Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
selection using » detection using (Expand Search), prediction using (Expand Search), allocation using (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
selection using » detection using (Expand Search), prediction using (Expand Search), allocation using (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
221
A utility minimization approach for energy-aware cooperative content distribution with fairness constraints
Published 2012“…Using the appropriate utilities, the algorithm can be used to implement the optimal greedy energy minimization solution or to ensure different degrees of fairness in energy consumption. …”
Get full text
Get full text
Get full text
article -
222
Enhanced DC Microgrid Protection: a Neural Network and Wavelet Transform Approach
Published 2024Get full text
doctoralThesis -
223
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
Published 2022“…In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. The actions and rewards for the proposed algorithm are selected carefully to guide the agent to its objective. …”
Get full text
Get full text
Get full text
masterThesis -
224
Wearable Artificial Intelligence for Anxiety and Depression: Scoping Review
Published 2023“…The most frequently used data set from open sources was Depresjon. The most commonly used algorithm was random forest, followed by support vector machine.…”
-
225
Artificial Intelligence for Skin Cancer Detection: Scoping Review
Published 2021“…Hence, to aid in diagnosing skin cancer, artificial intelligence (AI) tools are being used, including shallow and deep machine learning–based methodologies that are trained to detect and classify skin cancer using computer algorithms and deep neural networks.…”
-
226
Full-fledged semantic indexing and querying model designed for seamless integration in legacy RDBMS
Published 2018“…In the past decade, there has been an increasing need for semantic-aware data search and indexing in textual (structured and NoSQL) databases, as full-text search systems became available to non-experts where users have no knowledge about the data being searched and often formulate query keywords which are different from those used by the authors in indexing relevant documents, thus producing noisy and sometimes irrelevant results. …”
Get full text
Get full text
Get full text
Get full text
article -
227
Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer
Published 2015“…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …”
-
228
A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns
Published 2023“…Statistical analysis showed that the selected features for liquids' and pipe's properties using the BGWOPSO algorithm were adequate to attain superior performance for both models. …”
-
229
Artificial Intelligence–Driven Serious Games in Health Care: Scoping Review
Published 2022“…The most common algorithm used in the included studies was support vector machine. …”
-
230
Rate Adaptation in Dynamic Adaptive Video Streaming Over HTTP
Published 2021Get full text
doctoralThesis -
231
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
Published 2021“…Publishers should avoid noise in the data by developing a way to trace the evolution of individual publications and unique authors.…”
-
232
Regression Testing of Database Applications
Published 2002“…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …”
Get full text
Get full text
Get full text
article -
233
-
234
A novel design technique for generating building form
Published 2018“…The theoretical framework of the technique was successfully tested out and validated by implementing it over serious of examples that are categorized into three groups: examples directed to test out the proposed variables in each process, examples directed to validate the ability of whole technique to generate forms for a hypothetical project requirements and examples of scripting the mechanisms using the algorithmic editor interface and the visual programming language Grasshopper incorporated with Rhinoceros 3D software."…”
Get full text
-
235
Autonomous Robot Navigation Based On Recurrent Neural Networks
Published 2012Get full text
doctoralThesis -
236
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
Get full text
-
237
Regression testing web services-based applications
Published 2006Get full text
Get full text
Get full text
Get full text
conferenceObject -
238
Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework
Published 2022“…Firstly, the DL agent prioritizes caching contents via self organizing maps (SOMs) algorithm, and secondly, the prioritized contents are stored in QMM using a Two-Level Spin Quantum Phenomenon (TLSQP). …”
-
239
Reliability and fault tolerance based topological optimization of computer networks - part II: iterative techniques
Published 2003“…We consider fault-tolerance to be an important network design aspect. We consider the use of three iterative techniques, namely tabu search, simulated annealing, and genetic algorithms, in solving the multiobjective topological optimization network design problem. …”
Get full text
Get full text
article -
240
An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM
Published 0000“…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …”
Get full text
Get full text
article