Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
element » elements (Expand Search)
Showing 341 - 360 results of 715 for search '(((( data using algorithm ) OR ( data processing algorithm ))) OR ( element rd algorithm ))', query time: 0.13s Refine Results
  1. 341
  2. 342

    Cutting‐edge technologies for detecting and controlling fish diseases: Current status, outlook, and challenges by Sk Injamamul Islam (14111241)

    Published 2024
    “…Here, we highlighted the potential of machine learning algorithms in early pathogen detection and the possibilities of intelligent aquaculture in controlling disease outbreaks at the farm level. …”
  3. 343
  4. 344

    Tracking and repairing damaged healthcare databases using the matrix by Haraty, Ramzi A.

    Published 2015
    “…The algorithm is based on data dependency and uses a single matrix. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 345

    Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations by Shameem A. Puthiya Parambath (14150997)

    Published 2022
    “…The best available recommendation algorithms are based on using the observed preference information among collaborating entities. …”
  6. 346

    Diagnosing failed distribution transformers using neural networks by Farag, A.S.

    Published 2001
    “…The ANN was trained utilizing backpropagation algorithm using a real (out of the field) data obtained from utilities distribution networks transformer's failures. …”
    Get full text
    Get full text
    article
  7. 347
  8. 348

    Plant disease detection using drones in precision agriculture by Ruben Chin (17725986)

    Published 2023
    “…Color-infrared (CIR) images are the most preferred data used and field images are the main focus. The machine learning algorithm applied most is convolutional neural network (CNN). …”
  9. 349

    Cyberbullying Detection in Arabic Text using Deep Learning by ALBAYARI, REEM RAMADAN SA’ID

    Published 2023
    “…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …”
    Get full text
  10. 350

    LDSVM: Leukemia Cancer Classification Using Machine Learning by Abdul Karim (417009)

    Published 2022
    “…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …”
  11. 351

    Building power consumption datasets: Survey, taxonomy and future directions by Yassine Himeur (14158821)

    Published 2020
    “…Furthermore, data collection platforms and related modules for data transmission, data storage and privacy concerns used in different datasets are also analyzed and compared. …”
  12. 352

    Multi-Agent Meta Reinforcement Learning for Reliable and Low-Latency Distributed Inference in Resource-Constrained UAV Swarms by Marwan Dhuheir (19170898)

    Published 2025
    “…A key requirement in these applications is minimizing the latency of data processing, particularly for time-sensitive tasks like image classification of IIoT device data. …”
  13. 353

    Efficient Seismic Volume Compression using the Lifting Scheme by Khene, M. F.

    Published 2000
    “…As the approximation coefficients represent a smooth low-resolution version of the input data they are only quantized using a uniform scalar quantizer (USQ). …”
    Get full text
    article
  14. 354
  15. 355

    Using Social Network Analysis to Study Business Partnerships by KARIM, ROLA RASHAD ARIF ABDUL

    Published 2018
    “…The resulting weighted undirected network is analysed using community detection algorithms. Characteristics of the top seven communities discovered from the 2015 data are discussed for which common social network motifs are captured. …”
    Get full text
  16. 356

    Scheduling and allocation in high-level synthesis using stochastic techniques by Sait, Sadiq M.

    Published 2020
    “…In this work, a unique approach to scheduling and allocation problem using the genetic algorithm (GA) is described. This approach is different from a previous attempt using GA (Wehn et al., IFIP Working Conference on Logic and Architecture Synthesis, Paris, 1990, pp. 47–56) in many respects. …”
    Get full text
    article
  17. 357

    Using machine learning to support students’ academic decisions by ALLAH, AISHA QASIM GHAZAL FATEH

    Published 2019
    “…At enrollment, this work predicts a student’s GPA in different majors using enrollment data such as high school average, placement test results, and IELTS score. …”
    Get full text
  18. 358
  19. 359

    C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments by Raun, Kristo

    Published 2023
    “…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …”
    Get full text
    Get full text
    Get full text
  20. 360

    RFID localization using single reader antenna. (c2014) by Msheik, Hamze

    Published 2016
    “…Our scheme is based on Power Map Matching algorithm. The proposed method employs the use of a Single Stationary Reader Antenna and multitags placed on the asset. …”
    Get full text
    Get full text
    masterThesis