Search alternatives:
method algorithm » mould algorithm (Expand Search)
points algorithm » cosine algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
points algorithm » cosine algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
-
141
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
-
142
Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR)
Published 2018“…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …”
-
143
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
Published 2000“…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
Get full text
Get full text
Get full text
article -
144
Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations
Published 2007“…This paper presents the design and implementation of an elliptic curve cryptographic core to realize point scalar multiplication operations used for the GF(p) elliptic curve encryption/decryption and the elliptic curve digital signature algorithm (ECDSA). …”
Get full text
Get full text
article -
145
Vibration suppression in a cantilever beam using a string-type vibration absorber
Published 2017“…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
146
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
Published 2022“…Therefore, in this study, we find the turning points (i.e., toxicity triggers) making conversations toxic. …”
-
147
Transmission Line Fault Location Using Unsynchronized Measurements
Published 2013Get full text
doctoralThesis -
148
Uplink Noma in UAV-Assisted IoT Networks
Published 2022“…The first part of the thesis considers the problem of data collection from time-constrained IoT devices through deploying a UAV with uplink NOMA. …”
Get full text
Get full text
Get full text
masterThesis -
149
-
150
Could Petrol Stations Play a Key Role in Transportation Electrification? A GIS-Based Coverage Maximization of Fast EV Chargers in Urban Environment
Published 2022“…<p>To achieve net-zero in the transportation sector, there is a need to deploy public electric vehicle (EV) fast chargers to boost customer confidence. Currently, charge point operators and EV manufacturers focus on deploying chargers to cover highway networks and the progress in urban environments is inadequate. …”
-
151
Machine Learning–Based Approach for Identifying Research Gaps: COVID-19 as a Case Study
Published 2024“…</p><h3>Methods</h3><p dir="ltr">We conducted an analysis to identify research gaps in COVID-19 literature using the COVID-19 Open Research (CORD-19) data set, which comprises 1,121,433 papers related to the COVID-19 pandemic. …”
-
152
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
Get full text
Get full text
Get full text
Get full text
article -
153
CEAP
Published 2016“…To reduce the overhead of the proposed detection model and make it feasible for the resource-constrained nodes, we reduce the size of the training dataset by (1) restricting the data collection, storage, and analysis to concern only a set of specialized nodes (i.e., Multi-Point Relays) that are responsible for forwarding packets on behalf of their clusters; and (2) migrating only few tuples (i.e., support vectors) from one detection iteration to another. …”
Get full text
Get full text
Get full text
Get full text
article -
154
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
Get full text
-
155
Machine Learning Model for a Sustainable Drilling Process
Published 2023Get full text
doctoralThesis -
156
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
Published 2022“…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …”
-
157
Modelling of pollutant transport in compound open channels
Published 1998“…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
Get full text
Get full text
masterThesis -
158
THE FUTURE OF MEDICINE, healthcare innovation through precision medicine: policy case study of Qatar
Published 2020“…Consequently, the big data revolution has provided an opportunity to apply artificial intelligence and machine learning algorithms to mine such a vast data set. …”
-
159
Using machine learning to support students’ academic decisions
Published 2019“…At enrollment, this work predicts a student’s GPA in different majors using enrollment data such as high school average, placement test results, and IELTS score. …”
Get full text
-
160
FoGMatch
Published 2019“…In this context, the notion of fog computing has been projected to furnish data analytics and decision-making closer to the IoT devices. …”
Get full text
Get full text
Get full text
masterThesis