يعرض 521 - 540 نتائج من 549 نتيجة بحث عن '(((( data processing algorithm ) OR ( data models algorithm ))) OR ( element mapping algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 521
  2. 522

    Dynamic single node failure recovery in distributed storage systems حسب Itani, M.

    منشور في 2017
    "…We selected fractional repetition coding due to its simple repair mechanism that minimizes the repair and disk access bandwidths together with the property of un-coded repair process. To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 523

    ISSP حسب Zouein, P.P.

    منشور في 2017
    "…Many decision-support tools were developed to assist planners in space scheduling but these were limited to providing the user with a platform that ties spatial and temporal data in the project and left it up to the user to decide on positions of resources and schedule adjustments to solve spatial conflicts that may arise in the process of constructing site layouts over time.The ISSP system, presented here, provides a graphical user-interactive interface with underlying layout and scheduling algorithms that construct feasible layout and schedule solutions under 2-dimensional spatial constraints between resources. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  4. 524

    The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation حسب Getahun, Fekade

    منشور في 2007
    "…We particularly discuss multimedia primary horizontal fragmentation and focus on semantic-based textual predicates implication required as a pre-process in current fragmentation algorithms in order to partition multimedia data efficiently. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  5. 525
  6. 526

    Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings حسب Ahmad Yaser Alhaddad (7017434)

    منشور في 2022
    "…Testing the best model with data acquired from children performing interactions with toys produced a promising performance for the shake and throw behaviours. …"
  7. 527

    A fine-grained XML structural comparison approach حسب Tekli, Joe

    منشور في 2007
    "…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  8. 528

    A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks حسب Sakib Mahmud (15302404)

    منشور في 2025
    "…This review synthesizes evidence from more than 500 peer-reviewed studies published between 2020 and 2026, mapping DRL applications across distributed generation, transmission, distribution, energy storage systems, energy markets, local energy management, grid security, and data privacy. We present a structured taxonomy covering value-based, policy-based, actor-critic, model-based, and advanced multi-agent and multi-objective approaches, and link algorithms to tasks such as dispatch, microgrid coordination, real-time pricing, load balancing, and demand–response. …"
  9. 529

    Towards Multimedia Fragmentation حسب Saad, Samir

    منشور في 2006
    "…Database fragmentation is a process for reducing irrelevant data accesses by grouping data frequently accessed together in dedicated segments. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  10. 530

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…"
  11. 531

    Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations حسب Md Mosarrof Hossen (21399056)

    منشور في 2025
    "…Leveraging FL enables efficient model training across diverse end-user applications while preserving data privacy. …"
  12. 532
  13. 533

    Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic حسب Saeed Al-Maroof, Rana

    منشور في 2020
    "…The study has made use of Google Meet© as an educational social platform in private higher education institutes. The data obtained from the study were analyzed by using the partial least squares structural equation modeling (PLS-SEM) and machine learning algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
  14. 534
  15. 535

    Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks حسب Abbas, Nadine

    منشور في 2018
    "…Traffic offloading via device-to-device communications is expected to play a major role to meet the exponential data traffic growth in wireless networks. In this work, we focus on the problem of user capacity maximization in ultra dense heterogeneous networks with device-to-device cooperation, where a large number of users in a given geographical area request common data content, such as video on demand streaming, with strict quality of service guarantees. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 536

    Single-Cell Transcriptome Analysis Revealed Heterogeneity and Identified Novel Therapeutic Targets for Breast Cancer Subtypes حسب Radhakrishnan Vishnubalaji (3563306)

    منشور في 2023
    "…In the current study, we employed computational algorithms to decipher the cellular composition of estrogen receptor-positive (ER<sup>+</sup>), HER2<sup>+</sup>, ER<sup>+</sup>HER2<sup>+</sup>, and triple-negative BC (TNBC) subtypes from a total of 49,899 single cells’ publicly available transcriptomic data derived from 26 BC patients. …"
  17. 537

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…An attacker can easily capture data from the available network channel and use it for their own purpose. …"
  18. 538

    Dynamic multiple node failure recovery in distributed storage systems حسب Itani, May

    منشور في 2018
    "…Our daily lives are getting more and more dependent on data centers and distributed storage systems in general, whether at the business or at the personal level. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 539

    THE FUTURE OF MEDICINE, healthcare innovation through precision medicine: policy case study of Qatar حسب M. Walid Qoronfleh (14153088)

    منشور في 2020
    "…Consequently, the big data revolution has provided an opportunity to apply artificial intelligence and machine learning algorithms to mine such a vast data set. …"
  20. 540

    The Impact of AI on Decision-Making in Educational Management: Benefits, Risks, and Ethical Concerns حسب JA’AROUN, WAED YOUSEF

    منشور في 2024
    "…However, the adoption of AI also presents challenges, including potential biases in algorithms, privacy concerns, and the risk of an over-reliance on automated systems. …"
    احصل على النص الكامل