بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
agent » agents (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
agent » agents (توسيع البحث)
-
121
Decision-level Gait Fusion for Human Identification at a Distance
منشور في 2014احصل على النص الكامل
doctoralThesis -
122
Unsupervised Deep Learning for Classification Of Bats Calls Using Acoustic Data
منشور في 2021احصل على النص الكامل
doctoralThesis -
123
Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature
منشور في 2022"…MethodsA systematic review of cases of extremity ischemia and necrosis after envenomation by marine cnidarians was performed to clarify what is and what is not known about management and outcomes, to draw conclusions about how best to manage these rare presentations, and to establish an evidence-based algorithm. ResultsThe ischemic sequelae of envenomation typically evolves over a few days. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
124
DASSI: differential architecture search for splice identification from DNA sequences
منشور في 2022"…The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …"
-
125
A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks
منشور في 2025"…We present a structured taxonomy covering value-based, policy-based, actor-critic, model-based, and advanced multi-agent and multi-objective approaches, and link algorithms to tasks such as dispatch, microgrid coordination, real-time pricing, load balancing, and demand–response. …"
-
126
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
منشور في 2023"…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …"
-
127
Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature
منشور في 2022"…</p><h3>Methods</h3><p dir="ltr">A systematic review of cases of extremity ischemia and necrosis after envenomation by marine cnidarians was performed to clarify what is and what is not known about management and outcomes, to draw conclusions about how best to manage these rare presentations, and to establish an evidence-based algorithm.</p><h3>Results</h3><p dir="ltr">The ischemic sequelae of envenomation typically evolves over a few days. …"
-
128
A hybrid approach for XML similarity
منشور في 2007"…Various algorithms for comparing hierarchically structured data, e.g. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
129
The role of Reinforcement Learning in software testing
منشور في 2023"…</p><h3>Results</h3><p dir="ltr">This study highlights different software testing types to which RL has been applied, commonly used RL algorithms and architecture for learning, challenges faced, advantages and disadvantages of using RL, and the performance comparison of RL-based models against other techniques.…"
-
130
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
منشور في 2023"…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
131
On the complexity of multi-parameterized cluster editing
منشور في 2017"…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
132
A Novel Deep Learning Technique for Detecting Emotional Impact in Online Education
منشور في 2022"…Facial recognition algorithms extract helpful information from online platforms as image classification techniques are applied to detect the emotions of student and/or teacher faces. …"
احصل على النص الكامل
-
133
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
منشور في 2022"…Fifth, it is also observed that the actuation and sensing position plays a crucial role in receiving the time-domain data with a sufficient SNR and the one that is easy to analyze and interpret. …"
احصل على النص الكامل
-
134
An Intelligent and Low-Cost Eye-Tracking System for Motorized Wheelchair Control
منشور في 2020"…This paper proposes a system to aid people with motor disabilities by restoring their ability to move effectively and effortlessly without having to rely on others utilizing an eye-controlled electric wheelchair. The system input is images of the user’s eye that are processed to estimate the gaze direction and the wheelchair was moved accordingly. …"
-
135
Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer
منشور في 2015"…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …"
-
136
Exploring new horizons in neuroscience disease detection through innovative visual signal analysis
منشور في 2024"…To address this, our study focuses on visualizing complex EEG signals in a format easily understandable by medical professionals and deep learning algorithms. We propose a novel time–frequency (TF) transform called the Forward–Backward Fourier transform (FBFT) and utilize convolutional neural networks (CNNs) to extract meaningful features from TF images and classify brain disorders. …"
-
137
-
138
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
139
Single-channel speech denoising by masking the colored spectrograms
منشور في 2025"…<p>Speech denoising (SD) covers the algorithms that remove the background noise from the target speech and thus improve its quality and intelligibility. …"
-
140