يعرض 361 - 380 نتائج من 416 نتيجة بحث عن '(((( complement c4d algorithm ) OR ( present study algorithm ))) OR ( level using algorithm ))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 361

    Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review حسب Yazeed Yasin Ghadi (16667109)

    منشور في 2024
    "…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …"
  2. 362

    Triage decisions for ICU admission حسب Blanch, Lluis

    منشور في 2016
    "…The team made recommendations and concluded that triage should be led by intensivists considering input from nurses, emergency medicine professionals, hospitalists, surgeons, and allied professionals. Triage algorithms and protocols can be useful but can never supplant the role of skilled intensivists basing their decisions on input from multidisciplinary teams. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 363

    Data redundancy management for leaf-edges in connected environments حسب Mansour, Elio

    منشور في 2022
    "…To address these limitations, we propose here DRMF: Data Redundancy Management for leaF-edges allowing to identify and remove data redundancies in connected environments at the device level. DRMF considers both static and mobile edge devices, and provides two algorithms for temporal and spatio-temporal redundancy detection. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 364

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates حسب Ratiba F. Ghachi (14152455)

    منشور في 2022
    "…<h2>Purpose</h2> <p>We present an approach that combines finite element analysis and genetic algorithms to find the optimal configuration of local resonators created in the host structure to suppress their vibration in a target low-frequency range. …"
  5. 365

    Reactive transport in porous media: a review of recent mathematical efforts in modeling geochemical reactions in petroleum subsurface reservoirs حسب Abdul Salam Abd (14151648)

    منشور في 2021
    "…We finally present two numerical cases from the literature to highlight the key variations between the different variable formulations and comment on the advantages and disadvantages of each approach.…"
  6. 366

    A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks حسب Sakib Mahmud (15302404)

    منشور في 2025
    "…We present a structured taxonomy covering value-based, policy-based, actor-critic, model-based, and advanced multi-agent and multi-objective approaches, and link algorithms to tasks such as dispatch, microgrid coordination, real-time pricing, load balancing, and demand–response. …"
  7. 367

    Optimising Nurse–Patient Assignments: The Impact of Machine Learning Model on Care Dynamics—Discursive Paper حسب Mutaz I. Othman (21186827)

    منشور في 2025
    "…</p><h3>Methods</h3><p dir="ltr">A discursive approach was used to optimise nurse–patient assignments and the impact of ML models. …"
  8. 368
  9. 369

    Artificial intelligence-based methods for fusion of electronic health records and imaging data حسب Farida Mohsen (16994682)

    منشور في 2022
    "…We present a comprehensive analysis of the various fusion strategies, the diseases and clinical outcomes for which multimodal fusion was used, the ML algorithms used to perform multimodal fusion for each clinical application, and the available multimodal medical datasets. …"
  10. 370

    Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling حسب Majed Hadid (17148364)

    منشور في 2022
    "…A Stochastic Discrete Simulation-Based Multi-Objective Optimization (SDSMO) model is developed and linked to clustering algorithms using an iterative sequential approach. The experimental results indicate the positive effect of clustering similar appointments on the performance measures and the computational time. …"
  11. 371

    The role of Reinforcement Learning in software testing حسب Amr Abo-eleneen (17032284)

    منشور في 2023
    "…</p><h3>Results</h3><p dir="ltr">This study highlights different software testing types to which RL has been applied, commonly used RL algorithms and architecture for learning, challenges faced, advantages and disadvantages of using RL, and the performance comparison of RL-based models against other techniques.…"
  12. 372

    Data mining approach to predict student's selection of program majors حسب SIDDARTHA, SHARMILA

    منشور في 2019
    "…Naïve Bayes, Decision Trees offered the best predictions across the different sampling techniques. This study presents an approach to design and deploy a data mining project that can be used as a basis for developing systems to enable the selection of student majors.…"
    احصل على النص الكامل
  13. 373

    Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier حسب Syed Ali Jafar Zaidi (19563178)

    منشور في 2021
    "…This study focuses on the future prediction of the effectiveness of the COVID-19 vaccine effectiveness which has been presented as a light in the dark. …"
  14. 374

    Current trends and future orientation in diagnosing lung pathologies: A systematic survey حسب Noorizadeh, Mohammad

    منشور في 2025
    "…The study underscored the potential of these techniques to enhance the diagnosis of lung pathologies and VAP and presents the advances in the field of smart biomedical applications. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 375

    Design and analysis of efficient and secure elliptic curve cryptoprocessors. حسب Al-Somani, Turki Faisal

    منشور في 2006
    "…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …"
    احصل على النص الكامل
    masterThesis
  16. 376

    Machine Learning Techniques for Pharmaceutical Bioinformatics حسب SULTAN, AHMED ATTA AHMED

    منشور في 2018
    "…A predictive model is developed to predict drug indication as well as to predict new DDIs using multiple machine learning algorithms. This dissertation presents a case study of predicted anti-cancer activity for 38 drugs. …"
    احصل على النص الكامل
  17. 377
  18. 378

    A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity حسب Abdullah Al Siam (22304047)

    منشور في 2025
    "…We examine cutting-edge AI methodologies and principal models across many domains, including machine learning algorithms, deep learning architectures, natural language processing techniques, and anomaly detection algorithms, emphasizing their distinct contributions to enhancing security. …"
  19. 379

    A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques حسب SALLOUM, SAID

    منشور في 2022
    "…Based on specific predefined criteria, a total of 100 research articles published between 2006 and 2022 were identified and analysed. We study the key research areas in phishing email detection using NLP, machine learning algorithms used in phishing detection email, text features in phishing emails, datasets and resources that have been used in phishing emails, and the evaluation criteria. …"
    احصل على النص الكامل
    احصل على النص الكامل
  20. 380

    Building power consumption datasets: Survey, taxonomy and future directions حسب Yassine Himeur (14158821)

    منشور في 2020
    "…Based on the analytical study, a novel dataset has been presented, namely Qatar university dataset, which is an annotated power consumption anomaly detection dataset. …"