بدائل البحث:
modelling algorithm » scheduling algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
element » elements (توسيع البحث)
يعرض 641 - 660 نتائج من 683 نتيجة بحث عن '(((( developed based algorithm ) OR ( element method algorithm ))) OR ( data modelling algorithm ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 641

    Artificial Intelligence for Skin Cancer Detection: Scoping Review حسب Abdulrahman Takiddin (14153181)

    منشور في 2021
    "…Overall, studies that used smaller data sets reported higher accuracy.</p><h3>Conclusions</h3><p dir="ltr">This paper examined multiple AI-based skin cancer detection models. …"
  2. 642

    A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks حسب Sakib Mahmud (15302404)

    منشور في 2025
    "…This review synthesizes evidence from more than 500 peer-reviewed studies published between 2020 and 2026, mapping DRL applications across distributed generation, transmission, distribution, energy storage systems, energy markets, local energy management, grid security, and data privacy. We present a structured taxonomy covering value-based, policy-based, actor-critic, model-based, and advanced multi-agent and multi-objective approaches, and link algorithms to tasks such as dispatch, microgrid coordination, real-time pricing, load balancing, and demand–response. …"
  3. 643

    A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass حسب Uzma Nawaz (21980708)

    منشور في 2025
    "…By synthesizing findings across various data sources and model architectures, we offer critical insights into the selection of context-aware algorithms and identify key research gaps, an essential step for advancing the reliability and applicability of AI-driven seagrass conservation efforts.…"
  4. 644
  5. 645

    Predicting and Interpreting Student Performance Using Machine Learning in Blended Learning Environments in a Jordanian School Context حسب SALIM, MAHA JAWDAT

    منشور في 0024
    "…These platforms enhance academic performance by fostering collaborative learning environments and generating extensive data from every user interaction. Machine learning algorithms can process large and complex datasets to identify patterns and trends that may not be immediately apparent. …"
    احصل على النص الكامل
  6. 646

    Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations حسب Md Mosarrof Hossen (21399056)

    منشور في 2025
    "…Leveraging FL enables efficient model training across diverse end-user applications while preserving data privacy. …"
  7. 647

    An aspect-oriented framework for systematic security hardening of software حسب Mourad, Azzam

    منشور في 2008
    "…It is based on the full separation between the roles and duties of the security experts and the developers performing the hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  8. 648

    Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review حسب Arfan Ahmed (17541309)

    منشور في 2022
    "…WDs coupled with artificial intelligence (AI) algorithms show promise to help understand and conclude meaningful information from the gathered data and provide advanced and clinically meaningful analytics.…"
  9. 649

    Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic حسب Saeed Al-Maroof, Rana

    منشور في 2020
    "…The study has made use of Google Meet© as an educational social platform in private higher education institutes. The data obtained from the study were analyzed by using the partial least squares structural equation modeling (PLS-SEM) and machine learning algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
  10. 650

    Unlocking new frontiers in epilepsy through AI: From seizure prediction to personalized medicine حسب Majd A. AbuAlrob (22392505)

    منشور في 2025
    "…Ethical considerations, such as safeguarding patient privacy, ensuring data security, and mitigating algorithmic bias, underscore the importance of responsible AI integration. …"
  11. 651

    Strategies for Reliable Stress Recognition: A Machine Learning Approach Using Heart Rate Variability Features حسب Mariam Bahameish (19255789)

    منشور في 2024
    "…However, limited datasets in affective computing and healthcare research can lead to inaccurate conclusions regarding the ML model performance. This study employed supervised learning algorithms to classify stress and relaxation states using HRV measures. …"
  12. 652

    Humanizing AI in medical training: ethical framework for responsible design حسب Mohammed Tahri Sqalli (18420840)

    منشور في 2023
    "…The transparency pillar highlights the crucial role of maintaining the explainabilty of AI algorithms, while the fairness and justice pillar emphasizes on addressing biases in healthcare data and designing models that prioritize equitable medical training outcomes. …"
  13. 653

    A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics حسب Tekli, Joe

    منشور في 2011
    "…XML similarity evaluation has become a central issue in the database and information communities, its applications ranging over document clustering, version control, data integration and ranked retrieval. Various algorithms for comparing hierarchically structured data, XML documents in particular, have been proposed in the literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 654

    Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks حسب Abbas, Nadine

    منشور في 2018
    "…Traffic offloading via device-to-device communications is expected to play a major role to meet the exponential data traffic growth in wireless networks. In this work, we focus on the problem of user capacity maximization in ultra dense heterogeneous networks with device-to-device cooperation, where a large number of users in a given geographical area request common data content, such as video on demand streaming, with strict quality of service guarantees. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 655

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…An attacker can easily capture data from the available network channel and use it for their own purpose. …"
  16. 656

    Comparative Study on Arabic Text Classification: Challenges and Opportunities حسب Abualigah, Laith

    منشور في 2022
    "…Based on the reviewed researches, SVM and Naive Bayes were the most widely used classifiers for Arabic text classification, while more effort is needed to develop and to implement flexible Arabic text classification methods and classifiers.…"
    احصل على النص الكامل
  17. 657
  18. 658

    Dynamic multiple node failure recovery in distributed storage systems حسب Itani, May

    منشور في 2018
    "…Our daily lives are getting more and more dependent on data centers and distributed storage systems in general, whether at the business or at the personal level. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 659

    Scatter search technique for exam timetabling حسب Mansour, Nashat

    منشور في 2011
    "…Hence, solving this problem in realistic time requires the use of heuristic approaches. In this work, we develop an evolutionary heuristic technique based on the scatter search approach for finding good suboptimal solutions for exam timetabling. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 660

    Common weaving approach in mainstream languages for software security hardening حسب Alhadidi, Dima

    منشور في 2013
    "…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article