بدائل البحث:
algorithm a » algorithm fa (توسيع البحث), algorithms a (توسيع البحث), algorithm _ (توسيع البحث)
a function » _ functional (توسيع البحث)
algorithm a » algorithm fa (توسيع البحث), algorithms a (توسيع البحث), algorithm _ (توسيع البحث)
a function » _ functional (توسيع البحث)
-
361
FoGMatch
منشور في 2019"…Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
362
Blood-Based Proteomic Profiling Identifies Potential Biomarker Candidates and Pathogenic Pathways in Dementia
منشور في 2023"…We used a high-throughput proximity extension immunoassay to quantify 1090 proteins in 122 participants (22 with dementia, 64 with mild cognitive impairment (MCI), and 36 controls with normal cognitive function). …"
-
363
Decision-level fusion for single-view gait recognition with various carrying and clothing conditions
منشور في 2017"…Gait samples are fed into the MPCA and MPCALDA algorithms using a novel tensor-based form of the gait images. …"
احصل على النص الكامل
article -
364
Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array
منشور في 2022"…The measured results show that the antenna has a fractional bandwidth of 79.20% (1.37–3.16 GHz), 93% radiation efficiency, 98% high fidelity factor, 6.67 dBi gain, and adequate field penetration in the head tissue with a maximum of 0.0018 W/kg specific absorption rate. …"
-
365
DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins
منشور في 2025"…BackgroundBacterial endotoxin, a lipopolysaccharide exuded by bacteria during their growth and infection process, serves as a valuable biomarker for bacterial identification. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
366
Cohen syndrome and early-onset epileptic encephalopathy in male triplets: two disease-causing mutations in VPS13B and NAPB
منشور في 2023"…Interestingly, the functions of the two proteins; VPS13B, a transmembrane protein involved in intracellular protein transport, and SNAP-beta involved in neurotransmitters release at the neuronal synaptic complexes, have been associated with Golgi-mediated vesicular trafficking. …"
-
367
Integrated whole transcriptome and small RNA analysis revealed multiple regulatory networks in colorectal cancer
منشور في 2021"…<div><p>Colorectal cancer (CRC) remains a global disease burden and a leading cause of cancer related deaths worldwide. …"
-
368
Condenser capacity and hyperbolic perimeterImage 1
منشور في 2021"…Especially, we apply domain functionals to study the capacities of condensers (G,E) where G is a simply connected domain in the complex plane and E is a compact subset of G. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
369
Practical Multiple Node Failure Recovery in Distributed Storage Systems
منشور في 2016"…In this paper we use the fractional repetition code to apply as a redundancy scheme for multiple failure recovery with optimized system cost. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
370
Condenser capacity and hyperbolic perimeter
منشور في 2022"…Especially, we apply domain functionals to study the capacities of condensers (,) where is a simply connected domain in the complex plane and is a compact subset of . …"
-
371
Deploying model obfuscation: towards the privacy of decision-making models on shared platforms
منشور في 2024"…Privacy and security of data and models are fundamental necessities that must be satisfied for this protocol's proper functioning. To this end, we propose a conceptual and algorithmic framework of a model obfuscation scheme. …"
احصل على النص الكامل
احصل على النص الكامل
-
372
Dynamic single node failure recovery in distributed storage systems
منشور في 2017"…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
373
Scalable Multimedia Streaming in Wireless Networks with Device-to-Device Cooperation
منشور في 2016"…This is particularly applicable to use cases such as delivering real-time multimedia content to fans watching a soccer game in a stadium or to participants attending a major conference in a large auditorium. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
374
-
375
IoT-Based Sustainable Parking Lot
منشور في 2023"…The access control system employs a combination of vehicle detection and plate recognition algorithms to identify and authenticate vehicles entering and exiting the parking lot. …"
احصل على النص الكامل
article -
376
Dynamic multiple node failure recovery in distributed storage systems
منشور في 2018"…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
377
Common weaving approach in mainstream languages for software security hardening
منشور في 2013"…GIMPLE weaving accompanied by a common aspect-oriented language (1) allows security experts providing security solutions using this common language, (2) lets developers focus on the main functionality of programs by relieving them from the burden of security issues, (3) unifies the matching and the weaving processes for mainstream languages, and (4) facilitates introducing new security features in AOP languages. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
378
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
منشور في 2017"…Aortic valve diseases are among the most common cardiovascular defects. Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
379
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
منشور في 2017"…Aortic valve diseases are among the most common cardiovascular defects. Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
380