يعرض 681 - 700 نتائج من 786 نتيجة بحث عن '(((( data using algorithm ) OR ( based making algorithm ))) OR ( element method algorithm ))', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 681

    Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects حسب ALKAABI, ABDULLA

    منشور في 2023
    "…Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …"
    احصل على النص الكامل
  2. 682

    Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations حسب Md Mosarrof Hossen (21399056)

    منشور في 2025
    "…<p>Human behavior significantly impacts domestic energy consumption, making it essential to monitor and improve these consumption patterns. …"
  3. 683

    Deep Learning in Smart Grid Technology: A Review of Recent Advancements and Future Prospects حسب Mohamed Massaoudi (16888710)

    منشور في 2021
    "…In this context, SG stands tied very closely to Deep Learning (DL) as an emerging technology for creating a more decentralized and intelligent energy paradigm while integrating high intelligence in supervisory and operational decision-making. Motivated by the outstanding success of DL-based prediction methods, this article attempts to provide a thorough review from a broad perspective on the state-of-the-art advances of DL in SG systems. …"
  4. 684
  5. 685

    An efficient cache replacement strategy for the hybrid cache consistency approach حسب Haraty, Ramzi A.

    منشور في 2010
    "…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 686
  7. 687
  8. 688

    Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis حسب Ashraf Gad (17040114)

    منشور في 2024
    "…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…"
  9. 689
  10. 690
  11. 691
  12. 692
  13. 693

    Dynamic single node failure recovery in distributed storage systems حسب Itani, M.

    منشور في 2017
    "…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 694
  15. 695

    Fine-grain watermarking for intellectual property protection حسب Stefano Giovanni Rizzo (18615112)

    منشور في 2019
    "…In particular, the embedding and extraction algorithms allow to continuously protect the watermark through the whole document in a fine-grain fashion. …"
  16. 696

    Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer حسب Andrea Remo (447375)

    منشور في 2015
    "…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …"
  17. 697

    Artificial Intelligence for Skin Cancer Detection: Scoping Review حسب Abdulrahman Takiddin (14153181)

    منشور في 2021
    "…Hence, to aid in diagnosing skin cancer, artificial intelligence (AI) tools are being used, including shallow and deep machine learning–based methodologies that are trained to detect and classify skin cancer using computer algorithms and deep neural networks.…"
  18. 698

    Scatter search technique for exam timetabling حسب Mansour, Nashat

    منشور في 2011
    "…We evaluate our suggested technique on real-world university data and compare our results with the registrar’s manual timetable in addition to the timetables of other heuristic optimization algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 699

    Axes-Based Encryption Key حسب Haidar, Imane

    منشور في 2018
    "…For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  20. 700

    Adaptive PPO With Multi-Armed Bandit Clipping and Meta-Control for Robust Power Grid Operation Under Adversarial Attacks حسب Mohamed Massaoudi (16888710)

    منشور في 2025
    "…This paper proposes a novel composite enhanced proximal policy optimization (CePPO) algorithm to improve power grid operation under adversarial conditions. …"