Search alternatives:
robust algorithm » mould algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
develop » developed (Expand Search)
Showing 141 - 147 results of 147 for search '(((( develop robust algorithm ) OR ( elements data algorithm ))) OR ( data mining algorithm ))', query time: 0.09s Refine Results
  1. 141
  2. 142

    THE FUTURE OF MEDICINE, healthcare innovation through precision medicine: policy case study of Qatar by M. Walid Qoronfleh (14153088)

    Published 2020
    “…Consequently, the big data revolution has provided an opportunity to apply artificial intelligence and machine learning algorithms to mine such a vast data set. …”
  3. 143
  4. 144

    Sentiment Analysis of Dialectal Speech: Unveiling Emotions through Deep Learning Models by EZZELDIN, KHALED MOHAMED KHALED

    Published 2024
    “…Dialect Speech Sentiment Analysis is an evolutional field where machine learning algorithms are utilized to detect emotions in spoken language. …”
    Get full text
  5. 145

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…In the primary phase, the novel conceptual framework of the proposed solution was developed based on four fundamental concepts: decentralized registry, delegated peers, consensus rules, and dynamic routing. …”
    Get full text
  6. 146

    Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases by Muhammad Ali Muzammil (17910611)

    Published 2024
    “…Further study and development are required to fully realize AI's promise for improving cardiology practices and patient care as technology continues to advance.…”
  7. 147

    Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks by Mohammed Almehdhar (22046597)

    Published 2024
    “…This survey paper offers an in-depth examination of advanced machine learning (ML) and deep learning (DL) approaches employed in developing sophisticated IDS for safeguarding IVNs against potential cyber-attacks. …”