بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
update » updated (توسيع البحث)
يعرض 861 - 880 نتائج من 880 نتيجة بحث عن '(((( data processing algorithm ) OR ( model using algorithm ))) OR ( elements update algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 861

    ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks حسب Muhammad Asif Khan (7367468)

    منشور في 2022
    "…Due to the complex nature of the radio environment, analytical models may not characterize the wireless channel, which makes the solution of these problems very difficult. …"
  2. 862

    Optimal Trajectory and Positioning of UAVs for Small Cell HetNets: Geometrical Analysis and Reinforcement Learning Approach حسب Mohammad Taghi Dabiri (16904658)

    منشور في 2023
    "…We then formulate the problem for UAV trajectory to minimize the maximum outage probability (OP) of directional THz links. Then, using geometrical analysis and deep reinforcement learning (RL) method, we propose several algorithms to find the optimal trajectory and select an optimal pattern during the trajectory. …"
  3. 863
  4. 864
  5. 865

    Reliability of artificial intelligence in predicting total knee arthroplasty component sizes: a systematic review حسب Loay A. Salman (14150322)

    منشور في 2023
    "…All included studies were published between 2021 and 2022, with a total of nine different AI algorithms reported. Among these AI models, the accuracy of TKA femoral component sizing prediction ranged from 88.3 to 99.7% within a deviation of one size, while tibial component sizing exhibited an accuracy ranging from 90 to 99.9% ± 1 size.…"
  6. 866

    Seasonal variations in feed-water chemistry and fouling dynamics of reverse-osmosis systems: A global climate lens حسب Nasser Zareei (22921226)

    منشور في 2025
    "…Future installations should align membrane materials, pretreatment systems, and control algorithms with site-specific hydrological calendars.…"
  7. 867

    A fine-grained XML structural comparison approach حسب Tekli, Joe

    منشور في 2007
    "…Most of them make use of techniques for finding the edit distance between tree structures, XML documents being modeled as ordered labeled trees. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  8. 868

    Systematic reviews in sentiment analysis: a tertiary study حسب Alexander Ligthart (14150871)

    منشور في 2022
    "…Different features, algorithms, and datasets used in sentiment analysis models are mapped. …"
  9. 869

    Precision nutrition: A systematic literature review حسب Daniel Kirk (17302798)

    منشور في 2021
    "…Models were through the use of four groups of approaches and 23 evaluation metrics. …"
  10. 870

    The architecture of a highly reconfigurable RISC dataflow array processor حسب Sait, Sadiq M.

    منشور في 2020
    "…This processor forms an element of a processor array which possess the features of both static and dynamic dataflow models. The array can be programmed to execute arbitrary algorithms in both static and dynamic manner. …"
    احصل على النص الكامل
    article
  11. 871
  12. 872

    Comparative Study on Arabic Text Classification: Challenges and Opportunities حسب Abualigah, Laith

    منشور في 2022
    "…This paper presents a comparative study based on a list of chosen published papers that focus on improving Arabic text classifications, to highlight the given models and the used classifiers besides discussing the faced challenges in these types of researches, then this paper proposes the expected research opportunities in the field of text classification research. …"
    احصل على النص الكامل
  13. 873
  14. 874

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices حسب Neder Karmous (19743430)

    منشور في 2024
    "…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
  15. 875

    From low-cost sensors to high-quality data: A summary of challenges and best practices for effectively calibrating low-cost particulate matter mass sensors حسب Michael R. Giordano (9976173)

    منشور في 2021
    "…The methods for correcting and calibrating these biases and dependencies that have been used in the literature likewise range from simple linear and quadratic models to complex machine learning algorithms. …"
  16. 876

    Approximate XML structure validation based on document–grammar tree similarity حسب Tekli, Joe

    منشور في 2015
    "…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 877

    Approximate XML structure validation technical report حسب Tekli, Joe

    منشور في 2014
    "…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 878

    Capillary trapping in mixed-wet porous media: Implications for subsurface carbon dioxide sequestration حسب Saideep Pavuluri (21792941)

    منشور في 2025
    "…Insights from this study can be used for improving pore network models and training machine learning algorithms.…"
  19. 879

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review حسب Yasir Ali (799969)

    منشور في 2023
    "…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …"
  20. 880