بدائل البحث:
making algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
يعرض 641 - 660 نتائج من 786 نتيجة بحث عن '(((( data using algorithm ) OR ( based making algorithm ))) OR ( elements method algorithm ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 641
  2. 642
  3. 643
  4. 644
  5. 645

    Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers حسب Ali Sharida (17947847)

    منشور في 2023
    "…To develop the DT, a dense deep neural network (DNN) machine learning approach is used. The DT is trained offline using a set of experimental data and updated online to get the maximum possible accuracy. …"
  6. 646
  7. 647

    Artificial Intelligence (AI) based machine learning models predict glucose variability and hypoglycaemia risk in patients with type 2 diabetes on a multiple drug regimen who fast d... حسب Tarik Elhadd (5480393)

    منشور في 2020
    "…<h3>Objective</h3><p dir="ltr">To develop a machine-based algorithm from clinical and demographic data, physical activity and glucose variability to predict hyperglycaemic and hypoglycaemic excursions in patients with type 2 diabetes on multiple glucose lowering therapies who fast during Ramadan.…"
  8. 648
  9. 649

    Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks حسب Muhammed Al-Ali (16810677)

    منشور في 2023
    "…An optimal resource allocation scheme is proposed with two scenarios including a guaranteed fairness level and minimum data rate among eMBB users. In addition, a knapsack-inspired punctured resource allocation algorithm is proposed where the users’ channel qualities of both services are considered at each time slot leading to the most suitable Resource Block (RB) selection for puncturing in a way that minimizes the negative impact on eMBB performance. …"
  10. 650

    Social Network Analysis for Precise Friend Suggestion for Twitter by Associating Multiple Networks Using ML حسب Dharmendra Kumar Singh Singh (19517710)

    منشور في 2022
    "…<p dir="ltr">The main aim in this paper is to create a friend suggestion algorithm that can be used to recommend new friends to a user on Twitter when their existing friends and other details are given. …"
  11. 651

    Uplink Noma in UAV-Assisted IoT Networks حسب Mrad, Ali

    منشور في 2022
    "…Given the complexity of the problem and the incomplete knowledge about the environment, the problem is divided into two subproblems: the first models the UAV trajectory and the selection of the first device in the NOMA cluster at each time slot as a Markov Decision Process, and uses Proximal Policy Optimization to solve it. The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  12. 652

    A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks حسب Sakib Mahmud (15302404)

    منشور في 2025
    "…We present a structured taxonomy covering value-based, policy-based, actor-critic, model-based, and advanced multi-agent and multi-objective approaches, and link algorithms to tasks such as dispatch, microgrid coordination, real-time pricing, load balancing, and demand–response. …"
  13. 653

    Recent advances on artificial intelligence and learning techniques in cognitive radio networks حسب Abbas, Nadine

    منشور في 2015
    "…The literature survey is organized based on different artificial intelligence techniques such as fuzzy logic, genetic algorithms, neural networks, game theory, reinforcement learning, support vector machine, case-based reasoning, entropy, Bayesian, Markov model, multi-agent systems, and artificial bee colony algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 654

    Anonymizing multimedia documents حسب Haraty, Ramzi

    منشور في 2016
    "…In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify individuals. We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 655

    MoveSchedule حسب Zouein, Pierette

    منشور في 1995
    "…MoveSchedule is validated using realistic project data and its solution is qualitatively assessed by an experienced engineer on that project.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  16. 656

    Development of Machine Learning Models for Studying the Premixed Turbulent Combustion of Gas-To-Liquids (GTL) Fuel Blends حسب Abdellatif M. Sadeq (16931841)

    منشور في 2024
    "…In addition, the possible minimum and maximum values of responses at the corresponding operating parameters are found using a genetic algorithm (GA) approach. Model 1 could capture the computational fluid dynamics (CFD) outputs with high precision at different flame radiuses and time instants with a maximum absolute error percentage of 5.46%. …"
  17. 657
  18. 658

    Structural similarity evaluation between XML documents and DTDs حسب Tekli, J.

    منشور في 2007
    "…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  19. 659

    An Infrastructure-Assisted Crowdsensing Approach for On-Demand Traffic Condition Estimation حسب Abdul Rahman, Sawsan

    منشور في 2019
    "…However, the current solutions proposed for the use of crowdsensing for the collection of traffic related data adopt an opportunistic continuous sensing approach, which entails high resource consumption on the server and mobile device side, a high communication overhead, while offering little control of the users over the sensing activity. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 660

    Active distribution network type identification method of high proportion new energy power system based on source-load matching حسب Qinlin, Shi

    منشور في 2023
    "…Firstly, the typical daily output scenarios of DG are extracted by clustering method, and the generalized load curve model is solved by the optimization algorithm to obtain the source load operation data; Secondly, calculate the source-load matching indicators (including matching performance, matching degree, and matching rate) according to the source load data of each region, and identify the distribution network type according to the range of the index values; Finally, several indicators are introduced to quantify the characteristics of different types of distribution networks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article