Search alternatives:
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
using algorithms » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
Showing 641 - 660 results of 751 for search '(((( data models algorithm ) OR ( data using algorithms ))) OR ( elements method algorithm ))', query time: 0.11s Refine Results
  1. 641

    Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review by Yazeed Yasin Ghadi (16667109)

    Published 2024
    “…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …”
  2. 642
  3. 643

    DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins by Samir Brahim, Belhaouari

    Published 2025
    “…ConclusionWe present the effectiveness of DeepRaman, an innovative architecture inspired by the Progressive Fourier Transform and integrated with the scalogram transformation method, in classifying raw SERS Raman spectral data from biological specimens with unparalleled accuracy relative to conventional machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  4. 644
  5. 645

    An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM by Al-Naffouri, T.Y.

    Published 0000
    “…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …”
    Get full text
    Get full text
    article
  6. 646

    Comprehensive whole genome sequence analyses yields novel genetic and structural insights for Intellectual Disability by Farah R. Zahir (18892108)

    Published 2017
    “…The <i>de novo</i> assembly resulted in unmasking hidden genome instability that was missed by standard re-alignment based algorithms. We also interrogated regulatory sequence variation for known and hypothesized ID genes and present useful strategies for WGS data analyses for non-coding variation.…”
  7. 647

    Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants by Shafiq, M.

    Published 2006
    “…The U-model is utilized to design an adaptive inverse controller by using a simple root-solving algorithm of Newton-Raphson. The synergy of U-model with AIC structure has provided an effective and straight forward method for adaptive tracking of nonlinear plants. …”
    Get full text
    Get full text
    article
  8. 648

    An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems by Abdel-Salam, Mahmoud

    Published 2024
    “…The primary goals of feature selection are to decrease the number of dimensions and enhance classification accuracy in many domains, such as text classification, large-scale data analysis, and pattern recognition. Several metaheuristics, such as the Genghis Khan Shark Optimizer Algorithm (GKSO), can assist in optimizing the FS issue. …”
    Get full text
  9. 649

    A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem by Habchi, Wassim

    Published 2008
    “…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
    Get full text
    Get full text
    Get full text
    article
  10. 650
  11. 651
  12. 652

    Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework by Tayyabah Hasan (18427887)

    Published 2022
    “…After selecting the most appropriate lattice map (32 × 32) in 750,000 iterations using SOMs, the data points below the dark blue region are mapped onto the data frame to get the videos. …”
  13. 653

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions by Abdulmalik Alwarafy (17984104)

    Published 2022
    “…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
  14. 654

    Multilayer perceptron-based DFE with lattice structure by Zerguine,, Azzedine

    Published 2001
    “…It is shown from computer simulations that whitening the received data employing adaptive lattice channel equalization algorithms improves the convergence rate and bit error rate performances of multilayer perceptron-based DFE. …”
    article
  15. 655

    Multilayer perceptron-based DFE with lattice structure by Zerguine, A.

    Published 2001
    “…It is shown from computer simulations that whitening the received data employing adaptive lattice channel equalization algorithms improves the convergence rate and bit error rate performances of multilayer perceptron-based DFE. …”
    Get full text
    Get full text
    article
  16. 656

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…An attacker can easily capture data from the available network channel and use it for their own purpose. …”
  17. 657

    Role of authentication factors in Fin-tech mobile transaction security by Habib Ullah Khan (12024579)

    Published 2023
    “…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
  18. 658

    Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements by Emara-Shabaik, Husam

    Published 2020
    “…A model is proposed to identify the parameters of a class of stochastic nonlinearsystems. …”
    Get full text
    article
  19. 659

    Resilience analytics: coverage and robustness in multi-modal transportation networks by Abdelkader Baggag (14153040)

    Published 2018
    “…<p>A multi-modal transportation system of a city can be modeled as a multiplex network with different layers corresponding to different transportation modes. …”
  20. 660

    Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles by Warren, Thomas

    Published 2000
    “…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
    Get full text
    Get full text
    Get full text
    article