يعرض 521 - 540 نتائج من 715 نتيجة بحث عن '(((( data processing algorithm ) OR ( data using algorithm ))) OR ( element would algorithm ))', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 521

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…Accordingly security threats and data banks attacks turn out to be a phenomenon. Thus, granting protection to such crucial information becomes a high demand. …"
    احصل على النص الكامل
  2. 522
  3. 523

    Benchmarking Concept Drift Detectors for Online Machine Learning حسب Mahgoub, Mahmoud

    منشور في 2022
    "…The main task is to detect changes in data distribution that might cause changes in the decision bound aries for a classification algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  4. 524

    Clustering Tweets to Discover Trending Topics about دبي (Dubai) حسب ALYALYALI, SALAMA KHAMIS SALEM KHAMIS

    منشور في 2018
    "…Then, creating a word vector to the tweets by using TF-IDF methodology. After this, log results into k- mean clustering algorithm with cosine similarity to measure similarity between objects of each cluster. …"
    احصل على النص الكامل
  5. 525

    CEAP حسب Abdel Wahab, Omar

    منشور في 2016
    "…The first challenge is related to the highly mobile nature of vehicles that complicates the processes of monitoring, buffering, and analyzing observations on these vehicles as they are continuously moving and changing their locations. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 526

    DASSI: differential architecture search for splice identification from DNA sequences حسب Shabir Moosa (14153316)

    منشور في 2022
    "…<h2>Background</h2> <p>The data explosion caused by unprecedented advancements in the field of genomics is constantly challenging the conventional methods used in the interpretation of the human genome. …"
  7. 527

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security حسب Shitharth Selvarajan (14157976)

    منشور في 2024
    "…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …"
  8. 528

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 529

    Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects حسب ALKAABI, ABDULLA

    منشور في 2023
    "…Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …"
    احصل على النص الكامل
  10. 530

    A new estimator and approach for estimating the subpopulation parameters حسب Mohammad Salehi M. (21259490)

    منشور في 2021
    "…The criterion shows that the traditional total subpopulation estimator for unknown subpopulation size will be more efficient if the subpopulation mean is close to zero. Using an innovative procedure, we develop a new estimator, and we study its properties using real data. …"
  11. 531

    Starvation Problem in CPU Scheduling for Multimedia Systems حسب Salah, Khaled

    منشور في 2002
    "…Multimedia applications have timing requirements that cannot generally be satisfied using the time-sharing algorithms of general-purpose operating systems. …"
    احصل على النص الكامل
    article
  12. 532

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
  13. 533

    Dynamic single node failure recovery in distributed storage systems حسب Itani, M.

    منشور في 2017
    "…We selected fractional repetition coding due to its simple repair mechanism that minimizes the repair and disk access bandwidths together with the property of un-coded repair process. To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 534

    NEURAL NETWORK MODEL FOR PLANNED REPLACEMENT OF BOEING 737 BRAKES حسب Al-Garni, Ahmed Z.

    منشور في 2020
    "…Three years of data are used for model building and validation. …"
    احصل على النص الكامل
    article
  15. 535

    A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications حسب Sharafeddine, Sanaa

    منشور في 2011
    "…However, the computational as well as memory access requirements of compression algorithms could consume more energy than simply transmitting data uncompressed. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 536

    Integrative toxicogenomics: Advancing precision medicine and toxicology through artificial intelligence and OMICs technology حسب Ajay Vikram Singh (204056)

    منشور في 2023
    "…As personalized medicine and toxicogenomics involve huge data processing, AI can expedite this process by providing powerful data processing, analysis, and interpretation algorithms. …"
  17. 537
  18. 538

    Reconstruction and simulation of neocortical microcircuitry حسب Khazen, Georges

    منشور في 2015
    "…We present a first-draft digital reconstruction of the microcircuitry of somatosensory cortex of juvenile rat. The reconstruction uses cellular and synaptic organizing principles to algorithmically reconstruct detailed anatomy and physiology from sparse experimental data. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 539

    FAILURE RATE ANALYSIS OF BOEING 737 BRAKES EMPLOYING NEURAL NETWORK حسب Al-Garni, Ahmed Z.

    منشور في 2007
    "…Three years of data are used for model building and validation. …"
    احصل على النص الكامل
    article
  20. 540

    SemIndex: Semantic-Aware Inverted Index حسب Chbeir, Richard

    منشور في 2017
    "…We provide here a new approach, called SemIndex, that extends the standard inverted index by constructing a tight coupling inverted index graph that combines two main resources: a general purpose semantic network, and a standard inverted index on a collection of textual data. We also provide an extended query model and related processing algorithms with the help of SemIndex. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject