يعرض 61 - 74 نتائج من 74 نتيجة بحث عن '(((( dependent processing algorithm ) OR ( elements rl algorithm ))) OR ( level coding algorithm ))', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 61
  2. 62

    Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review حسب Avneet Kaur (712349)

    منشور في 2024
    "…Conventional disease detection techniques are slow and depend on human involvement, which may be laborious and erroneous. …"
  3. 63

    Assessment of static pile design methods and non-linear analysis of pile driving حسب Abou-Jaoude, Grace G.

    منشور في 2006
    "…The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  4. 64

    Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO حسب Majedeh Gheytanzadeh (17541927)

    منشور في 2022
    "…<p dir="ltr">Recently, electrochemical reduction of CO<sub>2</sub> into value-added fuels has been noticed as a promising process to decrease CO<sub>2</sub> emissions. The development of such technology is strongly depended upon tuning the surface properties of the applied electrocatalysts. …"
  5. 65

    Enhancing Healthcare Systems With Deep Reinforcement Learning: Insights Into D2D Communications and Remote Monitoring حسب Zina Chkirbene (16869987)

    منشور في 2024
    "…<p dir="ltr">The traditional healthcare system is increasingly challenged by its dependence on inperson consultations and manual monitoring, struggling with issues of scalability, the immediacy of care, and efficient resource allocation. …"
  6. 66

    Dynamic multiple node failure recovery in distributed storage systems حسب Itani, May

    منشور في 2018
    "…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 67

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  8. 68

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling حسب Armin, Amindari

    منشور في 2017
    "…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 69

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling حسب Amindari, Armin

    منشور في 2017
    "…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 70

    Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects حسب ALKAABI, ABDULLA

    منشور في 2023
    "…Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …"
    احصل على النص الكامل
  11. 71

    Cyberbullying Detection Model for Arabic Text Using Deep Learning حسب Albayari, Reem

    منشور في 2023
    "…Therefore, in this study, we conduct a performance evaluation and comparison for various DL algorithms (LSTM, GRU, LSTM-ATT, CNN-BLSTM, CNN-LSTM and LSTM-TCN) on different datasets of Arabic cyberbullying to obtain more precise and dependable findings. …"
    احصل على النص الكامل
  12. 72

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey حسب Faria Nawshin (21841598)

    منشور في 2024
    "…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …"
  13. 73

    Cyberbullying Detection in Arabic Text using Deep Learning حسب ALBAYARI, REEM RAMADAN SA’ID

    منشور في 2023
    "…In this study, I conduct a performance evaluation and comparison for various DL algorithms (LSTM, GRU, LSTM-ATT, CNN-BLSTM, CNN-LSTM, CNN-BILSTM-LSTM, and LSTM-TCN) on different datasets of Arabic cyberbullying to obtain more precise and dependable findings. …"
    احصل على النص الكامل
  14. 74

    Single-Cell Transcriptome Analysis Revealed Heterogeneity and Identified Novel Therapeutic Targets for Breast Cancer Subtypes حسب Radhakrishnan Vishnubalaji (3563306)

    منشور في 2023
    "…Differential expression and gene set enrichment analysis in TNBC revealed enrichment in the cycle and mitosis functional categories in FDPShigh, while ENO1high was associated with numerous functional categories, including cell cycle, glycolysis, and ATP metabolic processes. Taken together, our data are the first to unravel the unique gene signatures and to identify novel dependencies and therapeutic vulnerabilities for each BC molecular subtype, thus setting the foundation for the future development of more effective targeted therapies for BC.…"