يعرض 341 - 360 نتائج من 388 نتيجة بحث عن '(((( data code algorithm ) OR ( data learning algorithm ))) OR ( element method algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 341
  2. 342

    A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem حسب Habchi, Wassim

    منشور في 2008
    "…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 343

    Investigation of Forming a Framework to shortlist contractors in the tendering phase حسب DABASH, MOHANNAD SALAH

    منشور في 2022
    "…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …"
    احصل على النص الكامل
  4. 344

    Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO حسب Majedeh Gheytanzadeh (17541927)

    منشور في 2022
    "…Accordingly, a dataset containg 258 data points was extracted from the DFT method to use in machine learning method. …"
  5. 345

    Predicting COVID-19 cases using bidirectional LSTM on multivariate time series حسب Ahmed Ben Said (14158926)

    منشور في 2022
    "…Unlike other forecasting techniques, our proposed approach first groups the countries having similar demographic and socioeconomic aspects and health sector indicators using K-means clustering algorithm. The cumulative case data of the clustered countries enriched with data related to the lockdown measures are fed to the bidirectional LSTM to train the forecasting model. …"
  6. 346

    Smart non-intrusive appliance identification using a novel local power histogramming descriptor with an improved k-nearest neighbors classifier حسب Yassine Himeur (14158821)

    منشور في 2021
    "…Specifically, short local histograms are drawn to represent individual appliance consumption signatures and robustly extract appliance-level data from the aggregated power signal. Furthermore, an improved k-nearest neighbors (IKNN) algorithm is presented to reduce the learning computation time and improve the classification performance. …"
  7. 347

    Generic metadata representation framework for social-based event detection, description, and linkage حسب Abebe, Minale A.

    منشور في 2020
    "…SEDDaL consists of four main modules for: i) describing social media objects in a generic Metadata Representation Space Model (MRSM) consisting of three composite dimensions: temporal, spatial, and semantic, ii) evaluating the similarity between social media objects’ descriptions following MRSM, iii) detecting events from similar social media objects using an adapted unsupervised learning algorithm, where events are represented as clusters of objects in MRSM, and iv) identifying directional, metric, and topological relationships between events following MRSM’s dimensions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 348

    Predicting long-term type 2 diabetes with support vector machine using oral glucose tolerance test حسب Hasan T. Abbas (8115014)

    منشور في 2019
    "…Furthermore, personal information such as age, ethnicity and body-mass index was also a part of the data-set. Using 11 OGTT measurements, we have deduced 61 features, which are then assigned a rank and the top ten features are shortlisted using minimum redundancy maximum relevance feature selection algorithm. …"
  9. 349

    Communications in electronic textile systems حسب Nakad, Z.

    منشور في 2017
    "…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  10. 350

    Exploratory risk prediction of type II diabetes with isolation forests and novel biomarkers حسب Yousef, Hibba

    منشور في 2024
    "…In particular, Isolation Forest (iForest) was applied as an anomaly detection algorithm to address class imbalance. iForest was trained on the control group data to detect cases of high risk for T2DM development as outliers. …"
    احصل على النص الكامل
  11. 351
  12. 352

    Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers حسب Ali Sharida (17947847)

    منشور في 2023
    "…To develop the DT, a dense deep neural network (DNN) machine learning approach is used. The DT is trained offline using a set of experimental data and updated online to get the maximum possible accuracy. …"
  13. 353
  14. 354

    Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques حسب Fares, Samar

    منشور في 2024
    "…The first method uses an offline technique based on a global optimizer called the CMA-ES algorithm and the second one uses LSTM in its different forms to learn the online adjustment of the fusion weights between the two tracks. …"
    احصل على النص الكامل
  15. 355

    Design and analysis of entropy-constrained reflected residual vector quantization حسب Mousa, W.A.H.

    منشور في 2002
    "…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 356

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …"
  17. 357

    Clustering Tweets to Discover Trending Topics about دبي (Dubai) حسب ALYALYALI, SALAMA KHAMIS SALEM KHAMIS

    منشور في 2018
    "…One of these social networks is Twitter - a microblogging hub and rich environment of data. Scanning tweets online is a hard task and searching effortlessly to find intended topic from huge amount of data is also time consuming. …"
    احصل على النص الكامل
  18. 358

    Role of authentication factors in Fin-tech mobile transaction security حسب Habib Ullah Khan (12024579)

    منشور في 2023
    "…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…"
  19. 359

    Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic حسب Saeed Al-Maroof, Rana

    منشور في 2020
    "…The study has made use of Google Meet© as an educational social platform in private higher education institutes. The data obtained from the study were analyzed by using the partial least squares structural equation modeling (PLS-SEM) and machine learning algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
  20. 360