يعرض 621 - 640 نتائج من 732 نتيجة بحث عن '(((( complement custom algorithm ) OR ( element means algorithm ))) OR ( models using algorithm ))', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 621

    Creating and detecting fake reviews of online products حسب Joni Salminen (7434770)

    منشور في 2022
    "…Using the better model, GPT-2, we create a dataset for a classification task of fake review detection. …"
  2. 622

    ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks حسب Muhammad Asif Khan (7367468)

    منشور في 2022
    "…Recently, cognitive network architectures using sophisticated learning techniques are increasingly being applied to such problems. …"
  3. 623

    Parallel processing حسب Mansour, Nashat

    منشور في 2005
    "…The parallel genetic algorithm is based on a model of natural evolution. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  4. 624

    A Novel Centrality-Based Approach for Link Prediction حسب El Khoury, Elissa Lichaa

    منشور في 2025
    "…Namely, we consider weighted betweenness, closeness and Katz centralities, in addition to the Resource Allocation and Adamic-Adar indices. We also use a genetic algorithm to optimize the weights of these metrics, reflecting their contributions to link prediction. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  5. 625

    Defining quantitative rules for identifying influential researchers: Insights from mathematics domain حسب Ghulam Mustafa (458105)

    منشور في 2024
    "…The rules were developed for each parameter category using the Decision Tree Algorithm, which achieved an average accuracy of 70 to 75 percent for identifying awardees in mathematics domains. …"
  6. 626
  7. 627
  8. 628

    Investigating the Impact of Skylights and Atrium Configurations on Visual Comfort and Daylight Performance in Dubai Shopping Malls حسب SANAD, AYMAN ADEL AHMED

    منشور في 2025
    "…Field measurements and computer simulations are conducted to model and validate daylight performance. Annual simulations are used to assess seasonal variations, while sensitivity analysis identifies key parameters. …"
    احصل على النص الكامل
  9. 629

    Enhancing e-learning through AI: advanced techniques for optimizing student performance حسب Rund Mahafdah (21399854)

    منشور في 2024
    "…The main goals consist of creating an AI-based framework to monitor and analyze student interactions, evaluating the influence of online learning platforms on student understanding using advanced algorithms, and determining the most efficient methods for blended learning systems. …"
  10. 630

    Control of cardiac alternans by mechanical and electrical feedback حسب Yapari, Felicia

    منشور في 2014
    "…Complimentary to these studies, a three variable Nash-Panfilov model is used to investigate alternans annihilation via mechanical (or stretch) perturbations. …"
    احصل على النص الكامل
    article
  11. 631

    Resources Allocation for Drones Tracking Utilizing Agent-Based Proximity Policy Optimization حسب De Rochechouart, Maxence

    منشور في 2023
    "…In particular, the Proximity Policy Optimization (PPO) reinforcement algorithm is used to discover a policy for sensor selection that results in optimum sensor resource allocation. …"
    احصل على النص الكامل
  12. 632
  13. 633

    Multi-Classifier Tree With Transient Features for Drift Compensation in Electronic Nose حسب Atiq Ur Rehman (8843024)

    منشور في 2020
    "…These electronic instruments rely on Machine Learning (ML) algorithms for recognizing the sensed odors. The effect of long-term drift influences the performance of ML algorithms and the models those are trained on drift free data fail to perform on the drifted data. …"
  14. 634

    Improving the security of SNMP in wireless networks حسب Otrok, H.

    منشور في 2017
    "…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). Symmetric cryptography is used for encryption and one-way cryptography is used for authentication. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  15. 635
  16. 636

    Computational evluation of protein energy functions حسب Mansour, Nashat

    منشور في 2014
    "…Our findings show that the CHARMM energy model tends to be more appropriate for ab initio computational techniques that predict protein structures. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  17. 637
  18. 638
  19. 639
  20. 640

    A machine learning approach for localization in cellular environments حسب Abdallah, Ali A.

    منشور في 2018
    "…The proposed approach only assumes knowledge of RSS fingerprints of the environment, and does not require knowledge of the cellular base transceiver station (BTS) locations, nor uses any RSS mathematical model. The proposed localization scheme integrates a weighted K-nearest neighbor (WKNN) and a multilayer neural network. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject