يعرض 401 - 420 نتائج من 443 نتيجة بحث عن '(((( data models algorithm ) OR ( involves learning algorithm ))) OR ( elements data algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 401

    Could Petrol Stations Play a Key Role in Transportation Electrification? A GIS-Based Coverage Maximization of Fast EV Chargers in Urban Environment حسب Safak Bayram (16925975)

    منشور في 2022
    "…More specifically, the location problem is modelled as a maximum coverage location problem (MCLP) and solved using a geographic information system (GIS) based platform. …"
  2. 402

    Prediction the performance of multistage moving bed biological process using artificial neural network (ANN) حسب Fares Almomani (12585685)

    منشور في 2020
    "…To cope with this difficult task and perform an effective and well-controlled BP operation, an artificial neural network (ANN) algorithm was developed to simulate, model, and control a three-stage (anaerobic/anoxic and MBBR) enhanced nutrient removal biological process (ENR-BP) challenging real wastewater. …"
  3. 403

    ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks حسب Muhammad Asif Khan (7367468)

    منشور في 2022
    "…In this paper, we propose data-driven machine learning (ML) schemes to efficiently solve these problems in wireless LAN (WLAN) networks. …"
  4. 404

    Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO حسب Majedeh Gheytanzadeh (17541927)

    منشور في 2022
    "…The primary purpose of this study is to establish a new model through machine learning methods; namely, adaptive neuro-fuzzy inference system (ANFIS) combined with particle swarm optimization (PSO) and genetic algorithm (GA) for the prediction of *CO (the key intermediate) adsorption energy as the efficiency metric. …"
  5. 405

    CEAP حسب Abdel Wahab, Omar

    منشور في 2016
    "…To reduce the overhead of the proposed detection model and make it feasible for the resource-constrained nodes, we reduce the size of the training dataset by (1) restricting the data collection, storage, and analysis to concern only a set of specialized nodes (i.e., Multi-Point Relays) that are responsible for forwarding packets on behalf of their clusters; and (2) migrating only few tuples (i.e., support vectors) from one detection iteration to another. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 406

    PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits حسب Hind Almerekhi (7434776)

    منشور في 2022
    "…Before finding toxicity triggers, we built and evaluated various machine learning models to detect toxicity from Reddit comments. Subsequently, we used our best-performing model, a fine-tuned Bidirectional Encoder Representations from Transformers (BERT) model that achieved an area under the receiver operating characteristic curve (AUC) score of 0.983 to detect toxicity. …"
  7. 407

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review حسب Yasir Ali (799969)

    منشور في 2023
    "…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …"
  8. 408

    Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images حسب Rehan Raza (17019105)

    منشور في 2023
    "…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …"
  9. 409

    Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis حسب Ashraf Gad (17040114)

    منشور في 2024
    "…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…"
  10. 410
  11. 411

    Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer حسب Andrea Remo (447375)

    منشور في 2015
    "…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …"
  12. 412
  13. 413

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices حسب Neder Karmous (19743430)

    منشور في 2024
    "…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
  14. 414

    Adaptive Federated Learning Architecture To Mitigate Non-IID Through Multi-Objective GA-Based Efficient Client Selection حسب Ajaj, Mohamad

    منشور في 2024
    "…Existing solutions still have several constraints leading to suboptimal model performance and slow convergence. In this paper, we propose a novel approach that incorporates genetic algorithms with an enhanced client selection strategy, utilizing client metadata rather than raw data. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  15. 415

    A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications حسب Sharafeddine, Sanaa

    منشور في 2011
    "…However, the computational as well as memory access requirements of compression algorithms could consume more energy than simply transmitting data uncompressed. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 416

    Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings حسب Ahmad Yaser Alhaddad (7017434)

    منشور في 2022
    "…Testing the best model with data acquired from children performing interactions with toys produced a promising performance for the shake and throw behaviours. …"
  17. 417

    A fine-grained XML structural comparison approach حسب Tekli, Joe

    منشور في 2007
    "…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  18. 418

    A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks حسب Sakib Mahmud (15302404)

    منشور في 2025
    "…This review synthesizes evidence from more than 500 peer-reviewed studies published between 2020 and 2026, mapping DRL applications across distributed generation, transmission, distribution, energy storage systems, energy markets, local energy management, grid security, and data privacy. We present a structured taxonomy covering value-based, policy-based, actor-critic, model-based, and advanced multi-agent and multi-objective approaches, and link algorithms to tasks such as dispatch, microgrid coordination, real-time pricing, load balancing, and demand–response. …"
  19. 419

    A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass حسب Uzma Nawaz (21980708)

    منشور في 2025
    "…By synthesizing findings across various data sources and model architectures, we offer critical insights into the selection of context-aware algorithms and identify key research gaps, an essential step for advancing the reliability and applicability of AI-driven seagrass conservation efforts.…"
  20. 420

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…"