Search alternatives:
learning algorithm » learning algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data learning » deep learning (Expand Search)
search » research (Expand Search)
learning algorithm » learning algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data learning » deep learning (Expand Search)
search » research (Expand Search)
-
681
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
-
682
-
683
Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer
Published 2015“…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …”
-
684
Axes-Based Encryption Key
Published 2018“…For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
685
Resilience analytics: coverage and robustness in multi-modal transportation networks
Published 2018“…In this work, we propose MUME, an efficient algorithm for Multi-modal Urban Mobility Estimation, that takes advantage of the special structure of the supra-Laplacian matrix of the transportation multiplex, to compute the coverage of the system. …”
-
686
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
Published 2011“…However, the computational as well as memory access requirements of compression algorithms could consume more energy than simply transmitting data uncompressed. …”
Get full text
Get full text
Get full text
article -
687
Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System
Published 2025“…The proposed methodology not only ensures the protection of biometric data in storage but also facilitates secure data retrieval for authentication purposes. …”
-
688
-
689
Modelling of pollutant transport in compound open channels
Published 1998“…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
Get full text
Get full text
masterThesis -
690
THE FUTURE OF MEDICINE, healthcare innovation through precision medicine: policy case study of Qatar
Published 2020“…Consequently, the big data revolution has provided an opportunity to apply artificial intelligence and machine learning algorithms to mine such a vast data set. …”
-
691
Dynamic multiple node failure recovery in distributed storage systems
Published 2018“…Our daily lives are getting more and more dependent on data centers and distributed storage systems in general, whether at the business or at the personal level. …”
Get full text
Get full text
Get full text
Get full text
article -
692
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…An attacker can easily capture data from the available network channel and use it for their own purpose. …”
-
693
Combinatorial method for bandwidth selection in wind speed kernel density estimation
Published 2019“…This goal calls for devising probabilistic models with adaptive algorithms that accurately fit wind speed distributions. …”
Get full text
-
694
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
Published 2017Get full text
doctoralThesis -
695
-
696
Legal and Ethical Considerations of Artificial Intelligence for Residents in Post-Acute and Long-Term Care
Published 2024“…Third, privacy rules concerning data use may undermine developers’ ability to train accurate AI systems, limiting their usefulness in PA-LTC contexts. …”
-
697
Accelerating Blockchain Transaction Verification With Parallel Computing
Published 2024Get full text
doctoralThesis -
698
-
699
Role of authentication factors in Fin-tech mobile transaction security
Published 2023“…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
-
700
Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling
Published 2022“…The developed cluster-based stochastic optimization approaches showed superior performance compared with baseline and sequencing heuristics using data from a real Outpatient Chemotherapy Center (OCC).…”