Search alternatives:
lacking algorithm » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
data making » data mining (Expand Search)
Showing 181 - 200 results of 212 for search '(( elements method algorithm ) OR ((( data lacking algorithm ) OR ( data making algorithm ))))', query time: 0.12s Refine Results
  1. 181
  2. 182

    CEAP by Abdel Wahab, Omar

    Published 2016
    “…To reduce the overhead of the proposed detection model and make it feasible for the resource-constrained nodes, we reduce the size of the training dataset by (1) restricting the data collection, storage, and analysis to concern only a set of specialized nodes (i.e., Multi-Point Relays) that are responsible for forwarding packets on behalf of their clusters; and (2) migrating only few tuples (i.e., support vectors) from one detection iteration to another. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  3. 183
  4. 184

    Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects by ALKAABI, ABDULLA

    Published 2023
    “…Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …”
    Get full text
  5. 185

    Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases by Muhammad Ali Muzammil (17910611)

    Published 2024
    “…These AI algorithms are effective non-invasive biomarkers for cardiovascular illnesses because they can identify subtle patterns and signals in the ECG that may not be readily apparent to human interpreters. …”
  6. 186
  7. 187

    Deepfakes Signatures Detection in the Handcrafted Features Space by Hamadene, Assia

    Published 2023
    “…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
    Get full text
  8. 188
  9. 189
  10. 190

    A fine-grained XML structural comparison approach by Tekli, Joe

    Published 2007
    “…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 191

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates by Ratiba F. Ghachi (14152455)

    Published 2022
    “…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …”
  12. 192

    Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort by Sergio Márquez-Sánchez (19437985)

    Published 2023
    “…Moreover, the prevalent cloud-based nature of these systems introduces elevated cybersecurity risks and substantial data transmission overheads. In response to these challenges, this article introduces a cutting-edge edge computing architecture grounded in virtual organizations, federated learning, and deep reinforcement learning algorithms, tailored to optimize energy consumption within buildings/homes and facilitate demand response. …”
  13. 193

    Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review by Arfan Ahmed (17541309)

    Published 2022
    “…WDs coupled with artificial intelligence (AI) algorithms show promise to help understand and conclude meaningful information from the gathered data and provide advanced and clinically meaningful analytics.…”
  14. 194

    An efficient cache replacement strategy for the hybrid cache consistency approach by Haraty, Ramzi A.

    Published 2010
    “…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  15. 195
  16. 196

    CubeSat Communication Subsystems: A Review of On-Board Transceiver Architectures, Protocols, and Performance by Amr Zeedan (17983750)

    Published 2023
    “…The reliability, performance, data rate, and power consumption of the reviewed systems are critically compared and evaluated to understand the limitations of existing CubeSat transceivers and identify directions of future developments. …”
  17. 197

    An XML Document Comparison Framework by Tekli, Joe

    Published 2001
    “…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
    Get full text
    Get full text
    Get full text
    article
  18. 198

    A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics by Tekli, Joe

    Published 2011
    “…XML similarity evaluation has become a central issue in the database and information communities, its applications ranging over document clustering, version control, data integration and ranked retrieval. Various algorithms for comparing hierarchically structured data, XML documents in particular, have been proposed in the literature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  19. 199

    Single-Cell Transcriptome Analysis Revealed Heterogeneity and Identified Novel Therapeutic Targets for Breast Cancer Subtypes by Radhakrishnan Vishnubalaji (3563306)

    Published 2023
    “…In the current study, we employed computational algorithms to decipher the cellular composition of estrogen receptor-positive (ER<sup>+</sup>), HER2<sup>+</sup>, ER<sup>+</sup>HER2<sup>+</sup>, and triple-negative BC (TNBC) subtypes from a total of 49,899 single cells’ publicly available transcriptomic data derived from 26 BC patients. …”
  20. 200

    Cyberbullying Detection in Arabic Text using Deep Learning by ALBAYARI, REEM RAMADAN SA’ID

    Published 2023
    “…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …”
    Get full text