Search alternatives:
method algorithm » mould algorithm (Expand Search)
based scheduling » task scheduling (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 681 - 700 results of 776 for search '(( elements method algorithm ) OR ((( data using algorithm ) OR ( based scheduling algorithm ))))', query time: 0.12s Refine Results
  1. 681

    Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer by Andrea Remo (447375)

    Published 2015
    “…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …”
  2. 682

    Artificial Intelligence for Skin Cancer Detection: Scoping Review by Abdulrahman Takiddin (14153181)

    Published 2021
    “…Hence, to aid in diagnosing skin cancer, artificial intelligence (AI) tools are being used, including shallow and deep machine learning–based methodologies that are trained to detect and classify skin cancer using computer algorithms and deep neural networks.…”
  3. 683

    Axes-Based Encryption Key by Haidar, Imane

    Published 2018
    “…For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 684

    Resilience analytics: coverage and robustness in multi-modal transportation networks by Abdelkader Baggag (14153040)

    Published 2018
    “…In this work, we propose MUME, an efficient algorithm for Multi-modal Urban Mobility Estimation, that takes advantage of the special structure of the supra-Laplacian matrix of the transportation multiplex, to compute the coverage of the system. …”
  5. 685

    A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications by Sharafeddine, Sanaa

    Published 2011
    “…However, the computational as well as memory access requirements of compression algorithms could consume more energy than simply transmitting data uncompressed. …”
    Get full text
    Get full text
    Get full text
    article
  6. 686

    A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis by Alaa Abd-Alrazaq (17430900)

    Published 2021
    “…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …”
  7. 687

    Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System by Mohd Imran (12249782)

    Published 2025
    “…The proposed methodology not only ensures the protection of biometric data in storage but also facilitates secure data retrieval for authentication purposes. …”
  8. 688
  9. 689
  10. 690

    Modelling of pollutant transport in compound open channels by Chatila, Jean Georges

    Published 1998
    “…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
    Get full text
    Get full text
    masterThesis
  11. 691
  12. 692

    Multi-Classifier Tree With Transient Features for Drift Compensation in Electronic Nose by Atiq Ur Rehman (8843024)

    Published 2020
    “…These electronic instruments rely on Machine Learning (ML) algorithms for recognizing the sensed odors. The effect of long-term drift influences the performance of ML algorithms and the models those are trained on drift free data fail to perform on the drifted data. …”
  13. 693

    Dynamic multiple node failure recovery in distributed storage systems by Itani, May

    Published 2018
    “…Our daily lives are getting more and more dependent on data centers and distributed storage systems in general, whether at the business or at the personal level. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 694

    A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass by Uzma Nawaz (21980708)

    Published 2025
    “…The collection of digital images for monitoring underwater habitats, such as seagrass meadows, has increased significantly as recent progress in imaging technology has made it easier to collect high-resolution data. The increase in imagery data has in turn created a demand for automated detection and classification using deep neural network-based techniques. …”
  15. 695

    Decision-level fusion for single-view gait recognition with various carrying and clothing conditions by Al-Tayyan, Amer

    Published 2017
    “…Gait samples are fed into the MPCA and MPCALDA algorithms using a novel tensor-based form of the gait images. …”
    Get full text
    article
  16. 696

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…An attacker can easily capture data from the available network channel and use it for their own purpose. …”
  17. 697
  18. 698
  19. 699

    CNN feature and classifier fusion on novel transformed image dataset for dysgraphia diagnosis in children by Jayakanth, Kunhoth

    Published 2023
    “…The pre-trained DenseNet201 network is used for CNN feature extraction from each task-specific handwritten image data. …”
    Get full text
    Get full text
    Get full text
    article
  20. 700

    Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic by Saeed Al-Maroof, Rana

    Published 2020
    “…The data obtained from the study were analyzed by using the partial least squares structural equation modeling (PLS-SEM) and machine learning algorithms. …”
    Get full text
    Get full text