-
221
Wearable Artificial Intelligence for Anxiety and Depression: Scoping Review
منشور في 2023"…The most frequently used data set from open sources was Depresjon. The most commonly used algorithm was random forest, followed by support vector machine.…"
-
222
-
223
-
224
Artificial Intelligence–Driven Serious Games in Health Care: Scoping Review
منشور في 2022"…The most common algorithm used in the included studies was support vector machine. …"
-
225
Systematic review and meta-analysis of performance of wearable artificial intelligence in detecting and predicting depression
منشور في 2023"…<p dir="ltr">Given the limitations of traditional approaches, wearable artificial intelligence (AI) is one of the technologies that have been exploited to detect or predict depression. …"
-
226
-
227
Anomaly Detection Based Framework for Profile Monitoring
منشور في 2023احصل على النص الكامل
doctoralThesis -
228
-
229
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
منشور في 2021"…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …"
-
230
The Generalization of Bidirectional Dual Active Bridge DC/DC Converter Modulation Schemes: State-of-the-Art Analysis under Triple Phase Shift Control
منشور في 2023"…<p dir="ltr">The main objective of this paper is to provide a thorough analysis of currently used modulation control schemes for single-phase bidirectional dual active bridge DC/DC converters. …"
-
231
-
232
-
233
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
منشور في 2023"…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …"
-
234
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
منشور في 2021"…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…"
-
235
Generation and Detection of Sign Language Deepfakes - A Linguistic and Visual Analysis
منشور في 2025"…This research explores the positive application of deepfake technology for upper body generation, specifically sign language for the Deaf and Hard of Hearing (DHoH) community. …"
احصل على النص الكامل
article -
236
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
منشور في 2021"…The optimization phase improved the conceptual framework by adding three new fundamental concepts: hubs coupling, encrypted transmission, and end-to-end service quality. The technology stack was also enhanced with three new algorithms and five protocols. …"
احصل على النص الكامل
-
237
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
منشور في 2021"…DNA microarray technology is the fabrication of a single chip to contain a thousand genetic codes. …"
احصل على النص الكامل
-
238
The role of Reinforcement Learning in software testing
منشور في 2023"…</p><h3>Results</h3><p dir="ltr">This study highlights different software testing types to which RL has been applied, commonly used RL algorithms and architecture for learning, challenges faced, advantages and disadvantages of using RL, and the performance comparison of RL-based models against other techniques.…"
-
239
-
240