Showing 141 - 160 results of 225 for search '(((( data code algorithm ) OR ( data making algorithm ))) OR ( element method algorithm ))*', query time: 0.16s Refine Results
  1. 141

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates by Ratiba F. Ghachi (14152455)

    Published 2022
    “…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …”
  2. 142

    Predicting COVID-19 cases using bidirectional LSTM on multivariate time series by Ahmed Ben Said (14158926)

    Published 2022
    “…Unlike other forecasting techniques, our proposed approach first groups the countries having similar demographic and socioeconomic aspects and health sector indicators using K-means clustering algorithm. The cumulative case data of the clustered countries enriched with data related to the lockdown measures are fed to the bidirectional LSTM to train the forecasting model. …”
  3. 143

    Interpreting patient-Specific risk prediction using contextual decomposition of BiLSTMs: application to children with asthma by Rawan AlSaad (14159019)

    Published 2019
    “…<h3>Background</h3><p dir="ltr">Predictive modeling with longitudinal electronic health record (EHR) data offers great promise for accelerating personalized medicine and better informs clinical decision-making. …”
  4. 144

    Plant disease detection using drones in precision agriculture by Ruben Chin (17725986)

    Published 2023
    “…Color-infrared (CIR) images are the most preferred data used and field images are the main focus. The machine learning algorithm applied most is convolutional neural network (CNN). …”
  5. 145

    A forward-backward Kalman for the estimation of time-variant channels in OFDM by Al-Naffouri, T.Y.

    Published 2005
    “…In this paper, we propose an expectation-maximization (EM) algorithm for joint channel and data recovery. The algorithm makes use of the rich structure of the underlying communication problem-a structure induced by the data and channel constraints. …”
    Get full text
    Get full text
    article
  6. 146

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model by Ramesh Sundar (19326046)

    Published 2024
    “…The proposed approach of DDN is trained with proper data sequences used for communication and the training phase is conducted with the norms of numerous channel variants. …”
  7. 147

    Recovery of business intelligence systems by Haraty, Ramzi A.

    Published 2018
    “…The efficiency of the data recovery algorithm is substantial for e-healthcare systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 148

    A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem by Habchi, Wassim

    Published 2008
    “…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
    Get full text
    Get full text
    Get full text
    article
  9. 149

    An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM by Al-Naffouri, T.Y.

    Published 0000
    “…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …”
    Get full text
    Get full text
    article
  10. 150

    An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services by ALBARGHOTHI, ALI BAHA’EDDIN

    Published 2018
    “…Further, 414 automatic questions are tested on the QA algorithm using two methods, semantics-based and keyword-based. …”
    Get full text
  11. 151

    Vehicular-OBUs-As-On-Demand-Fogs by Sami, Hani

    Published 2020
    “…For instance, real-time vehicular applications require fast processing of the vast amount of generated data by vehicles in order to maintain service availability and reachability while driving. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 152

    A Biologicaly Inspired Decision Model for Multivariable Genetic- Fuzzy-AHP System by Kouatli, Issam

    Published 2016
    “…The proposed GFT mechanism can be applied to any decision making problem within an uncertain environment. One example would be the determination of CRM performance measurement given a variety of inputs related to marketing, data mining tools, ordered materials and communication.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  13. 153
  14. 154

    Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier by Syed Ali Jafar Zaidi (19563178)

    Published 2021
    “…Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …”
  15. 155

    Communications in electronic textile systems by Nakad, Z.

    Published 2017
    “…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 156

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura, Habiba

    Published 2023
    “…The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …”
    Get full text
    Get full text
    Get full text
    article
  17. 157

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…<p>The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …”
  18. 158
  19. 159

    Design and analysis of entropy-constrained reflected residual vector quantization by Mousa, W.A.H.

    Published 2002
    “…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …”
    Get full text
    Get full text
    article
  20. 160

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”