بدائل البحث:
encoding algorithm » cosine algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
mean algorithm » deer algorithm (توسيع البحث), search algorithm (توسيع البحث)
data making » data mining (توسيع البحث)
encoding algorithm » cosine algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
mean algorithm » deer algorithm (توسيع البحث), search algorithm (توسيع البحث)
data making » data mining (توسيع البحث)
-
141
Developing an online hate classifier for multiple social media platforms
منشور في 2020"…However, at the same time, this has resulted in the emergence of conflict and hate, making online environments uninviting for users. Although researchers have found that hate is a problem across multiple platforms, there is a lack of models for online hate detection using multi-platform data. …"
-
142
DASSI: differential architecture search for splice identification from DNA sequences
منشور في 2022"…<h2>Background</h2> <p>The data explosion caused by unprecedented advancements in the field of genomics is constantly challenging the conventional methods used in the interpretation of the human genome. …"
-
143
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
منشور في 2015"…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. Second, it allows to detect flaws, conflicts and redundancies between rules by offering new mechanisms to analyze the meaning of policy rules through semantics verification by inference rule structure and deductive logic. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
144
Developing a UAE-Based Disputes Prediction Model using Machine Learning
منشور في 2022احصل على النص الكامل
doctoralThesis -
145
Resilience analytics: coverage and robustness in multi-modal transportation networks
منشور في 2018"…A future goal is to use this experience to make projections for a fast growing city like Doha.…"
-
146
PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning
منشور في 2022"…<p dir="ltr">Physical-layer security is regaining traction in the research community, due to the performance boost introduced by deep learning classification algorithms. This is particularly true for sender authentication in wireless communications via radio fingerprinting. …"
-
147
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
منشور في 2023"…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …"
-
148
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
149
Prediction the performance of multistage moving bed biological process using artificial neural network (ANN)
منشور في 2020"…<p dir="ltr">Complexity, uncertainty, and high dynamic nature of nutrient removal through biological processes (BPs) makes it difficult to model and control these processes, forcing designers to rely on approximations, probabilities, and assumptions. …"
-
150
-
151
CEAP
منشور في 2016"…To reduce the overhead of the proposed detection model and make it feasible for the resource-constrained nodes, we reduce the size of the training dataset by (1) restricting the data collection, storage, and analysis to concern only a set of specialized nodes (i.e., Multi-Point Relays) that are responsible for forwarding packets on behalf of their clusters; and (2) migrating only few tuples (i.e., support vectors) from one detection iteration to another. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
152
A hybrid approach for XML similarity
منشور في 2007"…In the past few years, XML has been established as an effective means for information management, and has been widely exploited for complex data representation. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
153
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
منشور في 2022"…<h2>Purpose</h2> <p>We present an approach that combines finite element analysis and genetic algorithms to find the optimal configuration of local resonators created in the host structure to suppress their vibration in a target low-frequency range. …"
-
154
-
155
Machine Learning Model for a Sustainable Drilling Process
منشور في 2023احصل على النص الكامل
doctoralThesis -
156
Deepfakes Signatures Detection in the Handcrafted Features Space
منشور في 2023"…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
احصل على النص الكامل
-
157
-
158
A fine-grained XML structural comparison approach
منشور في 2007"…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
159
Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review
منشور في 2022"…WDs coupled with artificial intelligence (AI) algorithms show promise to help understand and conclude meaningful information from the gathered data and provide advanced and clinically meaningful analytics.…"
-
160
An efficient cache replacement strategy for the hybrid cache consistency approach
منشور في 2010"…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article