Search alternatives:
robust algorithm » mould algorithm (Expand Search)
cosine algorithm » colony algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
develop » developed (Expand Search)
Showing 61 - 70 results of 70 for search '(((( develop robust algorithm ) OR ( settlement data algorithm ))) OR ( data cosine algorithm ))', query time: 0.08s Refine Results
  1. 61

    Thermodynamic Analysis and Optimization of Densely-Packed Receiver Assembly Components in High-Concentration CPVT Solar Collectors by Sharaf, Omar Z.

    Published 2016
    “…Thermodynamic component-level analyses that avoid oversimplified as well as computationally-expensive modeling approaches and provide clear and robust simulation algorithms with reasonable accuracy are separately developed for the three addressed components. …”
    Get full text
    article
  2. 62

    Global smart cities classification using a machine learning approach to evaluating livability, technology, and sustainability performance across key urban indices by Aya Hasan Alkhereibi (17151070)

    Published 2025
    “…This approach is necessary for understanding and replicating best practices in urban management and smart city development. Focusing on high-ranking cities ensures the study analyzes robust and reliable data, avoiding noise and inconsistencies arising from lower-performing or less-documented cases. …”
  3. 63

    DASSI: differential architecture search for splice identification from DNA sequences by Shabir Moosa (14153316)

    Published 2022
    “…<h2>Background</h2> <p>The data explosion caused by unprecedented advancements in the field of genomics is constantly challenging the conventional methods used in the interpretation of the human genome. The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …”
  4. 64

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…This issue of security risk can be minimized conspicuously by developing a robust authentication scheme for IoD deployment military drones. …”
  5. 65

    Towards secure and trusted AI in healthcare: A systematic review of emerging innovations and ethical challenges by Muhammad Mohsin Khan (22303366)

    Published 2025
    “…Still, challenges in adversarial attacks, algorithmic bias, and variable regulatory frameworks remain strong. …”
  6. 66
  7. 67

    Sentiment Analysis of Dialectal Speech: Unveiling Emotions through Deep Learning Models by EZZELDIN, KHALED MOHAMED KHALED

    Published 2024
    “…Dialect Speech Sentiment Analysis is an evolutional field where machine learning algorithms are utilized to detect emotions in spoken language. …”
    Get full text
  8. 68

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…In the primary phase, the novel conceptual framework of the proposed solution was developed based on four fundamental concepts: decentralized registry, delegated peers, consensus rules, and dynamic routing. …”
    Get full text
  9. 69

    Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases by Muhammad Ali Muzammil (17910611)

    Published 2024
    “…Further study and development are required to fully realize AI's promise for improving cardiology practices and patient care as technology continues to advance.…”
  10. 70

    Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks by Mohammed Almehdhar (22046597)

    Published 2024
    “…This survey paper offers an in-depth examination of advanced machine learning (ML) and deep learning (DL) approaches employed in developing sophisticated IDS for safeguarding IVNs against potential cyber-attacks. …”