Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data making » data mining (Expand Search)
element » elements (Expand Search)
Showing 161 - 180 results of 243 for search '(((( data making algorithm ) OR ( found modeling algorithm ))) OR ( element method algorithm ))*', query time: 0.14s Refine Results
  1. 161

    Developing an online hate classifier for multiple social media platforms by Joni Salminen (7434770)

    Published 2020
    “…However, at the same time, this has resulted in the emergence of conflict and hate, making online environments uninviting for users. Although researchers have found that hate is a problem across multiple platforms, there is a lack of models for online hate detection using multi-platform data. …”
  2. 162

    Communications in electronic textile systems by Nakad, Z.

    Published 2017
    “…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 163

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura, Habiba

    Published 2023
    “…The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …”
    Get full text
    Get full text
    Get full text
    article
  4. 164

    Soft Sensor for NOx Emission using Dynamical Neural Network by Shakil, M.

    Published 2020
    “…Principal Component Analysis (PCA) is used to reduce number of input variables. Lag space for the model is found by using genetic algorithm to find the best time delayed model. …”
    Get full text
    article
  5. 165

    Lung nodule classification utilizing support vector machines by Mousa, W.A.H.

    Published 2002
    “…Many methods have been proposed in the literature such as neural network algorithms. Recently, support vector machines (SVMs) had received increasing attention for pattern recognition. …”
    Get full text
    Get full text
    article
  6. 166

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…<p>The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …”
  7. 167
  8. 168

    Parallel processing by Mansour, Nashat

    Published 2005
    “…The parallel genetic algorithm is based on a model of natural evolution. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 169
  10. 170

    A new method of analysis for slender columns by Zdenek, P.

    Published 1991
    “…The method consists of a simple incremental-loading algorithm that traces the load-deflection curve at constant eccentricity of the axial load. …”
    Get full text
    Get full text
    article
  11. 171
  12. 172

    The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation by Getahun, Fekade

    Published 2007
    “…We particularly discuss multimedia primary horizontal fragmentation and focus on semantic-based textual predicates implication required as a pre-process in current fragmentation algorithms in order to partition multimedia data efficiently. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 173

    Scrambled Prime Key Encryption by Haraty, Ramzi A.

    Published 2018
    “…To enhance data security different cryptographic algorithms are used. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 174

    Fracture and stability of strain-softening materials and structures by Tabbara, Mazen

    Published 1990
    “…The model is shown to realistically simulate the evolution of cracking and its localization. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  15. 175

    Integrative toxicogenomics: Advancing precision medicine and toxicology through artificial intelligence and OMICs technology by Ajay Vikram Singh (204056)

    Published 2023
    “…As personalized medicine and toxicogenomics involve huge data processing, AI can expedite this process by providing powerful data processing, analysis, and interpretation algorithms. …”
  16. 176

    DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins by Samir Brahim, Belhaouari

    Published 2025
    “…This method offers precise endotoxin classification and holds significant potential for expedited medical diagnoses and therapeutic decision-making in cases of pathogenic infections. ConclusionWe present the effectiveness of DeepRaman, an innovative architecture inspired by the Progressive Fourier Transform and integrated with the scalogram transformation method, in classifying raw SERS Raman spectral data from biological specimens with unparalleled accuracy relative to conventional machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  17. 177
  18. 178

    Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations by Gutub, Adnan

    Published 2007
    “…This paper presents the design and implementation of an elliptic curve cryptographic core to realize point scalar multiplication operations used for the GF(p) elliptic curve encryption/decryption and the elliptic curve digital signature algorithm (ECDSA). The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …”
    Get full text
    Get full text
    article
  19. 179
  20. 180