يعرض 121 - 140 نتائج من 192 نتيجة بحث عن '(((( data code algorithm ) OR ( data finding algorithm ))) OR ( elements means algorithm ))*', وقت الاستعلام: 0.09s تنقيح النتائج
  1. 121

    Nonlinear analysis of shell structures using image processing and machine learning حسب M.S. Nashed (16392961)

    منشور في 2023
    "…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …"
  2. 122

    Efficient XML Structural Similarity Detection using Sub-tree Commonalities حسب Tekli, Joe

    منشور في 2007
    "…Developing efficient techniques for comparing XML-based documents becomes essential in the database and information retrieval communities. Various algorithms for comparing hierarchically structured data, e.g. …"
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  3. 123

    An XML Document Comparison Framework حسب Tekli, Joe

    منشور في 2001
    "…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 124
  5. 125

    A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics حسب Tekli, Joe

    منشور في 2011
    "…XML similarity evaluation has become a central issue in the database and information communities, its applications ranging over document clustering, version control, data integration and ranked retrieval. Various algorithms for comparing hierarchically structured data, XML documents in particular, have been proposed in the literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 126

    Design and analysis of entropy-constrained reflected residual vector quantization حسب Mousa, W.A.H.

    منشور في 2002
    "…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 127

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …"
  8. 128

    Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks حسب Abbas, Nadine

    منشور في 2018
    "…Traffic offloading via device-to-device communications is expected to play a major role to meet the exponential data traffic growth in wireless networks. In this work, we focus on the problem of user capacity maximization in ultra dense heterogeneous networks with device-to-device cooperation, where a large number of users in a given geographical area request common data content, such as video on demand streaming, with strict quality of service guarantees. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 129

    Scatter search technique for exam timetabling حسب Mansour, Nashat

    منشور في 2011
    "…We evaluate our suggested technique on real-world university data and compare our results with the registrar’s manual timetable in addition to the timetables of other heuristic optimization algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 130

    Role of authentication factors in Fin-tech mobile transaction security حسب Habib Ullah Khan (12024579)

    منشور في 2023
    "…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…"
  11. 131

    Soft Sensor for NOx Emission using Dynamical Neural Network حسب Shakil, M.

    منشور في 2020
    "…Lag space for the model is found by using genetic algorithm to find the best time delayed model. Lag space obtained from the linear model is then used for constriction of the dynamical neural network. …"
    احصل على النص الكامل
    article
  12. 132

    Clustering Tweets to Discover Trending Topics about دبي (Dubai) حسب ALYALYALI, SALAMA KHAMIS SALEM KHAMIS

    منشور في 2018
    "…One of these social networks is Twitter - a microblogging hub and rich environment of data. Scanning tweets online is a hard task and searching effortlessly to find intended topic from huge amount of data is also time consuming. …"
    احصل على النص الكامل
  13. 133
  14. 134

    Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation حسب Saqr Khalil Saeed Thabet (19517560)

    منشور في 2022
    "…Then, a minimum distortion optimization algorithm iteratively computes all the possible resource allocations to find the optimal allocation based on the minimum distortion. …"
  15. 135

    Innovative mobile E-healthcare systems حسب Haraty, Ramzi A.

    منشور في 2016
    "…Caching is one of the key methods in distributed computing environments to improve the performance of data retrieval. To find which item in the cache can be evicted and replaced, cache replacement algorithms are used. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 136

    PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits حسب Hind Almerekhi (7434776)

    منشور في 2022
    "…Therefore, in this study, we find the turning points (i.e., toxicity triggers) making conversations toxic. …"
  17. 137
  18. 138
  19. 139

    Cohen syndrome and early-onset epileptic encephalopathy in male triplets: two disease-causing mutations in VPS13B and NAPB حسب Alice AbdelAleem (17753799)

    منشور في 2023
    "…Sanger sequencing verified the segregation of the two recessive gene variants with the phenotype in family members. The prediction algorithms support the pathogenicity of these variants. …"
  20. 140

    The Effectiveness of Supervised Machine Learning in Screening and Diagnosing Voice Disorders: Systematic Review and Meta-analysis حسب Ghada Al-Hussain (18295426)

    منشور في 2022
    "…Machine learning (ML) algorithms have been used as an objective tool in screening or diagnosing voice disorders. …"