Search alternatives:
augmentations » augmentation (Expand Search), argumentation (Expand Search), alimentation (Expand Search)
augmentations » augmentation (Expand Search), argumentation (Expand Search), alimentation (Expand Search)
-
61
-
62
Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations
Published 2025“…<p dir="ltr">Cyber threats are increasingly frequent in today’s world, posing challenges for organizations and individuals to protect their data from cybercriminals. On the other hand, Generative Artificial Intelligence (GAI) technology offers an efficient way to automatically address these issues with the help of AI models and algorithms. …”
-
63
Blue collar laborers’ travel pattern recognition: Machine learning classifier approach
Published 2021“…A pattern recognition model is applied to a revealed preference (RP) survey obtained from the Ministry of Transportation and Communication (MoTC) in Qatar for the travel diary for blue-collar workers. Raw data preprocessing and outliers detection and filtering algorithms were applied at the first stage of the analysis, and consequently, an activity-based travel matrix was developed for each household. …”
-
64
Learning Spatiotemporal Latent Factors of Traffic via Regularized Tensor Factorization: Imputing Missing Values and Forecasting
Published 2019“…The road network is represented as a directed graph in which nodes are junctions (intersections) and edges are road segments. We assume that the city has deployed high-fidelity sensors for speed reading in a subset of edges; and the objective is to infer the speed readings for the remaining edges in the network; and to estimate the missing values in the segments for which sensors have stopped generating data due to technical problems (e.g., battery, network, etc.). …”
-
65
-
66
-
67
A New Approach for Recognizing Saudi Arabian License Plates using Neural Networks
Published 2020“…Finally, a Multilayer Feedforward Neural Network (MFNN) with a backpropagation (BP) algorithm is used for character recognition. We discuss new features from the characters for training the NN. …”
Get full text
article -
68
-
69
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
Published 2019“…These were subjected to two different processes called contrast enhancement and segmentation of vein regions. Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
-
70
Strategies for Reliable Stress Recognition: A Machine Learning Approach Using Heart Rate Variability Features
Published 2024“…To account for limitations associated with small datasets, robust strategies were implemented based on methodological recommendations for ML with a limited dataset, including data segmentation, feature selection, and model evaluation. …”
-
71
Integration of Textural and Material Information into BIM Using Spectrometry and Infrared Sensing
Published 2015Get full text
doctoralThesis -
72
On end-to-end scheduling in wireless cellular networks
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
73
-
74
A hybrid approach for XML similarity
Published 2007“…Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
75
Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework
Published 2022“…After selecting the most appropriate lattice map (32 × 32) in 750,000 iterations using SOMs, the data points below the dark blue region are mapped onto the data frame to get the videos. …”
-
76
-
77
Scan Test Cost and Power Reduction Through Systematic Scan Reconfiguration
Published 0000“…This paper presents segmented addressable scan (SAS), a test architecture that addresses test data volume, test application time, test power consumption, and tester channel requirements using a hardware overhead of a few gates per scan chain. …”
Get full text
Get full text
article -
78
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
Published 2021“…It can be further scaled (for instance, in time) to clinical summary documentation. Publishers should avoid noise in the data by developing a way to trace the evolution of individual publications and unique authors.…”
-
79
A fine-grained XML structural comparison approach
Published 2007“…Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
80
Information Warfare
Published 2015Get full text
Get full text
Get full text
Get full text
conferenceObject