بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
testing algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data testing » data using (توسيع البحث)
يعرض 101 - 120 نتائج من 445 نتيجة بحث عن '(((( data processing algorithm ) OR ( data testing algorithm ))) OR ( elements method algorithm ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 101

    Design of adaptive arrays based on element position perturbations حسب Dawoud, M.M.

    منشور في 1993
    "…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 102

    Machine Learning Approach for the Design of an Assessment Outcomes Recommendation System حسب Abu Zitar, Raed

    منشور في 2021
    "…It is believed that the evaluation of the outcomes of the course, based on grades, is necessary to improve the teaching and learning process. Our research processes and workflows supported by AI utilize machine learning technology in order to interpret big data, analyze broad data sets and recognize associations with more reliably. …"
    احصل على النص الكامل
    احصل على النص الكامل
  3. 103

    Machine learning based approaches for intelligent adaptation and prediction in banking business processes. (c2018) حسب Tay, Bilal M.

    منشور في 2018
    "…Companies, nowadays, rely on systems and applications to automate their business processes and data management. In this context, the notion of integrating machine learning techniques in banking business processes has emerged, where trainable computational algorithms can be improved by learning. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  4. 104

    Topics in graph algorithms حسب Abu-Khzam, Faisal Nabih

    منشور في 2003
    "…This is achieved by implementing some algorithms for the vertex cover problem, and conducting experiments on real data sets. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  5. 105
  6. 106
  7. 107
  8. 108
  9. 109

    C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments حسب Raun, Kristo

    منشور في 2023
    "…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  10. 110
  11. 111
  12. 112

    Severity-Based Prioritized Processing of Packets with Application in VANETs حسب Ala Al-Fuqaha (4434340)

    منشور في 2019
    "…Also, the proposed heuristic is tested against a non-prioritized processing algorithm that works using first come first served policy. …"
  13. 113

    Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data حسب Rajesh Kumar Dhanaraj (19646269)

    منشور في 2021
    "…In addition, for grouping similar antipatterns, a clustering process was performed to eradicate the design errors. …"
  14. 114

    Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation حسب Hariprasath Manoharan (14157966)

    منشور في 2023
    "…Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …"
  15. 115

    Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las... حسب Masurkar, Faeez

    منشور في 2020
    "…In view of this, an innovative signal processing technique called a self-adaptive-smart algorithm (SASA) was designed and developed. …"
    احصل على النص الكامل
  16. 116

    Bee Colony Algorithm for Proctors Assignment. حسب Mansour, Nashat

    منشور في 2015
    "…The Bee Colony algorithm is a recent population-based search algorithm that mimics the natural behavior of swarms of honey bees during the process of collecting food. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 117

    Oversampling techniques for imbalanced data in regression حسب Samir Brahim Belhaouari (9427347)

    منشور في 2024
    "…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …"
  18. 118

    Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn... حسب Mohamed, AlShuweihi

    منشور في 2020
    "…A special consideration was given to data pre-processing and dimensionality reduction such Chi Squared (CS) and Recursive Feature Elimination (RFE) to improve progressively the proposed models performance. …"
    احصل على النص الكامل
  19. 119

    Unsupervised outlier detection in multidimensional data حسب Atiq ur Rehman (14153391)

    منشور في 2022
    "…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. …"
  20. 120

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment حسب Zakaria Tolba (16904718)

    منشور في 2022
    "…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"