يعرض 781 - 800 نتائج من 888 نتيجة بحث عن '(((( data processing algorithm ) OR ( models using algorithm ))) OR ( element data algorithm ))*', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 781
  2. 782
  3. 783

    Investigating the Impact of Skylights and Atrium Configurations on Visual Comfort and Daylight Performance in Dubai Shopping Malls حسب SANAD, AYMAN ADEL AHMED

    منشور في 2025
    "…Field measurements and computer simulations are conducted to model and validate daylight performance. Annual simulations are used to assess seasonal variations, while sensitivity analysis identifies key parameters. …"
    احصل على النص الكامل
  4. 784

    Control of cardiac alternans by mechanical and electrical feedback حسب Yapari, Felicia

    منشور في 2014
    "…Complimentary to these studies, a three variable Nash-Panfilov model is used to investigate alternans annihilation via mechanical (or stretch) perturbations. …"
    احصل على النص الكامل
    article
  5. 785

    Resources Allocation for Drones Tracking Utilizing Agent-Based Proximity Policy Optimization حسب De Rochechouart, Maxence

    منشور في 2023
    "…In particular, the Proximity Policy Optimization (PPO) reinforcement algorithm is used to discover a policy for sensor selection that results in optimum sensor resource allocation. …"
    احصل على النص الكامل
  6. 786
  7. 787

    Multi-Classifier Tree With Transient Features for Drift Compensation in Electronic Nose حسب Atiq Ur Rehman (8843024)

    منشور في 2020
    "…These electronic instruments rely on Machine Learning (ML) algorithms for recognizing the sensed odors. The effect of long-term drift influences the performance of ML algorithms and the models those are trained on drift free data fail to perform on the drifted data. …"
  8. 788

    Improving the security of SNMP in wireless networks حسب Otrok, H.

    منشور في 2017
    "…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). Symmetric cryptography is used for encryption and one-way cryptography is used for authentication. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  9. 789
  10. 790

    Computational evluation of protein energy functions حسب Mansour, Nashat

    منشور في 2014
    "…Our findings show that the CHARMM energy model tends to be more appropriate for ab initio computational techniques that predict protein structures. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  11. 791
  12. 792
  13. 793
  14. 794

    A machine learning approach for localization in cellular environments حسب Abdallah, Ali A.

    منشور في 2018
    "…The proposed approach only assumes knowledge of RSS fingerprints of the environment, and does not require knowledge of the cellular base transceiver station (BTS) locations, nor uses any RSS mathematical model. The proposed localization scheme integrates a weighted K-nearest neighbor (WKNN) and a multilayer neural network. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  15. 795
  16. 796

    The architecture of a highly reconfigurable RISC dataflow array processor حسب Sait, Sadiq M.

    منشور في 2020
    "…This processor forms an element of a processor array which possess the features of both static and dynamic dataflow models. The array can be programmed to execute arbitrary algorithms in both static and dynamic manner. …"
    احصل على النص الكامل
    article
  17. 797
  18. 798

    Wearable Artificial Intelligence for Anxiety and Depression: Scoping Review حسب Alaa Abd-alrazaq (17058018)

    منشور في 2023
    "…The most frequently used data set from open sources was Depresjon. The most commonly used algorithm was random forest, followed by support vector machine.…"
  19. 799

    Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis حسب Ashraf Gad (17040114)

    منشور في 2024
    "…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…"
  20. 800

    Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis حسب Hassan, Ali

    منشور في 2023
    "…Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article