big data revolution has provided an opportunity to apply artificial intelligence and machine learning algorithms to mine such a vast data set. …”
-
677
The Impact of AI on Decision-Making in Educational Management: Benefits, Risks, and Ethical Concerns
Published 2024“…However, the adoption of AI also presents challenges, including potential biases in algorithms, privacy concerns, and the risk of an over-reliance on automated systems. …”
Get full text
-
678
The role of Reinforcement Learning in software testing
Published 2023“…</p><h3>Results</h3><p dir="ltr">This study highlights different software testing types to which RL has been applied, commonly used RL algorithms and architecture for learning, challenges faced, advantages and disadvantages of using RL, and the performance comparison of RL-based models against other techniques.…”
-
679
A Novel Approach for Detecting Anomalous Energy Consumption Based on Micro-Moments and Deep Neural Networks
Published 2022“…Moreover, in order to validate the proposed system, a new energy consumption dataset at appliance level is also designed through a measurement campaign carried out at Qatar University Energy Lab, namely, Qatar University dataset. …”
-
680