Showing 221 - 240 results of 306 for search '(( relevant data algorithm ) OR ((( selection using algorithm ) OR ( neural coding algorithm ))))', query time: 0.12s Refine Results
  1. 221

    A utility minimization approach for energy-aware cooperative content distribution with fairness constraints by Yaacoub, Elias

    Published 2012
    “…Using the appropriate utilities, the algorithm can be used to implement the optimal greedy energy minimization solution or to ensure different degrees of fairness in energy consumption. …”
    Get full text
    Get full text
    Get full text
    article
  2. 222
  3. 223

    Deep Reinforcement Learning for Resource Constrained HLS Scheduling by Makhoul, Rim

    Published 2022
    “…In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. The actions and rewards for the proposed algorithm are selected carefully to guide the agent to its objective. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  4. 224

    Wearable Artificial Intelligence for Anxiety and Depression: Scoping Review by Alaa Abd-alrazaq (17058018)

    Published 2023
    “…The most frequently used data set from open sources was Depresjon. The most commonly used algorithm was random forest, followed by support vector machine.…”
  5. 225

    Artificial Intelligence for Skin Cancer Detection: Scoping Review by Abdulrahman Takiddin (14153181)

    Published 2021
    “…Hence, to aid in diagnosing skin cancer, artificial intelligence (AI) tools are being used, including shallow and deep machine learning–based methodologies that are trained to detect and classify skin cancer using computer algorithms and deep neural networks.…”
  6. 226

    Full-fledged semantic indexing and querying model designed for seamless integration in legacy RDBMS by Tekli, Joe

    Published 2018
    “…In the past decade, there has been an increasing need for semantic-aware data search and indexing in textual (structured and NoSQL) databases, as full-text search systems became available to non-experts where users have no knowledge about the data being searched and often formulate query keywords which are different from those used by the authors in indexing relevant documents, thus producing noisy and sometimes irrelevant results. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 227

    Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer by Andrea Remo (447375)

    Published 2015
    “…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …”
  8. 228

    A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns by Md Ferdous Wahid (13485799)

    Published 2023
    “…Statistical analysis showed that the selected features for liquids' and pipe's properties using the BGWOPSO algorithm were adequate to attain superior performance for both models. …”
  9. 229

    Artificial Intelligence–Driven Serious Games in Health Care: Scoping Review by Alaa Abd-alrazaq (17058018)

    Published 2022
    “…The most common algorithm used in the included studies was support vector machine. …”
  10. 230
  11. 231

    A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis by Alaa Abd-Alrazaq (17430900)

    Published 2021
    “…Publishers should avoid noise in the data by developing a way to trace the evolution of individual publications and unique authors.…”
  12. 232

    Regression Testing of Database Applications by Haraty, Ramzi A.

    Published 2002
    “…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …”
    Get full text
    Get full text
    Get full text
    article
  13. 233
  14. 234

    A novel design technique for generating building form by KAYED, MAYS N. A.

    Published 2018
    “…The theoretical framework of the technique was successfully tested out and validated by implementing it over serious of examples that are categorized into three groups: examples directed to test out the proposed variables in each process, examples directed to validate the ability of whole technique to generate forms for a hypothetical project requirements and examples of scripting the mechanisms using the algorithmic editor interface and the visual programming language Grasshopper incorporated with Rhinoceros 3D software."…”
    Get full text
  15. 235
  16. 236

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
    Get full text
  17. 237
  18. 238

    Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework by Tayyabah Hasan (18427887)

    Published 2022
    “…Firstly, the DL agent prioritizes caching contents via self organizing maps (SOMs) algorithm, and secondly, the prioritized contents are stored in QMM using a Two-Level Spin Quantum Phenomenon (TLSQP). …”
  19. 239

    Reliability and fault tolerance based topological optimization of computer networks - part II: iterative techniques by Abd-El-Barr, Mostafa

    Published 2003
    “…We consider fault-tolerance to be an important network design aspect. We consider the use of three iterative techniques, namely tabu search, simulated annealing, and genetic algorithms, in solving the multiobjective topological optimization network design problem. …”
    Get full text
    Get full text
    article
  20. 240

    An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM by Al-Naffouri, T.Y.

    Published 0000
    “…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …”
    Get full text
    Get full text
    article