بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
using algorithms » cosine algorithm (توسيع البحث)
mining algorithm » cosine algorithm (توسيع البحث)
يعرض 641 - 660 نتائج من 716 نتيجة بحث عن '(((( data using algorithms ) OR ( data processing algorithm ))) OR ( elements mining algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 641

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study حسب Muhammad Atif Butt (10849980)

    منشور في 2023
    "…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …"
  2. 642
  3. 643

    NEURAL NETWORK MODEL FOR PLANNED REPLACEMENT OF BOEING 737 BRAKES حسب Al-Garni, Ahmed Z.

    منشور في 2020
    "…Three years of data are used for model building and validation. …"
    احصل على النص الكامل
    article
  4. 644

    Applications of fast fourier transform in the integrity evaluation of deep foundations حسب Abi Shdid, Caesar

    منشور في 2016
    "…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 645

    FAILURE RATE ANALYSIS OF BOEING 737 BRAKES EMPLOYING NEURAL NETWORK حسب Al-Garni, Ahmed Z.

    منشور في 2007
    "…Three years of data are used for model building and validation. …"
    احصل على النص الكامل
    article
  6. 646
  7. 647

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 648
  9. 649

    Cross entropy error function in neural networks حسب Nasr, G.E.

    منشور في 2002
    "…To forecast gasoline consumption (GC), the ANN uses previous GC data and its determinants in a training data set. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  10. 650
  11. 651

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…An attacker can easily capture data from the available network channel and use it for their own purpose. …"
  12. 652

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…Accordingly security threats and data banks attacks turn out to be a phenomenon. Thus, granting protection to such crucial information becomes a high demand. …"
    احصل على النص الكامل
  13. 653

    Wearable Artificial Intelligence for Anxiety and Depression: Scoping Review حسب Alaa Abd-alrazaq (17058018)

    منشور في 2023
    "…The most frequently used data set from open sources was Depresjon. The most commonly used algorithm was random forest, followed by support vector machine.…"
  14. 654

    A new estimator and approach for estimating the subpopulation parameters حسب Mohammad Salehi M. (21259490)

    منشور في 2021
    "…The criterion shows that the traditional total subpopulation estimator for unknown subpopulation size will be more efficient if the subpopulation mean is close to zero. Using an innovative procedure, we develop a new estimator, and we study its properties using real data. …"
  15. 655

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
  16. 656

    A Novel Internal Model Control Scheme for Adaptive Tracking of Nonlinear Dynamic Plants حسب Khan, T.

    منشور في 2006
    "…The U-model utilizes only past data for plant modelling and standard root solving algorithm for control law formulation. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 657

    Scatter search metaheuristic for homology based protein structure prediction. (c2015) حسب Stamboulian, Mouses Hrag

    منشور في 2015
    "…We assess our algorithm on a total of 11 proteins whose structures are present in the Protein Data Bank (PDB) and which has been used in previous literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  18. 658

    Online Control and Optimization of Directional Drilling حسب unknown

    منشور في 2020
    "…Detailed mathematical formulation and computer simulation were used for evaluation of the performance of the proposed techniques for both systems, based on real well data.…"
    احصل على النص الكامل
    masterThesis
  19. 659

    An Effective Fault Diagnosis Technique for Wind Energy Conversion Systems Based on an Improved Particle Swarm Optimization حسب Majdi Mansouri (16869885)

    منشور في 2022
    "…The main idea behind the use of the PSO algorithm is to remove irrelevant features and extract only the most significant ones from raw data in order to improve the classification task using a neural networks classifier. …"
  20. 660

    Exploring Digital Competitiveness through Bayesian Belief Networks حسب Qazi, Abroon

    منشور في 2025
    "…The methodology involves constructing BBN models using data from the IMD Digital Competitiveness Ranking 2023 for 64 countries. …"
    احصل على النص الكامل
    article