يعرض 901 - 920 نتائج من 1,002 نتيجة بحث عن '(((( data using algorithm ) OR ( based models algorithm ))) OR ( element method algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 901
  2. 902

    Online dynamic ensemble deep random vector functional link neural network for forecasting حسب Ruobin Gao (16003195)

    منشور في 2023
    "…<p>This paper proposes a three-stage online deep learning model for time series based on the ensemble deep random vector functional link (edRVFL). …"
  3. 903

    Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects حسب ALKAABI, ABDULLA

    منشور في 2023
    "…Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …"
    احصل على النص الكامل
  4. 904

    Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis حسب Hassan, Ali

    منشور في 2023
    "…Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 905

    Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis حسب Hassan Ali (3348749)

    منشور في 2023
    "…<p>Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
  6. 906
  7. 907

    Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis حسب Ashraf Gad (17040114)

    منشور في 2024
    "…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…"
  8. 908
  9. 909

    Dynamic single node failure recovery in distributed storage systems حسب Itani, M.

    منشور في 2017
    "…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 910

    Coalition game theoretic P2P trading in a distribution network integrity-ensured local energy market حسب M., Imran Azim

    منشور في 2023
    "…To do so, a coalition game theoretic-model is adopted to model the mutual trading interactions between participating purchasers and sellers in the LEM, in which energy is purchased/sold at a rate lower/higher than the business-as-usual purchase/sell price while the margin of the LEM operator is locked on. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 911

    Deepfakes Signatures Detection in the Handcrafted Features Space حسب Hamadene, Assia

    منشور في 2023
    "…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
    احصل على النص الكامل
  12. 912

    Optimal supercharge scheduling of electric vehicles حسب Atallah, Ribal F.

    منشور في 2018
    "…The distributed game-theoretical approach recorded promising results especially when compared to the well-known shortest job first scheduling algorithm. Further, unlike the other approaches, which normally are centralized and suited for offline scheduling, the game-based method is suited for online scheduling since it played at anytime a batch of EVs requests charging services. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 913
  14. 914
  15. 915

    A comparative analysis to forecast carbon dioxide emissions حسب Md. Omer Faruque (17545671)

    منشور في 2022
    "…Based on multivariate time series prediction, four deep learning algorithms are analyzed in this work, those are convolution neural network (CNN), CNN long short-term memory (CNN–LSTM), long short-term memory (LSTM), and dense neural network (DNN). …"
  16. 916

    Detection of statistically significant network changes in complex biological networks حسب Raghvendra Mall (581171)

    منشور في 2017
    "…Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…"
  17. 917

    Axes-Based Encryption Key حسب Haidar, Imane

    منشور في 2018
    "…For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  18. 918

    A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications حسب Sharafeddine, Sanaa

    منشور في 2011
    "…However, the computational as well as memory access requirements of compression algorithms could consume more energy than simply transmitting data uncompressed. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 919

    An XML Document Comparison Framework حسب Tekli, Joe

    منشور في 2001
    "…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 920

    Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System حسب Mohd Imran (12249782)

    منشور في 2025
    "…The proposed methodology not only ensures the protection of biometric data in storage but also facilitates secure data retrieval for authentication purposes. …"